Advertisement
Guest User

sip2

a guest
Oct 1st, 2017
459
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 92.87 KB | None | 0 0
  1. ;
  2. ; SIP Configuration example for Asterisk
  3. ;
  4. ; Note: Please read the security documentation for Asterisk in order to
  5. ; understand the risks of installing Asterisk with the sample
  6. ; configuration. If your Asterisk is installed on a public
  7. ; IP address connected to the Internet, you will want to learn
  8. ; about the various security settings BEFORE you start
  9. ; Asterisk.
  10. ;
  11. ; Especially note the following settings:
  12. ; - allowguest (default enabled)
  13. ; - permit/deny/acl - IP address filters
  14. ; - contactpermit/contactdeny/contactacl - IP address filters for registrations
  15. ; - context - Which set of services you offer various users
  16. ;
  17. ; SIP dial strings
  18. ; ----------------------------------------------------------
  19. ; In the dialplan (extensions.conf) you can use several
  20. ; syntaxes for dialing SIP devices.
  21. ; SIP/devicename
  22. ; SIP/username@domain (SIP uri)
  23. ; SIP/username[:password[:md5secret[:authname[:transport]]]]@host[:port]
  24. ; SIP/devicename/extension
  25. ; SIP/devicename/extension/IPorHost
  26. ; SIP/username@domain//IPorHost
  27. ;
  28. ;
  29. ; Devicename
  30. ; devicename is defined as a peer in a section below.
  31. ;
  32. ; username@domain
  33. ; Call any SIP user on the Internet
  34. ; (Don't forget to enable DNS SRV records if you want to use this)
  35. ;
  36. ; devicename/extension
  37. ; If you define a SIP proxy as a peer below, you may call
  38. ; SIP/proxyhostname/user or SIP/user@proxyhostname
  39. ; where the proxyhostname is defined in a section below
  40. ; This syntax also works with ATA's with FXO ports
  41. ;
  42. ; SIP/username[:password[:md5secret[:authname]]]@host[:port]
  43. ; This form allows you to specify password or md5secret and authname
  44. ; without altering any authentication data in config.
  45. ; Examples:
  46. ;
  47. ; SIP/*98@mysipproxy
  48. ; SIP/sales:topsecret::account02@domain.com:5062
  49. ; SIP/12345678::bc53f0ba8ceb1ded2b70e05c3f91de4f:myname@192.168.0.1
  50. ;
  51. ; IPorHost
  52. ; The next server for this call regardless of domain/peer
  53. ;
  54. ; All of these dial strings specify the SIP request URI.
  55. ; In addition, you can specify a specific To: header by adding an
  56. ; exclamation mark after the dial string, like
  57. ;
  58. ; SIP/sales@mysipproxy!sales@edvina.net
  59. ;
  60. ; A new feature for 1.8 allows one to specify a host or IP address to use
  61. ; when routing the call. This is typically used in tandem with func_srv if
  62. ; multiple methods of reaching the same domain exist. The host or IP address
  63. ; is specified after the third slash in the dialstring. Examples:
  64. ;
  65. ; SIP/devicename/extension/IPorHost
  66. ; SIP/username@domain//IPorHost
  67. ;
  68. ; CLI Commands
  69. ; -------------------------------------------------------------
  70. ; Useful CLI commands to check peers/users:
  71. ; sip show peers Show all SIP peers (including friends)
  72. ; sip show registry Show status of hosts we register with
  73. ;
  74. ; sip set debug on Show all SIP messages
  75. ;
  76. ; sip reload Reload configuration file
  77. ; sip show settings Show the current channel configuration
  78. ;
  79. ; ------ Naming devices ------------------------------------------------------
  80. ;
  81. ; When naming devices, make sure you understand how Asterisk matches calls
  82. ; that come in.
  83. ; 1. Asterisk checks the SIP From: address username and matches against
  84. ; names of devices with type=user
  85. ; The name is the text between square brackets [name]
  86. ; 2. Asterisk checks the From: addres and matches the list of devices
  87. ; with a type=peer
  88. ; 3. Asterisk checks the IP address (and port number) that the INVITE
  89. ; was sent from and matches against any devices with type=peer
  90. ;
  91. ; Don't mix extensions with the names of the devices. Devices need a unique
  92. ; name. The device name is *not* used as phone numbers. Phone numbers are
  93. ; anything you declare as an extension in the dialplan (extensions.conf).
  94. ;
  95. ; When setting up trunks, make sure there's no risk that any From: username
  96. ; (caller ID) will match any of your device names, because then Asterisk
  97. ; might match the wrong device.
  98. ;
  99. ; Note: The parameter "username" is not the username and in most cases is
  100. ; not needed at all. Check below. In later releases, it's renamed
  101. ; to "defaultuser" which is a better name, since it is used in
  102. ; combination with the "defaultip" setting.
  103. ; ----------------------------------------------------------------------------
  104.  
  105. ; ** Old configuration options **
  106. ; The "call-limit" configuation option is considered old is replaced
  107. ; by new functionality. To enable callcounters, you use the new
  108. ; "callcounter" setting (for extension states in queue and subscriptions)
  109. ; You are encouraged to use the dialplan groupcount functionality
  110. ; to enforce call limits instead of using this channel-specific method.
  111. ; You can still set limits per device in sip.conf or in a database by using
  112. ; "setvar" to set variables that can be used in the dialplan for various limits.
  113.  
  114. [general]
  115. context=default ; Default context for incoming calls. Defaults to 'default'
  116. ;allowguest=no ; Allow or reject guest calls (default is yes)
  117. ; If your Asterisk is connected to the Internet
  118. ; and you have allowguest=yes
  119. ; you want to check which services you offer everyone
  120. ; out there, by enabling them in the default context (see below).
  121. ;match_auth_username=yes ; if available, match user entry using the
  122. ; 'username' field from the authentication line
  123. ; instead of the From: field.
  124. allowoverlap=no ; Disable overlap dialing support. (Default is yes)
  125. ;allowoverlap=yes ; Enable RFC3578 overlap dialing support.
  126. ; Can use the Incomplete application to collect the
  127. ; needed digits from an ambiguous dialplan match.
  128. ;allowoverlap=dtmf ; Enable overlap dialing support using DTMF delivery
  129. ; methods (inband, RFC2833, SIP INFO) in the early
  130. ; media phase. Uses the Incomplete application to
  131. ; collect the needed digits.
  132. ;allowtransfer=no ; Disable all transfers (unless enabled in peers or users)
  133. ; Default is enabled. The Dial() options 't' and 'T' are not
  134. ; related as to whether SIP transfers are allowed or not.
  135. ;realm=mydomain.tld ; Realm for digest authentication
  136. ; defaults to "asterisk". If you set a system name in
  137. ; asterisk.conf, it defaults to that system name
  138. ; Realms MUST be globally unique according to RFC 3261
  139. ; Set this to your host name or domain name
  140. ;domainsasrealm=no ; Use domains list as realms
  141. ; You can serve multiple Realms specifying several
  142. ; 'domain=...' directives (see below).
  143. ; In this case Realm will be based on request 'From'/'To' header
  144. ; and should match one of domain names.
  145. ; Otherwise default 'realm=...' will be used.
  146. ;recordonfeature=automixmon ; Default feature to use when receiving 'Record: on' header
  147. ; from an INFO message. Defaults to 'automon'. Works with
  148. ; dynamic features. Feature must be usable on requesting
  149. ; channel for it to work. Setting this value to a blank
  150. ; will disable it.
  151. ;recordofffeature=automixmon ; Default feature to use when receiving 'Record: off' header
  152. ; from an INFO message. Defaults to 'automon'. Works with
  153. ; dynamic features. Feature must be usable on requesting
  154. ; channel for it to work. Setting this value to a blank
  155. ; will disable it.
  156.  
  157. ; With the current situation, you can do one of four things:
  158. ; a) Listen on a specific IPv4 address. Example: bindaddr=192.0.2.1
  159. ; b) Listen on a specific IPv6 address. Example: bindaddr=2001:db8::1
  160. ; c) Listen on the IPv4 wildcard. Example: bindaddr=0.0.0.0
  161. ; d) Listen on the IPv4 and IPv6 wildcards. Example: bindaddr=::
  162. ; (You can choose independently for UDP, TCP, and TLS, by specifying different values for
  163. ; "udpbindaddr", "tcpbindaddr", and "tlsbindaddr".)
  164. ; (Note that using bindaddr=:: will show only a single IPv6 socket in netstat.
  165. ; IPv4 is supported at the same time using IPv4-mapped IPv6 addresses.)
  166. ;
  167. ; You may optionally add a port number. (The default is port 5060 for UDP and TCP, 5061
  168. ; for TLS).
  169. ; IPv4 example: bindaddr=0.0.0.0:5062
  170. ; IPv6 example: bindaddr=[::]:5062
  171. ;
  172. ; The address family of the bound UDP address is used to determine how Asterisk performs
  173. ; DNS lookups. In cases a) and c) above, only A records are considered. In case b), only
  174. ; AAAA records are considered. In case d), both A and AAAA records are considered. Note,
  175. ; however, that Asterisk ignores all records except the first one. In case d), when both A
  176. ; and AAAA records are available, either an A or AAAA record will be first, and which one
  177. ; depends on the operating system. On systems using glibc, AAAA records are given
  178. ; priority.
  179.  
  180. udpbindaddr=0.0.0.0:5060 ; IP address to bind UDP listen socket to (0.0.0.0 binds to all)
  181. ; Optionally add a port number, 192.168.1.1:5062 (default is port 5060)
  182.  
  183. ; When a dialog is started with another SIP endpoint, the other endpoint
  184. ; should include an Allow header telling us what SIP methods the endpoint
  185. ; implements. However, some endpoints either do not include an Allow header
  186. ; or lie about what methods they implement. In the former case, Asterisk
  187. ; makes the assumption that the endpoint supports all known SIP methods.
  188. ; If you know that your SIP endpoint does not provide support for a specific
  189. ; method, then you may provide a comma-separated list of methods that your
  190. ; endpoint does not implement in the disallowed_methods option. Note that
  191. ; if your endpoint is truthful with its Allow header, then there is no need
  192. ; to set this option. This option may be set in the general section or may
  193. ; be set per endpoint. If this option is set both in the general section and
  194. ; in a peer section, then the peer setting completely overrides the general
  195. ; setting (i.e. the result is *not* the union of the two options).
  196. ;
  197. ; Note also that while Asterisk currently will parse an Allow header to learn
  198. ; what methods an endpoint supports, the only actual use for this currently
  199. ; is for determining if Asterisk may send connected line UPDATE requests and
  200. ; MESSAGE requests. Its use may be expanded in the future.
  201. ;
  202. ; disallowed_methods = UPDATE
  203.  
  204. ;
  205. ; Note that the TCP and TLS support for chan_sip is currently considered
  206. ; experimental. Since it is new, all of the related configuration options are
  207. ; subject to change in any release. If they are changed, the changes will
  208. ; be reflected in this sample configuration file, as well as in the UPGRADE.txt file.
  209. ;
  210. tcpenable=no ; Enable server for incoming TCP connections (default is no)
  211. tcpbindaddr=0.0.0.0 ; IP address for TCP server to bind to (0.0.0.0 binds to all interfaces)
  212. ; Optionally add a port number, 192.168.1.1:5062 (default is port 5060)
  213.  
  214. ;tlsenable=no ; Enable server for incoming TLS (secure) connections (default is no)
  215. ;tlsbindaddr=0.0.0.0 ; IP address for TLS server to bind to (0.0.0.0) binds to all interfaces)
  216. ; Optionally add a port number, 192.168.1.1:5063 (default is port 5061)
  217. ; Remember that the IP address must match the common name (hostname) in the
  218. ; certificate, so you don't want to bind a TLS socket to multiple IP addresses.
  219. ; For details how to construct a certificate for SIP see
  220. ; http://tools.ietf.org/html/draft-ietf-sip-domain-certs
  221.  
  222. ;tcpauthtimeout = 30 ; tcpauthtimeout specifies the maximum number
  223. ; of seconds a client has to authenticate. If
  224. ; the client does not authenticate beofre this
  225. ; timeout expires, the client will be
  226. ; disconnected. (default: 30 seconds)
  227.  
  228. ;tcpauthlimit = 100 ; tcpauthlimit specifies the maximum number of
  229. ; unauthenticated sessions that will be allowed
  230. ; to connect at any given time. (default: 100)
  231.  
  232. ;websocket_enabled = true ; Set to false to prevent chan_sip from listening to websockets. This
  233. ; is neeeded when using chan_sip and res_pjsip_transport_websockets on
  234. ; the same system.
  235.  
  236. ;websocket_write_timeout = 100 ; Default write timeout to set on websocket transports.
  237. ; This value may need to be adjusted for connections where
  238. ; Asterisk must write a substantial amount of data and the
  239. ; receiving clients are slow to process the received information.
  240. ; Value is in milliseconds; default is 100 ms.
  241.  
  242. transport=udp ; Set the default transports. The order determines the primary default transport.
  243. ; If tcpenable=no and the transport set is tcp, we will fallback to UDP.
  244.  
  245. srvlookup=yes ; Enable DNS SRV lookups on outbound calls
  246. ; Note: Asterisk only uses the first host
  247. ; in SRV records
  248. ; Disabling DNS SRV lookups disables the
  249. ; ability to place SIP calls based on domain
  250. ; names to some other SIP users on the Internet
  251. ; Specifying a port in a SIP peer definition or
  252. ; when dialing outbound calls will supress SRV
  253. ; lookups for that peer or call.
  254.  
  255. ;pedantic=yes ; Enable checking of tags in headers,
  256. ; international character conversions in URIs
  257. ; and multiline formatted headers for strict
  258. ; SIP compatibility (defaults to "yes")
  259.  
  260. ; See https://wiki.asterisk.org/wiki/display/AST/IP+Quality+of+Service for a description of these parameters.
  261. ;tos_sip=cs3 ; Sets TOS for SIP packets.
  262. ;tos_audio=ef ; Sets TOS for RTP audio packets.
  263. ;tos_video=af41 ; Sets TOS for RTP video packets.
  264. ;tos_text=af41 ; Sets TOS for RTP text packets.
  265.  
  266. ;cos_sip=3 ; Sets 802.1p priority for SIP packets.
  267. ;cos_audio=5 ; Sets 802.1p priority for RTP audio packets.
  268. ;cos_video=4 ; Sets 802.1p priority for RTP video packets.
  269. ;cos_text=3 ; Sets 802.1p priority for RTP text packets.
  270.  
  271. ;maxexpiry=3600 ; Maximum allowed time of incoming registrations (seconds)
  272. ;minexpiry=60 ; Minimum length of registrations (default 60)
  273. ;defaultexpiry=120 ; Default length of incoming/outgoing registration
  274. ;submaxexpiry=3600 ; Maximum allowed time of incoming subscriptions (seconds), default: maxexpiry
  275. ;subminexpiry=60 ; Minimum length of subscriptions, default: minexpiry
  276. ;mwiexpiry=3600 ; Expiry time for outgoing MWI subscriptions
  277. ;maxforwards=70 ; Setting for the SIP Max-Forwards: header (loop prevention)
  278. ; Default value is 70
  279. ;qualifyfreq=60 ; Qualification: How often to check for the host to be up in seconds
  280. ; and reported in milliseconds with sip show settings.
  281. ; Set to low value if you use low timeout for NAT of UDP sessions
  282. ; Default: 60
  283. ;qualifygap=100 ; Number of milliseconds between each group of peers being qualified
  284. ; Default: 100
  285. ;qualifypeers=1 ; Number of peers in a group to be qualified at the same time
  286. ; Default: 1
  287. ;keepalive=60 ; Interval at which keepalive packets should be sent to a peer
  288. ; Valid options are yes (60 seconds), no, or the number of seconds.
  289. ; Default: 0
  290. ;notifymimetype=text/plain ; Allow overriding of mime type in MWI NOTIFY
  291. ;buggymwi=no ; Cisco SIP firmware doesn't support the MWI RFC
  292. ; fully. Enable this option to not get error messages
  293. ; when sending MWI to phones with this bug.
  294. ;mwi_from=asterisk ; When sending MWI NOTIFY requests, use this setting in
  295. ; the From: header as the "name" portion. Also fill the
  296. ; "user" portion of the URI in the From: header with this
  297. ; value if no fromuser is set
  298. ; Default: empty
  299. ;vmexten=voicemail ; dialplan extension to reach mailbox sets the
  300. ; Message-Account in the MWI notify message
  301. ; defaults to "asterisk"
  302.  
  303. ; Codec negotiation
  304. ;
  305. ; When Asterisk is receiving a call, the codec will initially be set to the
  306. ; first codec in the allowed codecs defined for the user receiving the call
  307. ; that the caller also indicates that it supports. But, after the caller
  308. ; starts sending RTP, Asterisk will switch to using whatever codec the caller
  309. ; is sending.
  310. ;
  311. ; When Asterisk is placing a call, the codec used will be the first codec in
  312. ; the allowed codecs that the callee indicates that it supports. Asterisk will
  313. ; *not* switch to whatever codec the callee is sending.
  314. ;
  315. ;preferred_codec_only=yes ; Respond to a SIP invite with the single most preferred codec
  316. ; rather than advertising all joint codec capabilities. This
  317. ; limits the other side's codec choice to exactly what we prefer.
  318.  
  319. ;disallow=all ; First disallow all codecs
  320. ;allow=ulaw ; Allow codecs in order of preference
  321. ;allow=ilbc ; see https://wiki.asterisk.org/wiki/display/AST/RTP+Packetization
  322. ; for framing options
  323. ;autoframing=yes ; Set packetization based on the remote endpoint's (ptime)
  324. ; preferences. Defaults to no.
  325. ;
  326. ; This option specifies a preference for which music on hold class this channel
  327. ; should listen to when put on hold if the music class has not been set on the
  328. ; channel with Set(CHANNEL(musicclass)=whatever) in the dialplan, and the peer
  329. ; channel putting this one on hold did not suggest a music class.
  330. ;
  331. ; This option may be specified globally, or on a per-user or per-peer basis.
  332. ;
  333. ;mohinterpret=default
  334. ;
  335. ; This option specifies which music on hold class to suggest to the peer channel
  336. ; when this channel places the peer on hold. It may be specified globally or on
  337. ; a per-user or per-peer basis.
  338. ;
  339. ;mohsuggest=default
  340. ;
  341. ;parkinglot=plaza ; Sets the default parking lot for call parking
  342. ; This may also be set for individual users/peers
  343. ; Parkinglots are configured in features.conf
  344. ;language=en ; Default language setting for all users/peers
  345. ; This may also be set for individual users/peers
  346. ;tonezone=se ; Default tonezone for all users/peers
  347. ; This may also be set for individual users/peers
  348.  
  349. ;relaxdtmf=yes ; Relax dtmf handling
  350. ;trustrpid = no ; If Remote-Party-ID should be trusted
  351. ;sendrpid = yes ; If Remote-Party-ID should be sent (defaults to no)
  352. ;sendrpid = rpid ; Use the "Remote-Party-ID" header
  353. ; to send the identity of the remote party
  354. ; This is identical to sendrpid=yes
  355. ;sendrpid = pai ; Use the "P-Asserted-Identity" header
  356. ; to send the identity of the remote party
  357. ;rpid_update = no ; In certain cases, the only method by which a connected line
  358. ; change may be immediately transmitted is with a SIP UPDATE request.
  359. ; If communicating with another Asterisk server, and you wish to be able
  360. ; transmit such UPDATE messages to it, then you must enable this option.
  361. ; Otherwise, we will have to wait until we can send a reinvite to
  362. ; transmit the information.
  363. ;trust_id_outbound = no ; Controls whether or not we trust this peer with private identity
  364. ; information (when the remote party has callingpres=prohib or equivalent).
  365. ; no - RPID/PAI headers will not be included for private peer information
  366. ; yes - RPID/PAI headers will include the private peer information. Privacy
  367. ; requirements will be indicated in a Privacy header for sendrpid=pai
  368. ; legacy - RPID/PAI will be included for private peer information. In the
  369. ; case of sendrpid=pai, private data that would be included in them
  370. ; will be anonymized. For sendrpid=rpid, private data may be included
  371. ; but the remote party's domain will be anonymized. The way legacy
  372. ; behaves may violate RFC-3325, but it follows historic behavior.
  373. ; This option is set to 'legacy' by default
  374. ;prematuremedia=no ; Some ISDN links send empty media frames before
  375. ; the call is in ringing or progress state. The SIP
  376. ; channel will then send 183 indicating early media
  377. ; which will be empty - thus users get no ring signal.
  378. ; Setting this to "yes" will stop any media before we have
  379. ; call progress (meaning the SIP channel will not send 183 Session
  380. ; Progress for early media). Default is "yes". Also make sure that
  381. ; the SIP peer is configured with progressinband=never.
  382. ;
  383. ; In order for "noanswer" applications to work, you need to run
  384. ; the progress() application in the priority before the app.
  385.  
  386. ;progressinband=no ; If we should generate in-band ringing. Always
  387. ; use 'never' to never use in-band signalling, even in cases
  388. ; where some buggy devices might not render it
  389. ; Valid values: yes, no, never Default: no
  390. ;useragent=Asterisk PBX ; Allows you to change the user agent string
  391. ; The default user agent string also contains the Asterisk
  392. ; version. If you don't want to expose this, change the
  393. ; useragent string.
  394. ;promiscredir = no ; If yes, allows 302 or REDIR to non-local SIP address
  395. ; Note that promiscredir when redirects are made to the
  396. ; local system will cause loops since Asterisk is incapable
  397. ; of performing a "hairpin" call.
  398. ;usereqphone = no ; If yes, ";user=phone" is added to uri that contains
  399. ; a valid phone number
  400. ;dtmfmode = rfc2833 ; Set default dtmfmode for sending DTMF. Default: rfc2833
  401. ; Other options:
  402. ; info : SIP INFO messages (application/dtmf-relay)
  403. ; shortinfo : SIP INFO messages (application/dtmf)
  404. ; inband : Inband audio (requires 64 kbit codec -alaw, ulaw)
  405. ; auto : Use rfc2833 if offered, inband otherwise
  406.  
  407. ;compactheaders = yes ; send compact sip headers.
  408. ;
  409. ;videosupport=yes ; Turn on support for SIP video. You need to turn this
  410. ; on in this section to get any video support at all.
  411. ; You can turn it off on a per peer basis if the general
  412. ; video support is enabled, but you can't enable it for
  413. ; one peer only without enabling in the general section.
  414. ; If you set videosupport to "always", then RTP ports will
  415. ; always be set up for video, even on clients that don't
  416. ; support it. This assists callfile-derived calls and
  417. ; certain transferred calls to use always use video when
  418. ; available. [yes|NO|always]
  419.  
  420. ;textsupport=no ; Support for ITU-T T.140 realtime text.
  421. ; The default value is "no".
  422.  
  423. ;maxcallbitrate=384 ; Maximum bitrate for video calls (default 384 kb/s)
  424. ; Videosupport and maxcallbitrate is settable
  425. ; for peers and users as well
  426. ;authfailureevents=no ; generate manager "peerstatus" events when peer can't
  427. ; authenticate with Asterisk. Peerstatus will be "rejected".
  428. ;alwaysauthreject = yes ; When an incoming INVITE or REGISTER is to be rejected,
  429. ; for any reason, always reject with an identical response
  430. ; equivalent to valid username and invalid password/hash
  431. ; instead of letting the requester know whether there was
  432. ; a matching user or peer for their request. This reduces
  433. ; the ability of an attacker to scan for valid SIP usernames.
  434. ; This option is set to "yes" by default.
  435.  
  436. ;auth_options_requests = yes ; Enabling this option will authenticate OPTIONS requests just like
  437. ; INVITE requests are. By default this option is disabled.
  438.  
  439. ;accept_outofcall_message = no ; Disable this option to reject all MESSAGE requests outside of a
  440. ; call. By default, this option is enabled. When enabled, MESSAGE
  441. ; requests are passed in to the dialplan.
  442.  
  443. ;outofcall_message_context = messages ; Context all out of dialog msgs are sent to. When this
  444. ; option is not set, the context used during peer matching
  445. ; is used. This option can be defined at both the peer and
  446. ; global level.
  447.  
  448. ;auth_message_requests = yes ; Enabling this option will authenticate MESSAGE requests.
  449. ; By default this option is enabled. However, it can be disabled
  450. ; should an application desire to not load the Asterisk server with
  451. ; doing authentication and implement end to end security in the
  452. ; message body.
  453.  
  454. ;g726nonstandard = yes ; If the peer negotiates G726-32 audio, use AAL2 packing
  455. ; order instead of RFC3551 packing order (this is required
  456. ; for Sipura and Grandstream ATAs, among others). This is
  457. ; contrary to the RFC3551 specification, the peer _should_
  458. ; be negotiating AAL2-G726-32 instead :-(
  459. ;outboundproxy=proxy.provider.domain ; send outbound signaling to this proxy, not directly to the devices
  460. ;outboundproxy=proxy.provider.domain:8080 ; send outbound signaling to this proxy, not directly to the devices
  461. ;outboundproxy=proxy.provider.domain,force ; Send ALL outbound signalling to proxy, ignoring route: headers
  462. ;outboundproxy=tls://proxy.provider.domain ; same as '=proxy.provider.domain' except we try to connect with tls
  463. ;outboundproxy=192.0.2.1 ; IPv4 address literal (default port is 5060)
  464. ;outboundproxy=2001:db8::1 ; IPv6 address literal (default port is 5060)
  465. ;outboundproxy=192.168.0.2.1:5062 ; IPv4 address literal with explicit port
  466. ;outboundproxy=[2001:db8::1]:5062 ; IPv6 address literal with explicit port
  467. ; ; (could also be tcp,udp) - defining transports on the proxy line only
  468. ; ; applies for the global proxy, otherwise use the transport= option
  469.  
  470. ;supportpath=yes ; This activates parsing and handling of Path header as defined in RFC 3327. This enables
  471. ; Asterisk to route outgoing out-of-dialog requests via a set of proxies by using a pre-loaded
  472. ; route-set defined by the Path headers in the REGISTER request.
  473. ; NOTE: There are multiple things to consider with this setting:
  474. ; * As this influences routing of SIP requests make sure to not trust Path headers provided
  475. ; by the user's SIP client (the proxy in front of Asterisk should remove existing user
  476. ; provided Path headers).
  477. ; * When a peer has both a path and outboundproxy set, the path will be added to Route: header
  478. ; but routing to next hop is done using the outboundproxy.
  479. ; * If set globally, not only will all peers use the Path header, but outbound REGISTER
  480. ; requests from Asterisk will add path to the Supported header.
  481.  
  482. ;rtsavepath=yes ; If using dynamic realtime, store the path headers
  483.  
  484. ;matchexternaddrlocally = yes ; Only substitute the externaddr or externhost setting if it matches
  485. ; your localnet setting. Unless you have some sort of strange network
  486. ; setup you will not need to enable this.
  487.  
  488. ;dynamic_exclude_static = yes ; Disallow all dynamic hosts from registering
  489. ; as any IP address used for staticly defined
  490. ; hosts. This helps avoid the configuration
  491. ; error of allowing your users to register at
  492. ; the same address as a SIP provider.
  493.  
  494. ;contactdeny=0.0.0.0/0.0.0.0 ; Use contactpermit and contactdeny to
  495. ;contactpermit=172.16.0.0/255.255.0.0 ; restrict at what IPs your users may
  496. ; register their phones.
  497. ;contactacl=named_acl_example ; Use named ACLs defined in acl.conf
  498.  
  499. ;rtp_engine=asterisk ; RTP engine to use when communicating with the device
  500.  
  501. ;
  502. ; If regcontext is specified, Asterisk will dynamically create and destroy a
  503. ; NoOp priority 1 extension for a given peer who registers or unregisters with
  504. ; us and have a "regexten=" configuration item.
  505. ; Multiple contexts may be specified by separating them with '&'. The
  506. ; actual extension is the 'regexten' parameter of the registering peer or its
  507. ; name if 'regexten' is not provided. If more than one context is provided,
  508. ; the context must be specified within regexten by appending the desired
  509. ; context after '@'. More than one regexten may be supplied if they are
  510. ; separated by '&'. Patterns may be used in regexten.
  511. ;
  512. ;regcontext=sipregistrations
  513. ;regextenonqualify=yes ; Default "no"
  514. ; If you have qualify on and the peer becomes unreachable
  515. ; this setting will enforce inactivation of the regexten
  516. ; extension for the peer
  517. ;legacy_useroption_parsing=yes ; Default "no" ; If you have this option enabled and there are semicolons
  518. ; in the user field of a sip URI, the field be truncated
  519. ; at the first semicolon seen. This effectively makes
  520. ; semicolon a non-usable character for peer names, extensions,
  521. ; and maybe other, less tested things. This can be useful
  522. ; for improving compatability with devices that like to use
  523. ; user options for whatever reason. The behavior is similar to
  524. ; how SIP URI's were typically handled in 1.6.2, hence the name.
  525.  
  526. ;send_diversion=no ; Default "yes" ; Asterisk normally sends Diversion headers with certain SIP
  527. ; invites to relay data about forwarded calls. If this option
  528. ; is disabled, Asterisk won't send Diversion headers unless
  529. ; they are added manually.
  530.  
  531. ; The shrinkcallerid function removes '(', ' ', ')', non-trailing '.', and '-' not
  532. ; in square brackets. For example, the caller id value 555.5555 becomes 5555555
  533. ; when this option is enabled. Disabling this option results in no modification
  534. ; of the caller id value, which is necessary when the caller id represents something
  535. ; that must be preserved. This option can only be used in the [general] section.
  536. ; By default this option is on.
  537. ;
  538. ;shrinkcallerid=yes ; on by default
  539.  
  540.  
  541. ;use_q850_reason = no ; Default "no"
  542. ; Set to yes add Reason header and use Reason header if it is available.
  543.  
  544. ; When the Transfer() application sends a REFER SIP message, extra headers specified in
  545. ; the dialplan by way of SIPAddHeader are sent out with that message. 1.8 and earlier did not
  546. ; add the extra headers. To revert to 1.8- behavior, call SIPRemoveHeader with no arguments
  547. ; before calling Transfer() to remove all additional headers from the channel. The setting
  548. ; below is for transitional compatibility only.
  549. ;
  550. ;refer_addheaders=yes ; on by default
  551.  
  552. ;autocreatepeer=no ; Allow any UAC not explicitly defined to register
  553. ; WITHOUT AUTHENTICATION. Enabling this options poses a high
  554. ; potential security risk and should be avoided unless the
  555. ; server is behind a trusted firewall.
  556. ; If set to "yes", then peers created in this fashion
  557. ; are purged during SIP reloads.
  558. ; When set to "persist", the peers created in this fashion
  559. ; are not purged during SIP reloads.
  560.  
  561. ;
  562. ; ----------------------- TLS settings ------------------------------------------------------------
  563. ;tlscertfile=</path/to/certificate.pem> ; Certificate chain (*.pem format only) to use for TLS connections
  564. ; The certificates must be sorted starting with the subject's certificate
  565. ; and followed by intermediate CA certificates if applicable.
  566. ; Default is to look for "asterisk.pem" in current directory
  567.  
  568. ;tlsprivatekey=</path/to/private.pem> ; Private key file (*.pem format only) for TLS connections.
  569. ; If no tlsprivatekey is specified, tlscertfile is searched for
  570. ; for both public and private key.
  571.  
  572. ;tlscafile=</path/to/certificate>
  573. ; If the server your connecting to uses a self signed certificate
  574. ; you should have their certificate installed here so the code can
  575. ; verify the authenticity of their certificate.
  576.  
  577. ;tlscapath=</path/to/ca/dir>
  578. ; A directory full of CA certificates. The files must be named with
  579. ; the CA subject name hash value.
  580. ; (see man SSL_CTX_load_verify_locations for more info)
  581.  
  582. ;tlsdontverifyserver=[yes|no]
  583. ; If set to yes, don't verify the servers certificate when acting as
  584. ; a client. If you don't have the server's CA certificate you can
  585. ; set this and it will connect without requiring tlscafile to be set.
  586. ; Default is no.
  587.  
  588. ;tlscipher=<SSL cipher string>
  589. ; A string specifying which SSL ciphers to use or not use
  590. ; A list of valid SSL cipher strings can be found at:
  591. ; http://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS
  592. ;
  593. ;tlsclientmethod=tlsv1 ; values include tlsv1, sslv3, sslv2.
  594. ; Specify protocol for outbound client connections.
  595. ; If left unspecified, the default is the general-
  596. ; purpose version-flexible SSL/TLS method (sslv23).
  597. ; With that, the actual protocol version used will
  598. ; be negotiated to the highest version mutually
  599. ; supported by Asterisk and the remote server, i.e.
  600. ; TLSv1.2. The supported protocols are listed at
  601. ; http://www.openssl.org/docs/ssl/SSL_CTX_new.html
  602. ; SSLv2 and SSLv3 are disabled within Asterisk.
  603. ; Your distribution might have changed that list
  604. ; further.
  605. ;
  606. ; -------------------------- SIP timers ----------------------------------------------------
  607. ; These timers are used primarily in INVITE transactions.
  608. ; The default for Timer T1 is 500 ms or the measured run-trip time between
  609. ; Asterisk and the device if you have qualify=yes for the device.
  610. ;
  611. ;t1min=100 ; Minimum roundtrip time for messages to monitored hosts
  612. ; Defaults to 100 ms
  613. ;timert1=500 ; Default T1 timer
  614. ; Defaults to 500 ms or the measured round-trip
  615. ; time to a peer (qualify=yes).
  616. ;timerb=32000 ; Call setup timer. If a provisional response is not received
  617. ; in this amount of time, the call will autocongest
  618. ; Defaults to 64*timert1
  619.  
  620. ; -------------------------- RTP timers ----------------------------------------------------
  621. ; These timers are currently used for both audio and video streams. The RTP timeouts
  622. ; are only applied to the audio channel.
  623. ; The settings are settable in the global section as well as per device
  624. ;
  625. ;rtptimeout=60 ; Terminate call if 60 seconds of no RTP or RTCP activity
  626. ; on the audio channel
  627. ; when we're not on hold. This is to be able to hangup
  628. ; a call in the case of a phone disappearing from the net,
  629. ; like a powerloss or grandma tripping over a cable.
  630. ;rtpholdtimeout=300 ; Terminate call if 300 seconds of no RTP or RTCP activity
  631. ; on the audio channel
  632. ; when we're on hold (must be > rtptimeout)
  633. ;rtpkeepalive=<secs> ; Send keepalives in the RTP stream to keep NAT open
  634. ; (default is off - zero)
  635.  
  636. ; -------------------------- SIP Session-Timers (RFC 4028)------------------------------------
  637. ; SIP Session-Timers provide an end-to-end keep-alive mechanism for active SIP sessions.
  638. ; This mechanism can detect and reclaim SIP channels that do not terminate through normal
  639. ; signaling procedures. Session-Timers can be configured globally or at a user/peer level.
  640. ; The operation of Session-Timers is driven by the following configuration parameters:
  641. ;
  642. ; * session-timers - Session-Timers feature operates in the following three modes:
  643. ; originate : Request and run session-timers always
  644. ; accept : Run session-timers only when requested by other UA
  645. ; refuse : Do not run session timers in any case
  646. ; The default mode of operation is 'accept'.
  647. ; * session-expires - Maximum session refresh interval in seconds. Defaults to 1800 secs.
  648. ; * session-minse - Minimum session refresh interval in seconds. Defualts to 90 secs.
  649. ; * session-refresher - The session refresher (uac|uas). Defaults to 'uas'.
  650. ; uac - Default to the caller initially refreshing when possible
  651. ; uas - Default to the callee initially refreshing when possible
  652. ;
  653. ; Note that, due to recommendations in RFC 4028, Asterisk will always honor the other
  654. ; endpoint's preference for who will handle refreshes. Asterisk will never override the
  655. ; preferences of the other endpoint. Doing so could result in Asterisk and the endpoint
  656. ; fighting over who sends the refreshes. This holds true for the initiation of session
  657. ; timers and subsequent re-INVITE requests whether Asterisk is the caller or callee, or
  658. ; whether Asterisk is currently the refresher or not.
  659. ;
  660. ;session-timers=originate
  661. ;session-expires=600
  662. ;session-minse=90
  663. ;session-refresher=uac
  664. ;
  665. ; -------------------------- SIP DEBUGGING ---------------------------------------------------
  666. ;sipdebug = yes ; Turn on SIP debugging by default, from
  667. ; the moment the channel loads this configuration.
  668. ; NOTE: You cannot use the CLI to turn it off. You'll
  669. ; need to edit this and reload the config.
  670. ;recordhistory=yes ; Record SIP history by default
  671. ; (see sip history / sip no history)
  672. ;dumphistory=yes ; Dump SIP history at end of SIP dialogue
  673. ; SIP history is output to the DEBUG logging channel
  674.  
  675.  
  676. ; -------------------------- STATUS NOTIFICATIONS (SUBSCRIPTIONS) ----------------------------
  677. ; You can subscribe to the status of extensions with a "hint" priority
  678. ; (See extensions.conf.sample for examples)
  679. ; chan_sip support two major formats for notifications: dialog-info and SIMPLE
  680. ;
  681. ; You will get more detailed reports (busy etc) if you have a call counter enabled
  682. ; for a device.
  683. ;
  684. ; If you set the busylevel, we will indicate busy when we have a number of calls that
  685. ; matches the busylevel treshold.
  686. ;
  687. ; For queues, you will need this level of detail in status reporting, regardless
  688. ; if you use SIP subscriptions. Queues and manager use the same internal interface
  689. ; for reading status information.
  690. ;
  691. ; Note: Subscriptions does not work if you have a realtime dialplan and use the
  692. ; realtime switch.
  693. ;
  694. ;allowsubscribe=no ; Disable support for subscriptions. (Default is yes)
  695. ;subscribecontext = default ; Set a specific context for SUBSCRIBE requests
  696. ; Useful to limit subscriptions to local extensions
  697. ; Settable per peer/user also
  698. ;notifyringing = no ; Control whether subscriptions already INUSE get sent
  699. ; RINGING when another call is sent (default: yes)
  700. ;notifyhold = yes ; Notify subscriptions on HOLD state (default: no)
  701. ; Turning on notifyringing and notifyhold will add a lot
  702. ; more database transactions if you are using realtime.
  703. ;notifycid = yes ; Control whether caller ID information is sent along with
  704. ; dialog-info+xml notifications (supported by snom phones).
  705. ; Note that this feature will only work properly when the
  706. ; incoming call is using the same extension and context that
  707. ; is being used as the hint for the called extension. This means
  708. ; that it won't work when using subscribecontext for your sip
  709. ; user or peer (if subscribecontext is different than context).
  710. ; This is also limited to a single caller, meaning that if an
  711. ; extension is ringing because multiple calls are incoming,
  712. ; only one will be used as the source of caller ID. Specify
  713. ; 'ignore-context' to ignore the called context when looking
  714. ; for the caller's channel. The default value is 'no.' Setting
  715. ; notifycid to 'ignore-context' also causes call-pickups attempted
  716. ; via SNOM's NOTIFY mechanism to set the context for the call pickup
  717. ; to PICKUPMARK.
  718. ;callcounter = yes ; Enable call counters on devices. This can be set per
  719. ; device too.
  720.  
  721. ; ---------------------------------------- T.38 FAX SUPPORT ----------------------------------
  722. ;
  723. ; This setting is available in the [general] section as well as in device configurations.
  724. ; Setting this to yes enables T.38 FAX (UDPTL) on SIP calls; it defaults to off.
  725. ;
  726. ; t38pt_udptl = yes ; Enables T.38 with FEC error correction.
  727. ; t38pt_udptl = yes,fec ; Enables T.38 with FEC error correction.
  728. ; t38pt_udptl = yes,redundancy ; Enables T.38 with redundancy error correction.
  729. ; t38pt_udptl = yes,none ; Enables T.38 with no error correction.
  730. ;
  731. ; In some cases, T.38 endpoints will provide a T38FaxMaxDatagram value (during T.38 setup) that
  732. ; is based on an incorrect interpretation of the T.38 recommendation, and results in failures
  733. ; because Asterisk does not believe it can send T.38 packets of a reasonable size to that
  734. ; endpoint (Cisco media gateways are one example of this situation). In these cases, during a
  735. ; T.38 call you will see warning messages on the console/in the logs from the Asterisk UDPTL
  736. ; stack complaining about lack of buffer space to send T.38 FAX packets. If this occurs, you
  737. ; can set an override (globally, or on a per-device basis) to make Asterisk ignore the
  738. ; T38FaxMaxDatagram value specified by the other endpoint, and use a configured value instead.
  739. ; This can be done by appending 'maxdatagram=<value>' to the t38pt_udptl configuration option,
  740. ; like this:
  741. ;
  742. ; t38pt_udptl = yes,fec,maxdatagram=400 ; Enables T.38 with FEC error correction and overrides
  743. ; ; the other endpoint's provided value to assume we can
  744. ; ; send 400 byte T.38 FAX packets to it.
  745. ;
  746. ; FAX detection will cause the SIP channel to jump to the 'fax' extension (if it exists)
  747. ; based one or more events being detected. The events that can be detected are an incoming
  748. ; CNG tone or an incoming T.38 re-INVITE request.
  749. ;
  750. ; faxdetect = yes ; Default 'no', 'yes' enables both CNG and T.38 detection
  751. ; faxdetect = cng ; Enables only CNG detection
  752. ; faxdetect = t38 ; Enables only T.38 detection
  753. ;
  754. ; ---------------------------------------- OUTBOUND SIP REGISTRATIONS ------------------------
  755. ; Asterisk can register as a SIP user agent to a SIP proxy (provider)
  756. ; Format for the register statement is:
  757. ; register => [peer?][transport://]user[@domain][:secret[:authuser]]@host[:port][/extension][~expiry]
  758. ;
  759. ;
  760. ;
  761. ; domain is either
  762. ; - domain in DNS
  763. ; - host name in DNS
  764. ; - the name of a peer defined below or in realtime
  765. ; The domain is where you register your username, so your SIP uri you are registering to
  766. ; is username@domain
  767. ;
  768. ; If no extension is given, the 's' extension is used. The extension needs to
  769. ; be defined in extensions.conf to be able to accept calls from this SIP proxy
  770. ; (provider).
  771. ;
  772. ; A similar effect can be achieved by adding a "callbackextension" option in a peer section.
  773. ; this is equivalent to having the following line in the general section:
  774. ;
  775. ; register => username:secret@host/callbackextension
  776. ;
  777. ; and more readable because you don't have to write the parameters in two places
  778. ; (note that the "port" is ignored - this is a bug that should be fixed).
  779. ;
  780. ; Note that a register= line doesn't mean that we will match the incoming call in any
  781. ; other way than described above. If you want to control where the call enters your
  782. ; dialplan, which context, you want to define a peer with the hostname of the provider's
  783. ; server. If the provider has multiple servers to place calls to your system, you need
  784. ; a peer for each server.
  785. ;
  786. ; Beginning with Asterisk version 1.6.2, the "user" portion of the register line may
  787. ; contain a port number. Since the logical separator between a host and port number is a
  788. ; ':' character, and this character is already used to separate between the optional "secret"
  789. ; and "authuser" portions of the line, there is a bit of a hoop to jump through if you wish
  790. ; to use a port here. That is, you must explicitly provide a "secret" and "authuser" even if
  791. ; they are blank. See the third example below for an illustration.
  792. ;
  793. ;
  794. ; Examples:
  795. ;
  796. ;register => 1234:password@mysipprovider.com
  797. ;
  798. ; This will pass incoming calls to the 's' extension
  799. ;
  800. ;
  801. ;register => 2345:password@sip_proxy/1234
  802. ;
  803. ; Register 2345 at sip provider 'sip_proxy'. Calls from this provider
  804. ; connect to local extension 1234 in extensions.conf, default context,
  805. ; unless you configure a [sip_proxy] section below, and configure a
  806. ; context.
  807. ; Tip 1: Avoid assigning hostname to a sip.conf section like [provider.com]
  808. ; Tip 2: Use separate inbound and outbound sections for SIP providers
  809. ; (instead of type=friend) if you have calls in both directions
  810. ;
  811. ;register => 3456@mydomain:5082::@mysipprovider.com
  812. ;
  813. ; Note that in this example, the optional authuser and secret portions have
  814. ; been left blank because we have specified a port in the user section
  815. ;
  816. ;register => tls://username:xxxxxx@sip-tls-proxy.example.org
  817. ;
  818. ; The 'transport' part defaults to 'udp' but may also be 'tcp' or 'tls'.
  819. ; Using 'udp://' explicitly is also useful in case the username part
  820. ; contains a '/' ('user/name').
  821.  
  822. ;registertimeout=20 ; retry registration calls every 20 seconds (default)
  823. ;registerattempts=10 ; Number of registration attempts before we give up
  824. ; 0 = continue forever, hammering the other server
  825. ; until it accepts the registration
  826. ; Default is 0 tries, continue forever
  827. ;register_retry_403=yes ; Treat 403 responses to registrations as if they were
  828. ; 401 responses and continue retrying according to normal
  829. ; retry rules.
  830.  
  831. ; ---------------------------------------- OUTBOUND MWI SUBSCRIPTIONS -------------------------
  832. ; Asterisk can subscribe to receive the MWI from another SIP server and store it locally for retrieval
  833. ; by other phones. At this time, you can only subscribe using UDP as the transport.
  834. ; Format for the mwi register statement is:
  835. ; mwi => user[:secret[:authuser]]@host[:port]/mailbox
  836. ;
  837. ; Examples:
  838. ;mwi => 1234:password@mysipprovider.com/1234
  839. ;mwi => 1234:password@myportprovider.com:6969/1234
  840. ;mwi => 1234:password:authuser@myauthprovider.com/1234
  841. ;mwi => 1234:password:authuser@myauthportprovider.com:6969/1234
  842. ;
  843. ; MWI received will be stored in the 1234 mailbox of the SIP_Remote context.
  844. ; It can be used by other phones by following the below:
  845. ; mailbox=1234@SIP_Remote
  846. ; ---------------------------------------- NAT SUPPORT ------------------------
  847. ;
  848. ; WARNING: SIP operation behind a NAT is tricky and you really need
  849. ; to read and understand well the following section.
  850. ;
  851. ; When Asterisk is behind a NAT device, the "local" address (and port) that
  852. ; a socket is bound to has different values when seen from the inside or
  853. ; from the outside of the NATted network. Unfortunately this address must
  854. ; be communicated to the outside (e.g. in SIP and SDP messages), and in
  855. ; order to determine the correct value Asterisk needs to know:
  856. ;
  857. ; + whether it is talking to someone "inside" or "outside" of the NATted network.
  858. ; This is configured by assigning the "localnet" parameter with a list
  859. ; of network addresses that are considered "inside" of the NATted network.
  860. ; IF LOCALNET IS NOT SET, THE EXTERNAL ADDRESS WILL NOT BE SET CORRECTLY.
  861. ; Multiple entries are allowed, e.g. a reasonable set is the following:
  862. ;
  863. ; localnet=192.168.0.0/255.255.0.0 ; RFC 1918 addresses
  864. ; localnet=10.0.0.0/255.0.0.0 ; Also RFC1918
  865. ; localnet=172.16.0.0/12 ; Another RFC1918 with CIDR notation
  866. ; localnet=169.254.0.0/255.255.0.0 ; Zero conf local network
  867. ;
  868. ; + the "externally visible" address and port number to be used when talking
  869. ; to a host outside the NAT. This information is derived by one of the
  870. ; following (mutually exclusive) config file parameters:
  871. ;
  872. ; a. "externaddr = hostname[:port]" specifies a static address[:port] to
  873. ; be used in SIP and SDP messages.
  874. ; The hostname is looked up only once, when [re]loading sip.conf .
  875. ; If a port number is not present, use the port specified in the "udpbindaddr"
  876. ; (which is not guaranteed to work correctly, because a NAT box might remap the
  877. ; port number as well as the address).
  878. ; This approach can be useful if you have a NAT device where you can
  879. ; configure the mapping statically. Examples:
  880. ;
  881. ; externaddr = 12.34.56.78 ; use this address.
  882. ; externaddr = 12.34.56.78:9900 ; use this address and port.
  883. ; externaddr = mynat.my.org:12600 ; Public address of my nat box.
  884. ; externtcpport = 9900 ; The externally mapped tcp port, when Asterisk is behind a static NAT or PAT.
  885. ; ; externtcpport will default to the externaddr or externhost port if either one is set.
  886. ; externtlsport = 12600 ; The externally mapped tls port, when Asterisk is behind a static NAT or PAT.
  887. ; ; externtlsport port will default to the RFC designated port of 5061.
  888. ;
  889. ; b. "externhost = hostname[:port]" is similar to "externaddr" except
  890. ; that the hostname is looked up every "externrefresh" seconds
  891. ; (default 10s). This can be useful when your NAT device lets you choose
  892. ; the port mapping, but the IP address is dynamic.
  893. ; Beware, you might suffer from service disruption when the name server
  894. ; resolution fails. Examples:
  895. ;
  896. ; externhost=foo.dyndns.net ; refreshed periodically
  897. ; externrefresh=180 ; change the refresh interval
  898. ;
  899. ; Note that at the moment all these mechanism work only for the SIP socket.
  900. ; The IP address discovered with externaddr/externhost is reused for
  901. ; media sessions as well, but the port numbers are not remapped so you
  902. ; may still experience problems.
  903. ;
  904. ; NOTE 1: in some cases, NAT boxes will use different port numbers in
  905. ; the internal<->external mapping. In these cases, the "externaddr" and
  906. ; "externhost" might not help you configure addresses properly.
  907. ;
  908. ; NOTE 2: when using "externaddr" or "externhost", the address part is
  909. ; also used as the external address for media sessions. Thus, the port
  910. ; information in the SDP may be wrong!
  911. ;
  912. ; In addition to the above, Asterisk has an additional "nat" parameter to
  913. ; address NAT-related issues in incoming SIP or media sessions.
  914. ; In particular, depending on the 'nat= ' settings described below, Asterisk
  915. ; may override the address/port information specified in the SIP/SDP messages,
  916. ; and use the information (sender address) supplied by the network stack instead.
  917. ; However, this is only useful if the external traffic can reach us.
  918. ; The following settings are allowed (both globally and in individual sections):
  919. ;
  920. ; nat = no ; Do no special NAT handling other than RFC3581
  921. ; nat = force_rport ; Pretend there was an rport parameter even if there wasn't
  922. ; nat = comedia ; Send media to the port Asterisk received it from regardless
  923. ; ; of where the SDP says to send it.
  924. ; nat = auto_force_rport ; Set the force_rport option if Asterisk detects NAT (default)
  925. ; nat = auto_comedia ; Set the comedia option if Asterisk detects NAT
  926. ;
  927. ; The nat settings can be combined. For example, to set both force_rport and comedia
  928. ; one would set nat=force_rport,comedia. If any of the comma-separated options is 'no',
  929. ; Asterisk will ignore any other settings and set nat=no. If one of the "auto" settings
  930. ; is used in conjunction with its non-auto counterpart (nat=comedia,auto_comedia), then
  931. ; the non-auto option will be ignored.
  932. ;
  933. ; The RFC 3581-defined 'rport' parameter allows a client to request that Asterisk send
  934. ; SIP responses to it via the source IP and port from which the request originated
  935. ; instead of the address/port listed in the top-most Via header. This is useful if a
  936. ; client knows that it is behind a NAT and therefore cannot guess from what address/port
  937. ; its request will be sent. Asterisk will always honor the 'rport' parameter if it is
  938. ; sent. The force_rport setting causes Asterisk to always send responses back to the
  939. ; address/port from which it received requests; even if the other side doesn't support
  940. ; adding the 'rport' parameter.
  941. ;
  942. ; 'comedia RTP handling' refers to the technique of sending RTP to the port that the
  943. ; the other endpoint's RTP arrived from, and means 'connection-oriented media'. This is
  944. ; only partially related to RFC 4145 which was referred to as COMEDIA while it was in
  945. ; draft form. This method is used to accomodate endpoints that may be located behind
  946. ; NAT devices, and as such the address/port they tell Asterisk to send RTP packets to
  947. ; for their media streams is not the actual address/port that will be used on the nearer
  948. ; side of the NAT.
  949. ;
  950. ; IT IS IMPORTANT TO NOTE that if the nat setting in the general section differs from
  951. ; the nat setting in a peer definition, then the peer username will be discoverable
  952. ; by outside parties as Asterisk will respond to different ports for defined and
  953. ; undefined peers. For this reason it is recommended to ONLY DEFINE NAT SETTINGS IN THE
  954. ; GENERAL SECTION. Specifically, if nat=force_rport in one section and nat=no in the
  955. ; other, then valid peers with settings differing from those in the general section will
  956. ; be discoverable.
  957. ;
  958. ; In addition to these settings, Asterisk *always* uses 'symmetric RTP' mode as defined by
  959. ; RFC 4961; Asterisk will always send RTP packets from the same port number it expects
  960. ; to receive them on.
  961. ;
  962. ; The IP address used for media (audio, video, and text) in the SDP can also be overridden by using
  963. ; the media_address configuration option. This is only applicable to the general section and
  964. ; can not be set per-user or per-peer.
  965. ;
  966. ; media_address = 172.16.42.1
  967. ;
  968. ; Through the use of the res_stun_monitor module, Asterisk has the ability to detect when the
  969. ; perceived external network address has changed. When the stun_monitor is installed and
  970. ; configured, chan_sip will renew all outbound registrations when the monitor detects any sort
  971. ; of network change has occurred. By default this option is enabled, but only takes effect once
  972. ; res_stun_monitor is configured. If res_stun_monitor is enabled and you wish to not
  973. ; generate all outbound registrations on a network change, use the option below to disable
  974. ; this feature.
  975. ;
  976. ; subscribe_network_change_event = yes ; on by default
  977. ;
  978. ; ICE/STUN/TURN usage can be enabled globally or on a per-peer basis using the icesupport
  979. ; configuration option. When set to yes ICE support is enabled. When set to no it is disabled.
  980. ; It is disabled by default.
  981. ;
  982. ; icesupport = yes
  983.  
  984. ; ---------------------------------- MEDIA HANDLING --------------------------------
  985. ; By default, Asterisk tries to re-invite media streams to an optimal path. If there's
  986. ; no reason for Asterisk to stay in the media path, the media will be redirected.
  987. ; This does not really work well in the case where Asterisk is outside and the
  988. ; clients are on the inside of a NAT. In that case, you want to set directmedia=nonat.
  989. ;
  990. ;directmedia=yes ; Asterisk by default tries to redirect the
  991. ; RTP media stream to go directly from
  992. ; the caller to the callee. Some devices do not
  993. ; support this (especially if one of them is behind a NAT).
  994. ; The default setting is YES. If you have all clients
  995. ; behind a NAT, or for some other reason want Asterisk to
  996. ; stay in the audio path, you may want to turn this off.
  997.  
  998. ; This setting also affect direct RTP
  999. ; at call setup (a new feature in 1.4 - setting up the
  1000. ; call directly between the endpoints instead of sending
  1001. ; a re-INVITE).
  1002.  
  1003. ; Additionally this option does not disable all reINVITE operations.
  1004. ; It only controls Asterisk generating reINVITEs for the specific
  1005. ; purpose of setting up a direct media path. If a reINVITE is
  1006. ; needed to switch a media stream to inactive (when placed on
  1007. ; hold) or to T.38, it will still be done, regardless of this
  1008. ; setting. Note that direct T.38 is not supported.
  1009.  
  1010. ;directmedia=nonat ; An additional option is to allow media path redirection
  1011. ; (reinvite) but only when the peer where the media is being
  1012. ; sent is known to not be behind a NAT (as the RTP core can
  1013. ; determine it based on the apparent IP address the media
  1014. ; arrives from).
  1015.  
  1016. ;directmedia=update ; Yet a third option... use UPDATE for media path redirection,
  1017. ; instead of INVITE. This can be combined with 'nonat', as
  1018. ; 'directmedia=update,nonat'. It implies 'yes'.
  1019.  
  1020. ;directmedia=outgoing ; When sending directmedia reinvites, do not send an immediate
  1021. ; reinvite on an incoming call leg. This option is useful when
  1022. ; peered with another SIP user agent that is known to send
  1023. ; immediate direct media reinvites upon call establishment. Setting
  1024. ; the option in this situation helps to prevent potential glares.
  1025. ; Setting this option implies 'yes'.
  1026.  
  1027. ;directrtpsetup=yes ; Enable the new experimental direct RTP setup. This sets up
  1028. ; the call directly with media peer-2-peer without re-invites.
  1029. ; Will not work for video and cases where the callee sends
  1030. ; RTP payloads and fmtp headers in the 200 OK that does not match the
  1031. ; callers INVITE. This will also fail if directmedia is enabled when
  1032. ; the device is actually behind NAT.
  1033.  
  1034. ;directmediadeny=0.0.0.0/0 ; Use directmediapermit and directmediadeny to restrict
  1035. ;directmediapermit=172.16.0.0/16; which peers should be able to pass directmedia to each other
  1036. ; (There is no default setting, this is just an example)
  1037. ; Use this if some of your phones are on IP addresses that
  1038. ; can not reach each other directly. This way you can force
  1039. ; RTP to always flow through asterisk in such cases.
  1040. ;directmediaacl=acl_example ; Use named ACLs defined in acl.conf
  1041.  
  1042. ;ignoresdpversion=yes ; By default, Asterisk will honor the session version
  1043. ; number in SDP packets and will only modify the SDP
  1044. ; session if the version number changes. This option will
  1045. ; force asterisk to ignore the SDP session version number
  1046. ; and treat all SDP data as new data. This is required
  1047. ; for devices that send us non standard SDP packets
  1048. ; (observed with Microsoft OCS). By default this option is
  1049. ; off.
  1050.  
  1051. ;sdpsession=Asterisk PBX ; Allows you to change the SDP session name string, (s=)
  1052. ; Like the useragent parameter, the default user agent string
  1053. ; also contains the Asterisk version.
  1054. ;sdpowner=root ; Allows you to change the username field in the SDP owner string, (o=)
  1055. ; This field MUST NOT contain spaces
  1056. ;encryption=no ; Whether to offer SRTP encrypted media (and only SRTP encrypted media)
  1057. ; on outgoing calls to a peer. Calls will fail with HANGUPCAUSE=58 if
  1058. ; the peer does not support SRTP. Defaults to no.
  1059. ;encryption_taglen=80 ; Set the auth tag length offered in the INVITE either 32/80 default 80
  1060. ;
  1061. ;avpf=yes ; Enable inter-operability with media streams using the AVPF RTP profile.
  1062. ; This will cause all offers and answers to use AVPF (or SAVPF). This
  1063. ; option may be specified at the global or peer scope.
  1064. ;force_avp=yes ; Force 'RTP/AVP', 'RTP/AVPF', 'RTP/SAVP', and 'RTP/SAVPF' to be used for
  1065. ; media streams when appropriate, even if a DTLS stream is present.
  1066. ; ---------------------------------------- REALTIME SUPPORT ------------------------
  1067. ; For additional information on ARA, the Asterisk Realtime Architecture,
  1068. ; please read https://wiki.asterisk.org/wiki/display/AST/Realtime+Database+Configuration
  1069. ;
  1070. ;rtcachefriends=yes ; Cache realtime friends by adding them to the internal list
  1071. ; just like friends added from the config file only on a
  1072. ; as-needed basis? (yes|no)
  1073.  
  1074. ;rtsavesysname=yes ; Save systemname in realtime database at registration
  1075. ; Default= no
  1076.  
  1077. ;rtupdate=yes ; Send registry updates to database using realtime? (yes|no)
  1078. ; If set to yes, when a SIP UA registers successfully, the ip address,
  1079. ; the origination port, the registration period, and the username of
  1080. ; the UA will be set to database via realtime.
  1081. ; If not present, defaults to 'yes'. Note: realtime peers will
  1082. ; probably not function across reloads in the way that you expect, if
  1083. ; you turn this option off.
  1084. ;rtautoclear=yes ; Auto-Expire friends created on the fly on the same schedule
  1085. ; as if it had just registered? (yes|no|<seconds>)
  1086. ; If set to yes, when the registration expires, the friend will
  1087. ; vanish from the configuration until requested again. If set
  1088. ; to an integer, friends expire within this number of seconds
  1089. ; instead of the registration interval.
  1090.  
  1091. ;ignoreregexpire=yes ; Enabling this setting has two functions:
  1092. ;
  1093. ; For non-realtime peers, when their registration expires, the
  1094. ; information will _not_ be removed from memory or the Asterisk database
  1095. ; if you attempt to place a call to the peer, the existing information
  1096. ; will be used in spite of it having expired
  1097. ;
  1098. ; For realtime peers, when the peer is retrieved from realtime storage,
  1099. ; the registration information will be used regardless of whether
  1100. ; it has expired or not; if it expires while the realtime peer
  1101. ; is still in memory (due to caching or other reasons), the
  1102. ; information will not be removed from realtime storage
  1103.  
  1104. ; ---------------------------------------- SIP DOMAIN SUPPORT ------------------------
  1105. ; Incoming INVITE and REFER messages can be matched against a list of 'allowed'
  1106. ; domains, each of which can direct the call to a specific context if desired.
  1107. ; By default, all domains are accepted and sent to the default context or the
  1108. ; context associated with the user/peer placing the call.
  1109. ; REGISTER to non-local domains will be automatically denied if a domain
  1110. ; list is configured.
  1111. ;
  1112. ; Domains can be specified using:
  1113. ; domain=<domain>[,<context>]
  1114. ; Examples:
  1115. ; domain=myasterisk.dom
  1116. ; domain=customer.com,customer-context
  1117. ;
  1118. ; In addition, all the 'default' domains associated with a server should be
  1119. ; added if incoming request filtering is desired.
  1120. ; autodomain=yes
  1121. ;
  1122. ; To disallow requests for domains not serviced by this server:
  1123. ; allowexternaldomains=no
  1124.  
  1125. ;domain=mydomain.tld,mydomain-incoming
  1126. ; Add domain and configure incoming context
  1127. ; for external calls to this domain
  1128. ;domain=1.2.3.4 ; Add IP address as local domain
  1129. ; You can have several "domain" settings
  1130. ;allowexternaldomains=no ; Disable INVITE and REFER to non-local domains
  1131. ; Default is yes
  1132. ;autodomain=yes ; Turn this on to have Asterisk add local host
  1133. ; name and local IP to domain list.
  1134.  
  1135. ; fromdomain=mydomain.tld ; When making outbound SIP INVITEs to
  1136. ; non-peers, use your primary domain "identity"
  1137. ; for From: headers instead of just your IP
  1138. ; address. This is to be polite and
  1139. ; it may be a mandatory requirement for some
  1140. ; destinations which do not have a prior
  1141. ; account relationship with your server.
  1142.  
  1143. ; ----------------------------- Advice of Charge CONFIGURATION --------------------------
  1144. ; snom_aoc_enabled = yes; ; This options turns on and off support for sending AOC-D and
  1145. ; AOC-E to snom endpoints. This option can be used both in the
  1146. ; peer and global scope. The default for this option is off.
  1147.  
  1148.  
  1149. ; ----------------------------- JITTER BUFFER CONFIGURATION --------------------------
  1150. ; jbenable = yes ; Enables the use of a jitterbuffer on the receiving side of a
  1151. ; SIP channel. Defaults to "no". An enabled jitterbuffer will
  1152. ; be used only if the sending side can create and the receiving
  1153. ; side can not accept jitter. The SIP channel can accept jitter,
  1154. ; thus a jitterbuffer on the receive SIP side will be used only
  1155. ; if it is forced and enabled.
  1156.  
  1157. ; jbforce = no ; Forces the use of a jitterbuffer on the receive side of a SIP
  1158. ; channel. Defaults to "no".
  1159.  
  1160. ; jbmaxsize = 200 ; Max length of the jitterbuffer in milliseconds.
  1161.  
  1162. ; jbresyncthreshold = 1000 ; Jump in the frame timestamps over which the jitterbuffer is
  1163. ; resynchronized. Useful to improve the quality of the voice, with
  1164. ; big jumps in/broken timestamps, usually sent from exotic devices
  1165. ; and programs. Defaults to 1000.
  1166.  
  1167. ; jbimpl = fixed ; Jitterbuffer implementation, used on the receiving side of a SIP
  1168. ; channel. Two implementations are currently available - "fixed"
  1169. ; (with size always equals to jbmaxsize) and "adaptive" (with
  1170. ; variable size, actually the new jb of IAX2). Defaults to fixed.
  1171.  
  1172. ; jbtargetextra = 40 ; This option only affects the jb when 'jbimpl = adaptive' is set.
  1173. ; The option represents the number of milliseconds by which the new jitter buffer
  1174. ; will pad its size. the default is 40, so without modification, the new
  1175. ; jitter buffer will set its size to the jitter value plus 40 milliseconds.
  1176. ; increasing this value may help if your network normally has low jitter,
  1177. ; but occasionally has spikes.
  1178.  
  1179. ; jblog = no ; Enables jitterbuffer frame logging. Defaults to "no".
  1180.  
  1181. ; ----------------------------------------------------------------------------------
  1182. register => interface_9777@trunk-sip
  1183.  
  1184. [authentication]
  1185. ; Global credentials for outbound calls, i.e. when a proxy challenges your
  1186. ; Asterisk server for authentication. These credentials override
  1187. ; any credentials in peer/register definition if realm is matched.
  1188. ;
  1189. ; This way, Asterisk can authenticate for outbound calls to other
  1190. ; realms. We match realm on the proxy challenge and pick an set of
  1191. ; credentials from this list
  1192. ; Syntax:
  1193. ; auth = <user>:<secret>@<realm>
  1194. ; auth = <user>#<md5secret>@<realm>
  1195. ; Example:
  1196. ;auth=mark:topsecret@digium.com
  1197. ;
  1198. ; You may also add auth= statements to [peer] definitions
  1199. ; Peer auth= override all other authentication settings if we match on realm
  1200.  
  1201. ; -----------------------------------------------------------------------------
  1202. ; DEVICE CONFIGURATION
  1203. ;
  1204. ; SIP entities have a 'type' which determines their roles within Asterisk.
  1205. ; * For entities with 'type=peer':
  1206. ; Peers handle both inbound and outbound calls and are matched by ip/port, so for
  1207. ; The case of incoming calls from the peer, the IP address must match in order for
  1208. ; The invitation to work. This means calls made from either direction won't work if
  1209. ; The peer is unregistered while host=dynamic or if the host is otherise not set to
  1210. ; the correct IP of the sender.
  1211. ; * For entities with 'type=user':
  1212. ; Asterisk users handle inbound calls only (meaning they call Asterisk, Asterisk can't
  1213. ; call them) and are matched by their authorization information (authname and secret).
  1214. ; Asterisk doesn't rely on their IP and will accept calls regardless of the host setting
  1215. ; as long as the incoming SIP invite authorizes successfully.
  1216. ; * For entities with 'type=friend':
  1217. ; Asterisk will create the entity as both a friend and a peer. Asterisk will accept
  1218. ; calls from friends like it would for users, requiring only that the authorization
  1219. ; matches rather than the IP address. Since it is also a peer, a friend entity can
  1220. ; be called as long as its IP is known to Asterisk. In the case of host=dynamic,
  1221. ; this means it is necessary for the entity to register before Asterisk can call it.
  1222. ;
  1223. ; Use remotesecret for outbound authentication, and secret for authenticating
  1224. ; inbound requests. For historical reasons, if no remotesecret is supplied for an
  1225. ; outbound registration or call, the secret will be used.
  1226. ;
  1227. ; For device names, we recommend using only a-z, numerics (0-9) and underscore
  1228. ;
  1229. ; For local phones, type=friend works most of the time
  1230. ;
  1231. ; If you have one-way audio, you probably have NAT problems.
  1232. ; If Asterisk is on a public IP, and the phone is inside of a NAT device
  1233. ; you will need to configure nat option for those phones.
  1234. ; Also, turn on qualify=yes to keep the nat session open
  1235. ;
  1236. ; Configuration options available
  1237. ; --------------------
  1238. ; context
  1239. ; callingpres
  1240. ; permit
  1241. ; deny
  1242. ; secret
  1243. ; md5secret
  1244. ; remotesecret
  1245. ; transport
  1246. ; dtmfmode
  1247. ; directmedia
  1248. ; nat
  1249. ; callgroup
  1250. ; pickupgroup
  1251. ; language
  1252. ; allow
  1253. ; disallow
  1254. ; autoframing
  1255. ; insecure
  1256. ; trustrpid
  1257. ; trust_id_outbound
  1258. ; progressinband
  1259. ; promiscredir
  1260. ; useclientcode
  1261. ; accountcode
  1262. ; setvar
  1263. ; callerid
  1264. ; amaflags
  1265. ; callcounter
  1266. ; busylevel
  1267. ; allowoverlap
  1268. ; allowsubscribe
  1269. ; allowtransfer
  1270. ; ignoresdpversion
  1271. ; subscribecontext
  1272. ; template
  1273. ; videosupport
  1274. ; maxcallbitrate
  1275. ; rfc2833compensate
  1276. ; Note: app_voicemail mailboxes must be in the form of mailbox@context.
  1277. ; mailbox
  1278. ; session-timers
  1279. ; session-expires
  1280. ; session-minse
  1281. ; session-refresher
  1282. ; t38pt_usertpsource
  1283. ; regexten
  1284. ; fromdomain
  1285. ; fromuser
  1286. ; host
  1287. ; port
  1288. ; qualify
  1289. ; keepalive
  1290. ; defaultip
  1291. ; defaultuser
  1292. ; rtptimeout
  1293. ; rtpholdtimeout
  1294. ; sendrpid
  1295. ; outboundproxy
  1296. ; rfc2833compensate
  1297. ; callbackextension
  1298. ; timert1
  1299. ; timerb
  1300. ; qualifyfreq
  1301. ; t38pt_usertpsource
  1302. ; contactpermit ; Limit what a host may register as (a neat trick
  1303. ; contactdeny ; is to register at the same IP as a SIP provider,
  1304. ; contactacl ; then call oneself, and get redirected to that
  1305. ; ; same location).
  1306. ; directmediapermit
  1307. ; directmediadeny
  1308. ; directmediaacl
  1309. ; unsolicited_mailbox
  1310. ; use_q850_reason
  1311. ; maxforwards
  1312. ; encryption
  1313. ; description ; Used to provide a description of the peer in console output
  1314. ; dtlsenable
  1315. ; dtlsverify
  1316. ; dtlsrekey
  1317. ; dtlscertfile
  1318. ; dtlsprivatekey
  1319. ; dtlscipher
  1320. ; dtlscafile
  1321. ; dtlscapath
  1322. ; dtlssetup
  1323. ; dtlsfingerprint
  1324. ; ignore_requested_pref ; Ignore the requested codec and determine the preferred codec
  1325. ; ; from the peer's configuration.
  1326. ;
  1327.  
  1328. ; -----------------------------------------------------------------------------
  1329. ; DTLS-SRTP CONFIGURATION
  1330. ;
  1331. ; DTLS-SRTP support is available if the underlying RTP engine in use supports it.
  1332. ;
  1333. ; dtlsenable = yes ; Enable or disable DTLS-SRTP support
  1334. ; dtlsverify = yes ; Verify that provided peer certificate and fingerprint are valid
  1335. ; ; A value of 'yes' will perform both certificate and fingerprint verification
  1336. ; ; A value of 'no' will perform no certificate or fingerprint verification
  1337. ; ; A value of 'fingerprint' will perform ONLY fingerprint verification
  1338. ; ; A value of 'certificate' will perform ONLY certficiate verification
  1339. ; dtlsrekey = 60 ; Interval at which to renegotiate the TLS session and rekey the SRTP session
  1340. ; ; If this is not set or the value provided is 0 rekeying will be disabled
  1341. ; dtlscertfile = file ; Path to certificate file to present
  1342. ; dtlsprivatekey = file ; Path to private key for certificate file
  1343. ; dtlscipher = <SSL cipher string> ; Cipher to use for TLS negotiation
  1344. ; ; A list of valid SSL cipher strings can be found at:
  1345. ; ; http://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS
  1346. ; dtlscafile = file ; Path to certificate authority certificate
  1347. ; dtlscapath = path ; Path to a directory containing certificate authority certificates
  1348. ; dtlssetup = actpass ; Whether we are willing to accept connections, connect to the other party, or both.
  1349. ; ; Valid options are active (we want to connect to the other party), passive (we want to
  1350. ; ; accept connections only), and actpass (we will do both). This value will be used in
  1351. ; ; the outgoing SDP when offering and for incoming SDP offers when the remote party sends
  1352. ; ; actpass
  1353. ; dtlsfingerprint = sha-1 ; The hash to use for the fingerprint in SDP (valid options are sha-1 and sha-256)
  1354.  
  1355. ;[sip_proxy]
  1356. ; For incoming calls only. Example: FWD (Free World Dialup)
  1357. ; We match on IP address of the proxy for incoming calls
  1358. ; since we can not match on username (caller id)
  1359. ;type=peer
  1360. ;context=from-fwd
  1361. ;host=fwd.pulver.com
  1362.  
  1363. ;[sip_proxy-out]
  1364. ;type=peer ; we only want to call out, not be called
  1365. ;remotesecret=guessit ; Our password to their service
  1366. ;defaultuser=yourusername ; Authentication user for outbound proxies
  1367. ;fromuser=yourusername ; Many SIP providers require this!
  1368. ;fromdomain=provider.sip.domain
  1369. ;host=box.provider.com
  1370. ;transport=udp,tcp ; This sets the default transport type to udp for outgoing, and will
  1371. ; ; accept both tcp and udp. The default transport type is only used for
  1372. ; ; outbound messages until a Registration takes place. During the
  1373. ; ; peer Registration the transport type may change to another supported
  1374. ; ; type if the peer requests so.
  1375.  
  1376. ;usereqphone=yes ; This provider requires ";user=phone" on URI
  1377. ;callcounter=yes ; Enable call counter
  1378. ;busylevel=2 ; Signal busy at 2 or more calls
  1379. ;outboundproxy=proxy.provider.domain ; send outbound signaling to this proxy, not directly to the peer
  1380. ;port=80 ; The port number we want to connect to on the remote side
  1381. ; Also used as "defaultport" in combination with "defaultip" settings
  1382.  
  1383. ; -- sample definition for a provider
  1384. ;[provider1]
  1385. ;type=peer
  1386. ;host=sip.provider1.com
  1387. ;fromuser=4015552299 ; how your provider knows you
  1388. ;remotesecret=youwillneverguessit ; The password we use to authenticate to them
  1389. ;secret=gissadetdu ; The password they use to contact us
  1390. ;callbackextension=123 ; Register with this server and require calls coming back to this extension
  1391. ;transport=udp,tcp ; This sets the transport type to udp for outgoing, and will
  1392. ; ; accept both tcp and udp. Default is udp. The first transport
  1393. ; ; listed will always be used for outgoing connections.
  1394. ;unsolicited_mailbox=4015552299 ; If the remote SIP server sends an unsolicited MWI NOTIFY message the new/old
  1395. ; ; message count will be stored in the configured virtual mailbox. It can be used
  1396. ; ; by any device supporting MWI by specifying <configured value>@SIP_Remote as the
  1397. ; ; mailbox.
  1398.  
  1399. ;
  1400. ; Because you might have a large number of similar sections, it is generally
  1401. ; convenient to use templates for the common parameters, and add them
  1402. ; the the various sections. Examples are below, and we can even leave
  1403. ; the templates uncommented as they will not harm:
  1404.  
  1405. [basic-options](!) ; a template
  1406. dtmfmode=rfc2833
  1407. context=from-office
  1408. type=friend
  1409.  
  1410. [natted-phone](!,basic-options) ; another template inheriting basic-options
  1411. directmedia=no
  1412. host=dynamic
  1413.  
  1414. [public-phone](!,basic-options) ; another template inheriting basic-options
  1415. directmedia=yes
  1416.  
  1417. [my-codecs](!) ; a template for my preferred codecs
  1418. disallow=all
  1419. allow=ilbc
  1420. allow=g729
  1421. allow=gsm
  1422. allow=g723
  1423. allow=ulaw
  1424. ; Or, more simply:
  1425. ;allow=!all,ilbc,g729,gsm,g723,ulaw
  1426.  
  1427. [ulaw-phone](!) ; and another one for ulaw-only
  1428. disallow=all
  1429. allow=ulaw
  1430. ; Again, more simply:
  1431. ;allow=!all,ulaw
  1432.  
  1433. ; and finally instantiate a few phones
  1434. ;
  1435. ; [2133](natted-phone,my-codecs)
  1436. ; secret = peekaboo
  1437. ; [2134](natted-phone,ulaw-phone)
  1438. ; secret = not_very_secret
  1439. ; [2136](public-phone,ulaw-phone)
  1440. ; secret = not_very_secret_either
  1441. ; ...
  1442. ;
  1443.  
  1444. ; Standard configurations not using templates look like this:
  1445. ;
  1446. ;[grandstream1]
  1447. ;type=friend
  1448. ;context=from-sip ; Where to start in the dialplan when this phone calls
  1449. ;recordonfeature=dynamicfeature1 ; Feature to use when INFO with Record: on is received.
  1450. ;recordofffeature=dynamicfeature2 ; Feature to use when INFO with Record: off is received.
  1451. ;callerid=John Doe <1234> ; Full caller ID, to override the phones config
  1452. ; on incoming calls to Asterisk
  1453. ;description=Courtesy Phone ; Description of the peer. Shown when doing 'sip show peers'.
  1454. ;host=192.168.0.23 ; we have a static but private IP address
  1455. ; No registration allowed
  1456. ;directmedia=yes ; allow RTP voice traffic to bypass Asterisk
  1457. ;dtmfmode=info ; either RFC2833 or INFO for the BudgeTone
  1458. ;call-limit=1 ; permit only 1 outgoing call and 1 incoming call at a time
  1459. ; from the phone to asterisk (deprecated)
  1460. ; 1 for the explicit peer, 1 for the explicit user,
  1461. ; remember that a friend equals 1 peer and 1 user in
  1462. ; memory
  1463. ; There is no combined call counter for a "friend"
  1464. ; so there's currently no way in sip.conf to limit
  1465. ; to one inbound or outbound call per phone. Use
  1466. ; the group counters in the dial plan for that.
  1467. ;
  1468. ;mailbox=1234@default ; mailbox 1234 in voicemail context "default"
  1469. ;disallow=all ; need to disallow=all before we can use allow=
  1470. ;allow=ulaw ; Note: In user sections the order of codecs
  1471. ; listed with allow= does NOT matter!
  1472. ;allow=alaw
  1473. ;allow=g723.1 ; Asterisk only supports g723.1 pass-thru!
  1474. ;allow=g729 ; Pass-thru only unless g729 license obtained
  1475. ;callingpres=allowed_passed_screen ; Set caller ID presentation
  1476. ; See function CALLERPRES documentation for possible
  1477. ; values.
  1478.  
  1479. ;[xlite1]
  1480. ; Turn off silence suppression in X-Lite ("Transmit Silence"=YES)!
  1481. ; Note that Xlite sends NAT keep-alive packets, so qualify=yes is not needed
  1482. ;type=friend
  1483. ;regexten=1234 ; When they register, create extension 1234
  1484. ;callerid="Jane Smith" <5678>
  1485. ;host=dynamic ; This device needs to register
  1486. ;directmedia=no ; Typically set to NO if behind NAT
  1487. ;disallow=all
  1488. ;allow=gsm ; GSM consumes far less bandwidth than ulaw
  1489. ;allow=ulaw
  1490. ;allow=alaw
  1491. ;mailbox=1234@default,1233@default ; Subscribe to status of multiple mailboxes
  1492.  
  1493. ;[snom]
  1494. ;type=friend ; Friends place calls and receive calls
  1495. ;context=from-sip ; Context for incoming calls from this user
  1496. ;secret=blah
  1497. ;subscribecontext=localextensions ; Only allow SUBSCRIBE for local extensions
  1498. ;language=de ; Use German prompts for this user
  1499. ;host=dynamic ; This peer register with us
  1500. ;dtmfmode=inband ; Choices are inband, rfc2833, or info
  1501. ;defaultip=192.168.0.59 ; IP used until peer registers
  1502. ;mailbox=1234@context,2345@context ; Mailbox(-es) for message waiting indicator
  1503. ;subscribemwi=yes ; Only send notifications if this phone
  1504. ; subscribes for mailbox notification
  1505. ;vmexten=voicemail ; dialplan extension to reach mailbox
  1506. ; sets the Message-Account in the MWI notify message
  1507. ; defaults to global vmexten which defaults to "asterisk"
  1508. ;disallow=all
  1509. ;allow=ulaw ; dtmfmode=inband only works with ulaw or alaw!
  1510.  
  1511.  
  1512. ;[polycom]
  1513. ;type=friend ; Friends place calls and receive calls
  1514. ;context=from-sip ; Context for incoming calls from this user
  1515. ;secret=blahpoly
  1516. ;host=dynamic ; This peer register with us
  1517. ;dtmfmode=rfc2833 ; Choices are inband, rfc2833, or info
  1518. ;defaultuser=polly ; Username to use in INVITE until peer registers
  1519. ;defaultip=192.168.40.123
  1520. ; Normally you do NOT need to set this parameter
  1521. ;disallow=all
  1522. ;allow=ulaw ; dtmfmode=inband only works with ulaw or alaw!
  1523. ;progressinband=no ; Polycom phones don't work properly with "never"
  1524.  
  1525.  
  1526. ;[pingtel]
  1527. ;type=friend
  1528. ;secret=blah
  1529. ;host=dynamic
  1530. ;insecure=port ; Allow matching of peer by IP address without
  1531. ; matching port number
  1532. ;insecure=invite ; Do not require authentication of incoming INVITEs
  1533. ;insecure=port,invite ; (both)
  1534. ;qualify=1000 ; Consider it down if it's 1 second to reply
  1535. ; Helps with NAT session
  1536. ; qualify=yes uses default value
  1537. ;qualifyfreq=60 ; Qualification: How often to check for the
  1538. ; host to be up in seconds
  1539. ; Set to low value if you use low timeout for
  1540. ; NAT of UDP sessions
  1541. ;
  1542. ; Call group and Pickup group should be in the range from 0 to 63
  1543. ;
  1544. ;callgroup=1,3-4 ; We are in caller groups 1,3,4
  1545. ;pickupgroup=1,3-5 ; We can do call pick-p for call group 1,3,4,5
  1546. ;namedcallgroup=engineering,sales,netgroup,protgroup ; We are in named call groups engineering,sales,netgroup,protgroup
  1547. ;namedpickupgroup=sales ; We can do call pick-p for named call group sales
  1548. ;defaultip=192.168.0.60 ; IP address to use if peer has not registered
  1549. ;deny=0.0.0.0/0.0.0.0 ; ACL: Control access to this account based on IP address
  1550. ;permit=192.168.0.60/255.255.255.0
  1551. ;permit=192.168.0.60/24 ; we can also use CIDR notation for subnet masks
  1552. ;permit=2001:db8::/32 ; IPv6 ACLs can be specified if desired. IPv6 ACLs
  1553. ; apply only to IPv6 addresses, and IPv4 ACLs apply
  1554. ; only to IPv4 addresses.
  1555. ;acl=named_acl_example ; Use named ACLs defined in acl.conf
  1556.  
  1557. ;[cisco1]
  1558. ;type=friend
  1559. ;secret=blah
  1560. ;qualify=200 ; Qualify peer is no more than 200ms away
  1561. ;host=dynamic ; This device registers with us
  1562. ;directmedia=no ; Asterisk by default tries to redirect the
  1563. ; RTP media stream (audio) to go directly from
  1564. ; the caller to the callee. Some devices do not
  1565. ; support this (especially if one of them is
  1566. ; behind a NAT).
  1567. ;defaultip=192.168.0.4 ; IP address to use until registration
  1568. ;defaultuser=goran ; Username to use when calling this device before registration
  1569. ; Normally you do NOT need to set this parameter
  1570. ;setvar=CUSTID=5678 ; Channel variable to be set for all calls from or to this device
  1571. ;setvar=ATTENDED_TRANSFER_COMPLETE_SOUND=beep ; This channel variable will
  1572. ; cause the given audio file to
  1573. ; be played upon completion of
  1574. ; an attended transfer to the
  1575. ; target of the transfer.
  1576.  
  1577. ;[pre14-asterisk]
  1578. ;type=friend
  1579. ;secret=digium
  1580. ;host=dynamic
  1581. ;rfc2833compensate=yes ; Compensate for pre-1.4 DTMF transmission from another Asterisk machine.
  1582. ; You must have this turned on or DTMF reception will work improperly.
  1583. ;t38pt_usertpsource=yes ; Use the source IP address of RTP as the destination IP address for UDPTL packets
  1584. ; if the nat option is enabled. If a single RTP packet is received Asterisk will know the
  1585. ; external IP address of the remote device. If port forwarding is done at the client side
  1586. ; then UDPTL will flow to the remote device.
  1587. [3001]
  1588. type=friend
  1589. host=dynamic
  1590. username=3001
  1591. secret=password3001
  1592. callerid="motorola" <3001>
  1593. context=extensiones-internas
  1594. canreinvite=no
  1595.  
  1596. [3002]
  1597. type=friend
  1598. host=dynamic
  1599. username=3002
  1600. secret=password3002
  1601. callerid="lg" <3002>
  1602. context=extensiones-internas
  1603. canreinvite=no
  1604.  
  1605. [trunk-sip]
  1606. type=peer
  1607. host=sbctest.interface.ca
  1608. fromdomain=sbctest.interface.ca
  1609. username=interface_9777
  1610. secret=asterisk2010
  1611. insecure=port,invite
  1612. context=callin-sip
  1613. canreinvite=no
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement