=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2006.11.17 07:33:51 =~=~=~=~=~=~=~=~=~=~=~= <--- SIP read from 192.168.4.196:5060 ---> NOTIFY sip:192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.196:5060;branch=z9hG4bK-80fb8e24 From: Ronald Chan ;tag=85efec10992fb7e7o0 To: Call-ID: 14b36900-afc0dfb7@192.168.4.196 CSeq: 8032 NOTIFY Max-Forwards: 70 Event: keep-alive User-Agent: Linksys/PAP2-3.1.3(LS) Content-Length: 0 <-------------> --- (10 headers 0 lines) --- <--- Transmitting (no NAT) to 192.168.4.196:5060 ---> SIP/2.0 489 Bad event Via: SIP/2.0/UDP 192.168.4.196:5060;branch=z9hG4bK-80fb8e24;received=192.168.4.196 From: Ronald Chan ;tag=85efec10992fb7e7o0 To: ;tag=as0d70c617 Call-ID: 14b36900-afc0dfb7@192.168.4.196 CSeq: 8032 NOTIFY User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 <------------> stealth*CLI> <--- SIP read from 192.168.4.197:5060 ---> INVITE sip:204@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK372EF21156D512BEC3ACCC0AB84CC36E;rport From: "Fax1" ;tag=1163720036 To: Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b Supported: timer, replaces CSeq: 1 INVITE Max-Forwards: 70 Session-Expires: 1800;refresher=uac Content-Type: application/sdp Content-Length: 467 v=0 o=203 1163720003 1163720035 IN IP4 192.168.4.197 s=Kapanga [1163720003] c=IN IP4 192.168.4.197 t=0 0 m=audio 5100 RTP/AVP 0 8 101 a=rtpmap:0 pcmu/8000 a=sendrecv a=silenceSupp:off - - - a=maxptime:20 a=ptime:20 a=rtpmap:8 pcma/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15,36 m=video 5102 RTP/AVP 34 98 a=rtpmap:34 h263/90000 a=fmtp:34 QCIF=2 a=sendrecv a=rtpmap:98 theora/90000 a=fmtp:98 sampling=YCbCr-4:2:0; width=176, height=144; <-------------> --- (13 headers 20 lines) --- Sending to 192.168.4.197 : 5060 (NAT) Using INVITE request as basis request - 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 <--- Reliably Transmitting (NAT) to 192.168.4.197:5060 ---> SIP/2.0 407 Proxy Authentication Required Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK372EF21156D512BEC3ACCC0AB84CC36E;received=192.168.4.197;rport=5060 From: "Fax1" ;tag=1163720036 To: ;tag=as10986c61 Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 1 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Proxy-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31b29c2c" Content-Length: 0 <------------> Scheduling destruction of SIP dialog '9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1' in 32000 ms (Method: INVITE) Found user '203' stealth*CLI> <--- SIP read from 192.168.4.197:5060 ---> ACK sip:204@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK372EF21156D512BEC3ACCC0AB84CC36E;rport From: "Fax1" ;tag=1163720036 To: ;tag=as10986c61 Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 Proxy-Authorization: Digest username="203",realm="asterisk",nonce="31b29c2c",response="87fec7b0c55c94d069ef5d9cc8356fd5",uri="sip:204@192.168.4.1",algorithm=MD5 User-Agent: Kapanga Softphone Desktop 1.00/2151b CSeq: 1 ACK Max-Forwards: 70 Content-Length: 0 <-------------> --- (11 headers 0 lines) --- <--- SIP read from 192.168.4.197:5060 ---> INVITE sip:204@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK74C3C977FB644733A83B7A2326B2E1CB;rport From: "Fax1" ;tag=1163720036 To: Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 Proxy-Authorization: Digest username="203",realm="asterisk",nonce="31b29c2c",response="87fec7b0c55c94d069ef5d9cc8356fd5",uri="sip:204@192.168.4.1",algorithm=MD5 User-Agent: Kapanga Softphone Desktop 1.00/2151b Supported: timer, replaces CSeq: 2 INVITE Max-Forwards: 70 Session-Expires: 1800;refresher=uac Content-Type: application/sdp Content-Length: 467 v=0 o=203 1163720003 1163720036 IN IP4 192.168.4.197 s=Kapanga [1163720003] c=IN IP4 192.168.4.197 t=0 0 m=audio 5100 RTP/AVP 0 8 101 a=rtpmap:0 pcmu/8000 a=sendrecv a=silenceSupp:off - - - a=maxptime:20 a=ptime:20 a=rtpmap:8 pcma/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15,36 m=video 5102 RTP/AVP 34 98 a=rtpmap:34 h263/90000 a=fmtp:34 QCIF=2 a=sendrecv a=rtpmap:98 theora/90000 a=fmtp:98 sampling=YCbCr-4:2:0; width=176, height=144; <-------------> --- (14 headers 20 lines) --- Sending to 192.168.4.197 : 5060 (NAT) Using INVITE request as basis request - 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 stealth*CLI> Found user '203' Found RTP audio format 0 Found RTP audio format 8 Found RTP audio format 101 Found RTP video format 34 Found RTP video format 98 Peer audio RTP is at port 192.168.4.197:5100 Found description format pcmu for ID 0 Found description format pcma for ID 8 Found description format telephone-event for ID 101 Got unsupported a:fmtp in SDP offer Found description format h263 for ID 34 Got unsupported a:fmtp in SDP offer Found description format theora for ID 98 Got unsupported a:fmtp in SDP offer Capabilities: us - 0xc (ulaw|alaw), peer - audio=0x8000c (ulaw|alaw|h263)/video=0x80000 (h263), combined - 0xc (ulaw|alaw) Non-codec capabilities (dtmf): us - 0x1 (telephone-event), peer - 0x1 (telephone-event), combined - 0x1 (telephone-event) Peer audio RTP is at port 192.168.4.197:5100 Looking for 204 in internal (domain 192.168.4.1) list_route: hop: <--- Transmitting (NAT) to 192.168.4.197:5060 ---> SIP/2.0 100 Trying Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK74C3C977FB644733A83B7A2326B2E1CB;received=192.168.4.197;rport=5060 From: "Fax1" ;tag=1163720036 To: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 2 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Contact: Content-Length: 0 <------------> stealth*CLI> -- Executing [204@internal:1] Macro("SIP/203-08ff1f68", "extensions|Sip|204") in new stack stealth*CLI> -- Executing [s@macro-extensions:1] GotoIf("SIP/203-08ff1f68", "0?s|intercom") in new stack stealth*CLI> -- Executing [s@macro-extensions:2] GotoIf("SIP/203-08ff1f68", "0?s|intercom:s|outgoing") in new stack stealth*CLI> -- Goto (macro-extensions,s,3) stealth*CLI> -- Executing [s@macro-extensions:3] Set("SIP/203-08ff1f68", "CALLFILE=OUTGOING-CALL/204--1163720058.16.wav") in new stack stealth*CLI> -- Executing [s@macro-extensions:4] Goto("SIP/203-08ff1f68", "s|mixnow") in new stack stealth*CLI> -- Goto (macro-extensions,s,6) stealth*CLI> -- Executing [s@macro-extensions:6] MixMonitor("SIP/203-08ff1f68", "OUTGOING-CALL/204--1163720058.16.wav|bW(1)") in new stack stealth*CLI> -- Executing [s@macro-extensions:7] Playback("SIP/203-08ff1f68", "pls-wait-connect-call") in new stack stealth*CLI> Audio is at 192.168.4.1 port 14288 stealth*CLI> Adding codec 0x4 (ulaw) to SDP stealth*CLI> Adding codec 0x8 (alaw) to SDP stealth*CLI> Adding non-codec 0x1 (telephone-event) to SDP stealth*CLI> <--- Reliably Transmitting (NAT) to 192.168.4.197:5060 ---> SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK74C3C977FB644733A83B7A2326B2E1CB;received=192.168.4.197;rport=5060 From: "Fax1" ;tag=1163720036 To: ;tag=as202dac36 Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 2 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Contact: Content-Type: application/sdp Content-Length: 260 v=0 o=root 2886 2886 IN IP4 192.168.4.1 s=session c=IN IP4 192.168.4.1 t=0 0 m=audio 14288 RTP/AVP 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 a=silenceSupp:off - - - - a=ptime:20 a=sendrecv <------------> stealth*CLI> -- Playing 'pls-wait-connect-call' (language 'en') stealth*CLI> == Begin MixMonitor Recording SIP/203-08ff1f68 stealth*CLI> <--- SIP read from 192.168.4.197:5060 ---> ACK sip:204@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK791981C817E64BC64FEFCABA4C614BC1;rport From: "Fax1" ;tag=1163720036 To: ;tag=as202dac36 Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 Proxy-Authorization: Digest username="203",realm="asterisk",nonce="31b29c2c",response="87fec7b0c55c94d069ef5d9cc8356fd5",uri="sip:204@192.168.4.1",algorithm=MD5 User-Agent: Kapanga Softphone Desktop 1.00/2151b CSeq: 2 ACK Max-Forwards: 70 Content-Length: 0 <-------------> --- (11 headers 0 lines) --- stealth*CLI> Really destroying SIP dialog 'AF31146480AB653D6596B1B2C197C594@192.168.4.1' Method: REGISTER stealth*CLI> -- Executing [s@macro-extensions:8] Dial("SIP/203-08ff1f68", "Sip/204|120|tH") in new stack Audio is at 192.168.4.1 port 10702 Adding codec 0x4 (ulaw) to SDP Adding codec 0x8 (alaw) to SDP Adding non-codec 0x1 (telephone-event) to SDP Reliably Transmitting (NAT) to 192.168.4.4:5060: INVITE sip:204@192.168.4.4:5060 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK6b532617;rport From: "Fax1" ;tag=as37527ee7 To: Contact: Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 102 INVITE User-Agent: Asterisk PBX Max-Forwards: 70 Date: Thu, 16 Nov 2006 23:34:20 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Type: application/sdp Content-Length: 260 v=0 o=root 2886 2886 IN IP4 192.168.4.1 s=session c=IN IP4 192.168.4.1 t=0 0 m=audio 10702 RTP/AVP 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 a=silenceSupp:off - - - - a=ptime:20 a=sendrecv --- -- Called 204 stealth*CLI> <--- SIP read from 192.168.4.4:5060 ---> SIP/2.0 100 Trying Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK6b532617;rport=5060;received=192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b From: "Fax1" ;tag=as37527ee7 To: ;tag=1163720037 Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 102 INVITE Contact: Supported: timer, replaces Content-Length: 0 <-------------> --- (10 headers 0 lines) --- stealth*CLI> <--- SIP read from 192.168.4.4:5060 ---> SIP/2.0 180 Ringing Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK6b532617 User-Agent: Kapanga Softphone Desktop 1.00/2151b From: "Fax1" ;tag=as37527ee7 To: ;tag=1163720037 Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 102 INVITE Contact: Supported: timer, replaces Content-Length: 0 <-------------> --- (10 headers 0 lines) --- stealth*CLI> -- SIP/204-08ff34e8 is ringing stealth*CLI> <--- SIP read from 192.168.4.4:5060 ---> SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK6b532617;rport=5060;received=192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b From: "Fax1" ;tag=as37527ee7 To: ;tag=1163720037 Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 102 INVITE Contact: Supported: timer, replaces Session-Expires: 1800;refresher=uac Content-Type: application/sdp Content-Length: 272 v=0 o=204 1163720023 1163720036 IN IP4 192.168.4.4 s=Kapanga [1163720023] c=IN IP4 192.168.4.4 t=0 0 m=audio 5100 RTP/AVP 0 101 a=rtpmap:0 PCMU/8000 a=sendrecv a=silenceSupp:off - - - a=maxptime:20 a=ptime:20 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 <-------------> --- (12 headers 13 lines) --- Found RTP audio format 0 Found RTP audio format 101 Peer audio RTP is at port 192.168.4.4:5100 Found description format PCMU for ID 0 Found description format telephone-event for ID 101 Got unsupported a:fmtp in SDP offer Capabilities: us - 0xc (ulaw|alaw), peer - audio=0x4 (ulaw)/video=0x0 (nothing), combined - 0x4 (ulaw) Non-codec capabilities (dtmf): us - 0x1 (telephone-event), peer - 0x1 (telephone-event), combined - 0x1 (telephone-event) Peer audio RTP is at port 192.168.4.4:5100 list_route: hop: set_destination: Parsing for address/port to send to set_destination: set destination to 192.168.4.4, port 5060 Transmitting (NAT) to 192.168.4.4:5060: ACK sip:204@192.168.4.4:5060 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK0e8449b7;rport From: "Fax1" ;tag=as37527ee7 To: ;tag=1163720037 Contact: Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 102 ACK User-Agent: Asterisk PBX Max-Forwards: 70 Content-Length: 0 --- stealth*CLI> -- SIP/204-08ff34e8 answered SIP/203-08ff1f68 stealth*CLI> <--- SIP read from 192.168.4.4:5060 ---> INVITE sip:203@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.4:5060;branch=z9hG4bK499A3871929581BBC4E79E95DC2366F8;rport From: ;tag=1163720037 To: "Fax1" ;tag=as37527ee7 Contact: Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b Supported: timer, replaces CSeq: 1 INVITE Max-Forwards: 70 Session-Expires: 1800;refresher=uac Content-Type: application/sdp Content-Length: 369 v=0 o=204 1163720023 1163720037 IN IP4 192.168.4.4 s=Kapanga [1163720023] c=IN IP4 192.168.4.4 t=0 0 m=image 5100 UDPTL t38 a=T38FaxVersion:0 a=T38MaxBitRate:14400 a=T38FaxFillBitRemoval:0 a=T38FaxTranscodingMMR:0 a=T38FaxTranscodingJBIG:0 a=T38FaxMaxBuffer:200 a=T38FaxMaxDatagram:72 a=T38FaxUdpEC:t38UDPRedundancy a=T38FaxRateManagement:transferredTCF <-------------> --- (13 headers 15 lines) --- Sending to 192.168.4.4 : 5060 (NAT) Got T.38 offer in SDP in dialog 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 Got T.38 Re-invite without audio. Keeping RTP active during T.38 session. Callid 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 Capabilities: us - 0xc (ulaw|alaw), peer - audio=0x0 (nothing)/video=0x0 (nothing), combined - 0x0 (nothing) Non-codec capabilities (dtmf): us - 0x1 (telephone-event), peer - 0x0 (nothing), combined - 0x0 (nothing) set_destination: Parsing for address/port to send to set_destination: set destination to 192.168.4.197, port 5060 Reliably Transmitting (NAT) to 192.168.4.197:5060: INVITE sip:203@192.168.4.197:5060 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK65b9153c;rport From: ;tag=as202dac36 To: "Fax1" ;tag=1163720036 Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 102 INVITE User-Agent: Asterisk PBX Max-Forwards: 70 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces X-asterisk-info: SIP re-invite (T38 switchover) Content-Type: application/sdp Content-Length: 261 v=0 o=root 2886 2887 IN IP4 192.168.4.1 s=session c=IN IP4 192.168.4.1 t=0 0 m=image 4478 udptl t38 a=T38FaxVersion:0 a=T38MaxBitRate:9600 a=T38FaxFillBitRemoval:0 a=T38FaxTranscodingMMR:0 a=T38FaxTranscodingJBIG:0 a=T38FaxRateManagement:transferredTCF a=T38FaxMaxBuffer:72 a=T38FaxMaxDatagram:72 a=T38FaxUdpEC:t38UDPRedundancy --- stealth*CLI> <--- SIP read from 192.168.4.197:5060 ---> SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK65b9153c;rport=5060;received=192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b From: ;tag=as202dac36 To: "Fax1" ;tag=1163720036 Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 102 INVITE Contact: Supported: timer, replaces Content-Type: application/sdp Content-Length: 365 v=0 o=203 1163720003 1163720036 IN IP4 192.168.4.197 s=Kapanga [1163720003] c=IN IP4 192.168.4.197 t=0 0 m=image 5100 UDPTL t38 a=T38FaxVersion:0 a=T38MaxBitRate:9600 a=T38FaxFillBitRemoval:0 a=T38FaxTranscodingMMR:0 a=T38FaxTranscodingJBIG:0 a=T38FaxMaxBuffer:200 a=T38FaxMaxDatagram:72 a=T38FaxUdpEC:t38UDPFEC a=T38FaxRateManagement:transferredTCF <-------------> --- (11 headers 15 lines) --- Got T.38 offer in SDP in dialog 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 Got T.38 Re-invite without audio. Keeping RTP active during T.38 session. Callid 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 Capabilities: us - 0xc (ulaw|alaw), peer - audio=0x0 (nothing)/video=0x0 (nothing), combined - 0x0 (nothing) Non-codec capabilities (dtmf): us - 0x1 (telephone-event), peer - 0x0 (nothing), combined - 0x0 (nothing) list_route: hop: <--- Reliably Transmitting (NAT) to 192.168.4.4:5060 ---> SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.4.4:5060;branch=z9hG4bK499A3871929581BBC4E79E95DC2366F8;received=192.168.4.4;rport=5060 From: ;tag=1163720037 To: "Fax1" ;tag=as37527ee7 Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 1 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Contact: Content-Type: application/sdp Content-Length: 254 v=0 o=root 2886 2887 IN IP4 192.168.4.1 s=session c=IN IP4 192.168.4.1 t=0 0 m=image 4711 udptl t38 a=T38FaxVersion:0 a=T38MaxBitRate:9600 a=T38FaxFillBitRemoval:0 a=T38FaxTranscodingMMR:0 a=T38FaxTranscodingJBIG:0 a=T38FaxRateManagement:transferredTCF a=T38FaxMaxBuffer:72 a=T38FaxMaxDatagram:72 a=T38FaxUdpEC:t38UDPFEC <------------> set_destination: Parsing for address/port to send to set_destination: set destination to 192.168.4.197, port 5060 Transmitting (NAT) to 192.168.4.197:5060: ACK sip:203@192.168.4.197:5060 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK26e10ddb;rport From: ;tag=as202dac36 To: "Fax1" ;tag=1163720036 Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 102 ACK User-Agent: Asterisk PBX Max-Forwards: 70 Content-Length: 0 --- stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 6) stealth*CLI> Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 6) stealth*CLI> <--- SIP read from 192.168.4.4:5060 ---> ACK sip:203@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.4:5060;branch=z9hG4bKF87A1B1C39F88FF768EF8A20254840E9;rport From: ;tag=1163720037 To: "Fax1" ;tag=as37527ee7 Contact: Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b CSeq: 1 ACK Max-Forwards: 70 Content-Length: 0 <-------------> --- (10 headers 0 lines) --- stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Sent UDPTL packet to 192.168.4.4:5100 (type 0, seq 49126, len 8) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> <--- SIP read from 192.168.4.196:5061 ---> NOTIFY sip:192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.196:5061;branch=z9hG4bK-41e8583c From: Joy Chan ;tag=5513e2c863c1708fo1 To: Call-ID: ae77b6b8-80d62d5f@192.168.4.196 CSeq: 8032 NOTIFY Max-Forwards: 70 Event: keep-alive User-Agent: Linksys/PAP2-3.1.3(LS) Content-Length: 0 <-------------> --- (10 headers 0 lines) --- <--- Transmitting (no NAT) to 192.168.4.196:5061 ---> SIP/2.0 489 Bad event Via: SIP/2.0/UDP 192.168.4.196:5061;branch=z9hG4bK-41e8583c;received=192.168.4.196 From: Joy Chan ;tag=5513e2c863c1708fo1 To: ;tag=as1cac1974 Call-ID: ae77b6b8-80d62d5f@192.168.4.196 CSeq: 8032 NOTIFY User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 <------------> stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Really destroying SIP dialog '7E4805293B5B78D61220C5B42053B526@192.168.4.1' Method: REGISTER stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 10) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 8) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 10) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 10) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 15) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 15) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 20) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 20) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 20) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 27) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) stealth*CLI> Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 27) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 27) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 31) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 31) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 31) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 14) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 29) Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 14) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 14) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 17) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 20) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 6) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> <--- SIP read from 192.168.4.196:5060 ---> NOTIFY sip:192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.196:5060;branch=z9hG4bK-53e8572f From: Ronald Chan ;tag=85efec10992fb7e7o0 To: Call-ID: 14b36900-afc0dfb7@192.168.4.196 CSeq: 8033 NOTIFY Max-Forwards: 70 Event: keep-alive User-Agent: Linksys/PAP2-3.1.3(LS) Content-Length: 0 <-------------> --- (10 headers 0 lines) --- <--- Transmitting (no NAT) to 192.168.4.196:5060 ---> SIP/2.0 489 Bad event Via: SIP/2.0/UDP 192.168.4.196:5060;branch=z9hG4bK-53e8572f;received=192.168.4.196 From: Ronald Chan ;tag=85efec10992fb7e7o0 To: ;tag=as4a749a11 Call-ID: 14b36900-afc0dfb7@192.168.4.196 CSeq: 8033 NOTIFY User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 <------------> stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 8) Sent UDPTL packet to 192.168.4.4:5100 (type 0, seq 49126, len 8) Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.197:5100 (type 0, seq 0, len 8) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 31) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) stealth*CLI> Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 25) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 34) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 22) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 31) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) Sent UDPTL packet to 192.168.4.197:5100 (type 0, seq 20704, len 31) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> Got UDPTL packet from 192.168.4.4:5100 (type 0, seq 0, len 19) stealth*CLI> <--- SIP read from 192.168.4.197:5060 ---> BYE sip:204@192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bKB71130BD4862F6CEE796E6D715359623;rport From: "Fax1" ;tag=1163720036 To: ;tag=as202dac36 Contact: Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 Proxy-Authorization: Digest username="203",realm="asterisk",nonce="31b29c2c",response="87fec7b0c55c94d069ef5d9cc8356fd5",uri="sip:204@192.168.4.1",algorithm=MD5 User-Agent: Kapanga Softphone Desktop 1.00/2151b Supported: timer, replaces CSeq: 3 BYE Max-Forwards: 70 Content-Length: 0 <-------------> --- (12 headers 0 lines) --- Sending to 192.168.4.197 : 5060 (NAT) <--- Transmitting (NAT) to 192.168.4.197:5060 ---> SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bKB71130BD4862F6CEE796E6D715359623;received=192.168.4.197;rport=5060 From: "Fax1" ;tag=1163720036 To: ;tag=as202dac36 Call-ID: 9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1 CSeq: 3 BYE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Contact: Content-Length: 0 <------------> stealth*CLI> Scheduling destruction of SIP dialog '57e1b8f460e464fe7faec80623909ce0@192.168.4.1' in 32000 ms (Method: ACK) set_destination: Parsing for address/port to send to set_destination: set destination to 192.168.4.4, port 5060 Reliably Transmitting (NAT) to 192.168.4.4:5060: BYE sip:204@192.168.4.4:5060 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK7c4d5747;rport From: "Fax1" ;tag=as37527ee7 To: ;tag=1163720037 Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 103 BYE User-Agent: Asterisk PBX Max-Forwards: 70 Content-Length: 0 --- == Spawn extension (macro-extensions, s, 8) exited non-zero on 'SIP/203-08ff1f68' stealth*CLI> == End MixMonitor Recording SIP/203-08ff1f68 stealth*CLI> <--- SIP read from 192.168.4.4:5060 ---> SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.4.1:5060;branch=z9hG4bK7c4d5747;rport=5060;received=192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b From: "Fax1" ;tag=as37527ee7 To: ;tag=1163720037 Call-ID: 57e1b8f460e464fe7faec80623909ce0@192.168.4.1 CSeq: 103 BYE Contact: Supported: timer, replaces Content-Length: 0 <-------------> --- (10 headers 0 lines) --- SIP Response message for INCOMING dialog BYE arrived Really destroying SIP dialog '57e1b8f460e464fe7faec80623909ce0@192.168.4.1' Method: ACK Really destroying SIP dialog '9CBBC39E5708BE16737F7A1B2D20C853@192.168.4.1' Method: BYE stealth*CLI> Really destroying SIP dialog 'D799D9DB42798D27B4ECF968B4DB5AD7@192.168.4.1' Method: REGISTER stealth*CLI> <--- SIP read from 192.168.4.196:5061 ---> NOTIFY sip:192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.196:5061;branch=z9hG4bK-e99b08a From: Joy Chan ;tag=5513e2c863c1708fo1 To: Call-ID: ae77b6b8-80d62d5f@192.168.4.196 CSeq: 8033 NOTIFY Max-Forwards: 70 Event: keep-alive User-Agent: Linksys/PAP2-3.1.3(LS) Content-Length: 0 <-------------> --- (10 headers 0 lines) --- <--- Transmitting (no NAT) to 192.168.4.196:5061 ---> SIP/2.0 489 Bad event Via: SIP/2.0/UDP 192.168.4.196:5061;branch=z9hG4bK-e99b08a;received=192.168.4.196 From: Joy Chan ;tag=5513e2c863c1708fo1 To: ;tag=as34a21262 Call-ID: ae77b6b8-80d62d5f@192.168.4.196 CSeq: 8033 NOTIFY User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 <------------> stealth*CLI> <--- SIP read from 192.168.4.196:5060 ---> NOTIFY sip:192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.196:5060;branch=z9hG4bK-216f3116 From: Ronald Chan ;tag=85efec10992fb7e7o0 To: Call-ID: 14b36900-afc0dfb7@192.168.4.196 CSeq: 8034 NOTIFY Max-Forwards: 70 Event: keep-alive User-Agent: Linksys/PAP2-3.1.3(LS) Content-Length: 0 <-------------> --- (10 headers 0 lines) --- <--- Transmitting (no NAT) to 192.168.4.196:5060 ---> SIP/2.0 489 Bad event Via: SIP/2.0/UDP 192.168.4.196:5060;branch=z9hG4bK-216f3116;received=192.168.4.196 From: Ronald Chan ;tag=85efec10992fb7e7o0 To: ;tag=as0776694a Call-ID: 14b36900-afc0dfb7@192.168.4.196 CSeq: 8034 NOTIFY User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 <------------> stealth*CLI> <--- SIP read from 192.168.4.197:5060 ---> OPTIONS sip:192.168.4.1 SIP/2.0 Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK32A9ED43AFF352C2409DCD4DEF90305F;rport From: "Fax1" ;tag=1163720005 To: "Fax1" Contact: Call-ID: 9C904C43EA5ED0711B792188458D90CC@192.168.4.1 User-Agent: Kapanga Softphone Desktop 1.00/2151b Supported: timer, replaces CSeq: 1 OPTIONS Max-Forwards: 70 Content-Length: 0 <-------------> --- (11 headers 0 lines) --- Looking for s in from-sip (domain 192.168.4.1) <--- Transmitting (no NAT) to 192.168.4.197:5060 ---> SIP/2.0 404 Not Found Via: SIP/2.0/UDP 192.168.4.197:5060;branch=z9hG4bK32A9ED43AFF352C2409DCD4DEF90305F;received=192.168.4.197;rport=5060 From: "Fax1" ;tag=1163720005 To: "Fax1" ;tag=as6ac7fbae Call-ID: 9C904C43EA5ED0711B792188458D90CC@192.168.4.1 CSeq: 1 OPTIONS User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Accept: application/sdp Content-Length: 0 <------------> Scheduling destruction of SIP dialog '9C904C43EA5ED0711B792188458D90CC@192.168.4.1' in 32000 ms (Method: OPTIONS) stealth*CLI>