|
@@ -1,12 +1,12 @@
|
|
|
-debug=3 # debug level (cmd line: -dddddddddd)
|
|
|
+debug=9 # debug level (cmd line: -dddddddddd)
|
|
|
check_via=yes # (cmd. line: -v)
|
|
|
dns=on # (cmd. line: -r)
|
|
|
rev_dns=yes # (cmd. line: -R)
|
|
|
-fork=no # (cmd. line: -D)
|
|
|
-children=4
|
|
|
+fork=no # (cmd. line: -D)
|
|
|
+#children=4
|
|
|
log_stderror=yes # (cmd line: -E)
|
|
|
#port=5080
|
|
|
-listen=127.0.0.1
|
|
|
+#listen=127.0.0.1
|
|
|
loop_checks=1
|
|
|
# for more info: sip_router -h
|
|
|
|
|
@@ -24,7 +24,7 @@ route{
|
|
|
if ( t_lookup_request()) {
|
|
|
if ( method=="ACK" ) {
|
|
|
log("SER: ACK received -> t_release\n");
|
|
|
- if (! t_forward("127.0.0.1", "5090" )) {
|
|
|
+ if (! t_forward("195.37.78.233", "6666" )) {
|
|
|
log("SER: WARNING: bad forward\n");
|
|
|
};
|
|
|
if (! t_release()) {
|
|
@@ -58,13 +58,13 @@ route{
|
|
|
#t_forward("benetnash.fokus.gmd.de", "5080" );
|
|
|
if (method=="BYE") {
|
|
|
log("SER: BYE received, HACK: forwarding to client\n");
|
|
|
- if (! t_forward("127.0.0.1", "5000")){
|
|
|
- log("SER:ERROR: t_forward (..., 5000)\n");
|
|
|
+ if (! t_forward("195.37.78.233", "5555")){
|
|
|
+ log("SER:ERROR: t_forward (..., 5555)\n");
|
|
|
};
|
|
|
-
|
|
|
+
|
|
|
}else{
|
|
|
- if (! t_forward("127.0.0.1", "5090" )){
|
|
|
- log("SER:ERROR: t_forward (..., 5090)\n");
|
|
|
+ if (! t_forward("195.37.78.233", "6666" )){
|
|
|
+ log("SER:ERROR: t_forward (..., 6666)\n");
|
|
|
};
|
|
|
};
|
|
|
#t_forward_uri();
|