Dear Kamailio'ns, I am working on Kamailio server (V 4.1.2) with RTPproxy (1.2.1) integrated, in a standalone intranet infrastructure (no any connection with internet). I dont have any NAT settings in my network set-up. even though i will not get Audio/video calls through some times. So in that concern I have installed RTPproxy, now all the audio/Video calls are fine (with some Pixelled). I have the Following Kamailio configuration script, in which it suppose to invoke RTPproxy service when the SIP clients behind NAT. But every time when i do Audio/Video calls, they are proxying through RTPproxy server only. I analysed SIP captures of Audio/video call, i didnt found any IP/port changes in the whole SIP session and with this i assumed that there is no NAT issue in my Network. But why all the Audio/Video calls are proxying through RTPproxy everytime ?
Is there any Wrong placement of function call in Kamailio configuration script (below) ? #----------------------------------------------------------------- #!ifdef WITH_NAT # ----- rtpproxy params ----- modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722") # ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", 7) modparam("nathelper", "sipping_from", "sip:pinger@192.168.2.52") modparam("nathelper", "sipping_method", "INFO") # ----- NAT_traversal ----- modparam("nat_traversal", "keepalive_interval", 60) modparam("nat_traversal", "keepalive_method", "NOTIFY") modparam("nat_traversal", "keepalive_state_file", "/var/run/kamailio/keepalive_state") # ----- params needed for NAT traversal in other modules ----- modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", 6) #!endif #Routing Script # ----------------------------------------------------------------- # Sanity Check Section # ----------------------------------------------------------------- route { if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; #if (msg:len > max_len) { if (msg:len >= 8192 ) { sl_send_reply("513", "Message too big"); break; }; # ----------------------------------------------------------------- # Record Route Section # ----------------------------------------------------------------- #if (method!="REGISTER") { if (!method=="REGISTER") { record_route(); }; if (method=="BYE" || method=="CANCEL") { # unforce_rtp_proxy(); rtpproxy_answer(); } # ----------------------------------------------------------------- # Loose Route Section # ----------------------------------------------------------------- if (loose_route()) { if ((method=="INVITE" || method=="REFER") && !has_totag()) { sl_send_reply("403", "Forbidden"); break; }; if (method=="INVITE") { if (!proxy_authorize("192.168.2.52","subscriber")) { # proxy_challenge("","0"); proxy_challenge("192.168.2.52", "0"); # break; } else if (!check_from()) { sl_send_reply("403", "Use From=ID"); break; }; consume_credentials(); if (nat_uac_test("19")) { setflag(6); force_rport(); fix_nated_contact(); }; rtpproxy_offer("l"); }; route(1); break; }; # ----------------------------------------------------------------- # Call Type Processing Section # ----------------------------------------------------------------- # if (uri!=myself) { if (!uri==myself) { route(4); route(1); break; }; if (method=="ACK") { route(1); break; } if (method=="CANCEL") { route(1); break; } else if (method=="INVITE") { route(3); break; } else if (method=="REGISTER") { route(2); break; }; lookup("aliases"); if (uri!=myself) { route(4); route(1); break; }; if (!lookup("location")) { sl_send_reply("404", "User Not Found"); break; }; route(1); } # ----------------------------------------------------------------- # Default Message Handler # ----------------------------------------------------------------- route[1] { t_on_reply("1"); if (!t_relay()) { if (method=="INVITE" && isflagset(6)) { rtpproxy_answer();; }; sl_reply_error(); }; } # ----------------------------------------------------------------- # REGISTER Message Handler # ----------------------------------------------------------------- route[2] { if (!search("^Contact:[ ]*\*") && nat_uac_test("19")) { setflag(6); fix_nated_register(); force_rport(); }; sl_send_reply("100", "Trying"); if (!www_authorize("192.168.2.52","subscriber")) { www_challenge("192.168.2.52","0"); break; }; if (!check_to()) { sl_send_reply("401", "Unauthorized"); break; }; consume_credentials(); if (!save("location")) { sl_reply_error(); }; } # ----------------------------------------------------------------- # INVITE Message Handler # ----------------------------------------------------------------- route[3] { if (!proxy_authorize("192.168.2.52","subscriber")) { proxy_challenge("192.168.2.52","0"); break; } else if (!check_from()) { sl_send_reply("403", "Use From=ID"); break; }; consume_credentials(); if (nat_uac_test("19")) { setflag(6); } lookup("aliases"); if (uri!=myself) { route(4); route(1); break; }; if (!lookup("location")) { sl_send_reply("404", "User Not Found"); break; }; route(4); route(1); } # ----------------------------------------------------------------- # NAT Traversal Section # ----------------------------------------------------------------- route[4] { if (isflagset(6)) { force_rport(); fix_nated_contact(); # force_rtp_proxy(); rtpproxy_offer(); } } onreply_route[1] { if (isflagset(6) && status=~"(180)|(183)|2[0-9][0-9]") { if (!search("^Content-Length:[ ]*0")) { # force_rtp_proxy(); rtpproxy_offer(); }; }; if (nat_uac_test("1")) { fix_nated_contact(); }; } Please find the Attachment for Tcpdump based Video call Sip capture for your better Understanding. PS: Both Kamailio and RTPproxy are running on same IP (host), i.e 192.168.2.52. Please anybody help me in resolving this issue. Any help will greatly appreciate. Regards, Ravi.
Videocall_Kamailio+RTPproxy.pcap
Description: application/vnd.tcpdump.pcap
_______________________________________________ SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users