Sample 1
Topology
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
// Some comments here listeners : { interfaces = ( { default = true; ip-address = "10.0.40.5"; external-address = "10.0.40.5"; tcp-enabled = false; sip-port = 5060; }, { ip-address = "192.168.2.2"; external-address = "192.168.2.2"; tcp-enabled = false; sip-port = 5060; } ); /**************************************************************************** * The default interface address used to send out requests if not explicitly* * set using the java script sendInterfaceAddress() function. This is also * * used by Karoo Bridge command line utilities like the --reset-log-level * * to send the SIP RPC request to the running Karoo Bridge instance. * ****************************************************************************/ default-interface-address = "10.0.40.5"; /**************************************************************************** * The default interface port used to send out requests if not explicitly * * set using the java script sendInterfacePort() function * ****************************************************************************/ default-interface-port = 5060; /**************************************************************************** * The low value marker for the TCP client port range * ****************************************************************************/ sip-tcp-port-base = 10000; /**************************************************************************** * The high value marker for the TCP client port range * ****************************************************************************/ sip-tcp-port-max = 15000; /**************************************************************************** * The low value marker for the RTP proxy port range * ****************************************************************************/ rtp-proxy-port-base = 30000; /**************************************************************************** * The high value marker for the RTP proxy port range * ****************************************************************************/ rtp-proxy-port-max = 60000; /**************************************************************************** * The read timeout for RTP Proxy before it decides to automatically * * tear down the RTP channel. This is expressed in seconds. * ****************************************************************************/ rtp-proxy-read-timeout = 600; /**************************************************************************** * The number of worker threads for the RTP proxy. Take note that Karoo * * Bridge uses async IO and the number here does not limit the number of RTP* * channels that can be supported. This threadpool will be shared equally * * by all RTP channels. 30 threads has been tested to be enough to cater * * to 1000 RTP proxy sessions * ****************************************************************************/ rtp-proxy-transport-thread-count = 30; /*************************************************************************** * Karoo has a built-in STUN server. STUN would only work if the server * * Karoo Bridge is installed in has two or more NICs directly routable from* * the WAN. The addresses must be different. Virtual IP is also ok but is* * not advised. If you don't want to use the default port you can include * * a port with the address separated with a colon. * * Example: stun-primary-ip = 10.0.40.5:3478 * ***************************************************************************/ stun-primary-ip = ""; stun-secondary-ip = ""; /*************************************************************************** * Karoo bridge uses libfreeswitch for sip trunking and transcoding * * functions. These values set the listener port for the internal event * * layer handler. Since freeswitch is configured independently, the sip * * address used by freeswitch must be made known to Karoo as well * ***************************************************************************/ switch-event-listener-port = 9000; switch-sip-listener-ip = "10.0.40.5"; switch-sip-listener-port = 5080; switch-sip-context = "sofia/karoo"; /**************************************************************************** * The packet rate ratio allows the transport to detect a potential DoS * * attack. It works by detecting the packet read rate per second as * * designated by the upper limit. If the value of packet rate is 50/100, * * the maximum packet rate before the SBC raises the alert level if a * * potential denial of service attack is 100 packets per second. * * When this happens, the transport layer checks if there is a particular * * IP that is sending more than its allowable rate of 50 packets per second.* * If the sender is violating the threshold, it will be banned for 1 hour * * which is the third parameter of 3600 seconds. * ****************************************************************************/ packet-rate-ratio = "50/100/3600"; /***************************************************************************** * One may statically define a list of known IP addresses or networks so that* * they get immunity against the packet-rate-ratio algorithm. This would * * normally contain the ip addresses of known traffic sources or destinations* * like the local iPBX or trunk gateways. For Call Centers with predictive * * or progressive dialers in the network, it would be wise to also white-list* * those applications. * *****************************************************************************/ packet-rate-white-list = ( /* {source-ip = "192.168.1.10";\}, */ {source-network = "1.1.1.1/4";\} \); \}; user-agent : \{ /**************************************************************************** * Show your appreciation by not changing this value * ****************************************************************************/ user-agent-name = "OSS Karoo Bridge"; /**************************************************************************** * Karoo bridge uses the contact header to store some states about sip * * session. It can either do thi by storing a unique id as the user info of* * the contact-uri or by storing it as a contact paramameter. If your * * switch/pbx supports paramaters in contact, setting the two parameters * * below to true is the recommended value. * ****************************************************************************/ register-state-in-contact-params=false; dialog-state-in-contact-params=true; \}; |
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
function Route() { this.sendRegister( "user", "myitsp.com", "passwd", "proxy.myitsp.com", 1800, 0); this.sendRegister( "user2", "myitsp.com", "passwd2", "proxy.myitsp.com", 1800, 0); } Route.prototype = new RouteProfile(); Route.prototype.isRoutable = function() { if (is_mysipdomain_routable(this)) return true; else return false; } |
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
function is_mysipdomain_routable(profile) { var ifaceAddr = profile.sipMessage.getInterfaceAddress(); var ifacePort = profile.sipMessage.getInterfacePort(); var ds = profile.sipMessage.getRequestUriUser(); var domain = profile.sipMessage.getFromHost(); var ts = profile.sipMessage.getToUser(); if (is_my_pbx_routable(profile, ifaceAddr, ifacePort, ds, domain, ts)) return true; else if (is_my_sip_trunk_routable(profile, ifaceAddr, ifacePort, ds, domain)) return true; } function is_my_sip_trunk_routable(profile, ifaceAddr, ifacePort, ds, domain) { if (typeof ds != "string") return false; // // Check if the packet came in using the LAN interface // if ( ifaceAddr != sip_interface_address[1] || ifacePort != sip_interface_port[1]) return false; // // Route it to our ITSP // profile.setTargetDomain("myitsp.com"); profile.setTargetAddress("udp", "proxy.myitsp.com", "5060"); // // Use the WAN interface to send it out // profile.setInterfaceAddress(sip_interface_address[0], sip_interface_port[0]); // // Bridge it using our account // var pattern=/\b((\d\d\d)|((1)\d\d\d))?(\d{7})\b/; var pattern2=/\b9((\d\d\d)|((1)\d\d\d))?(\d{7})\b/; var pattern_ac=/\b(1?(\d\d\d))\b/; var pattern_am=/\b((\d\d\d)(\d\d\d)?)\b/; if ( pattern.test(ds) == true ) { profile.sipMessage.setRequestUriUser( "1" + (ds.replace(pattern, "$1").replace(pattern_ac, "$2") + "888").replace(pattern_am, "$2") + ds.replace(pattern, "$5") ); profile.sipMessage.setFromUser("user"); profile.bridge("user", "passwd"); } else if ( pattern2.test(ds) == true ) { profile.sipMessage.setRequestUriUser( "1" + (ds.replace(pattern2, "$1").replace(pattern_ac, "$2") + "888").replace(pattern_am, "$2") + ds.replace(pattern2, "$5") ); profile.sipMessage.setFromUser("user2"); profile.bridge("user2", "passwd2"); } else return false; return true; } function is_my_pbx_routable(profile, ifaceAddr, ifacePort, ds, domain, ts) { if (typeof domain != "string") return false; // // Check if the packet came in using the WAN interface // if ( ifaceAddr != sip_interface_address[0] || ifacePort != sip_interface_port[0]) return false; // // Check if the domain is valid // if (domain != "mydomain.com") return false; // // route it to our PBX // profile.setTargetDomain("mydomain.com"); profile.setTargetAddress("udp", "sipx.mydomain.com", "5060"); // // Use the LAN interface to send it out // profile.setInterfaceAddress(sip_interface_address[1], sip_interface_port[1]); // profile.setInterfaceAddress("192.168.2.2", "5060"); // // Check if the source address is the ITSP. If yes, bridge it // if (profile.sipMessage.getSourceAddress() == "10.0.168.10") { if (ts == "1XXXXXXX181") { profile.sipMessage.setRequestUriUser("501"); profile.bridge("501", "sipxpasswd"); } else if (ts == "1XXXXXXX139") { profile.sipMessage.setRequestUriUser("503"); profile.bridge("503", "sipxpasswd"); } else if (ts == "1XXXXXXXX07") { profile.sipMessage.setRequestUriUser("504"); profile.bridge("504", "sipxpasswd"); } else if (ts == "1XXXXXXXX82") { profile.sipMessage.setRequestUriUser("1XXXXXXXX82"); profile.bridge("514", "sipxpasswd"); } else if (ts == "1XXXXXXXX67") { profile.sipMessage.setRequestUriUser("501"); profile.bridge("501", "sipxpasswd"); } } return true; } |