Page 16 / 20 Scroll up to view Page 11 - 15
CP V51 R2 NZ August 2014
16 |
P a g e
Figure 3
SIP Information
6.
On the left hand menu, select ‘
Device Info
button
7.
Scroll to the Bottom and see SIP Registration
Information , (Figure 4)
Figure 4
SIP Debug
To capture and debug SIP information, you have three methods of achieving this.
System Log Level
- Innbox Logging mechanism
WAN Port Mirroring
Mirror the WAN interface to a LAN port and capture egress &
ingress traffic.
From Innbox CLI Terminal
tcpdump packet filtering.
Page 17 / 20
CP V51 R2 NZ August 2014
17 |
P a g e
We will demonstrate how all three debugging methods used and how to set it up. System
log being low level debug to terminal CLI as being very advance and powerful debugging
method.
System Log Level Setup.
1.
Navigate to “Voice
-
SIP Debug Settings”
2.
Click on “Global Parameters” tab.
3.
And set the LOG level to “DEBUG” (
Figure 4)
and click “Apply”
Figure 4
4.
Navigate to “Management –
System log” (
Figure 5)
Page 18 / 20
CP V51 R2 NZ August 2014
18 |
P a g e
Figure 5
5.
Click on “Configure System Log” (
Figure 6)
a.
Log = Enable (Radial Button)
b.
Log Level = Debugging
c.
Display Level = Debugging
d.
Mode = local (here you can also set up a remote log server,
which we won’t go into )
6.
Click “Apply Save”
7.
Click on “System Log” again and click on “View System log” to see the Innbox log and also SIP
log’s
Figure 6
Page 19 / 20
CP V51 R2 NZ August 2014
19 |
P a g e
WAN Port Mirroring
Note: This packet capture method involves a third party tool such as “Wireshark”
.
1.
In your browser address bar type in your Innbox gateway IP address followed by
“engdebug.html”
a.
Eg
2.
Look for your WAN interface and select a LAN port from the Drop down Menu, (Select the LAN
port your PC is connected to). And tick the check box next to it to enable it.
3.
Click “Apply Save”
4.
Now the WAN uplink interface is now mirrored to the selected LAN port, you may now open up
Wireshark and capture SIP traffic leaving and entering the Innbox gateway.
Figure 7 below shows capturing traffic on LAN port 4 on a VDSL Connection
CLI Terminal Packet Filtering
This method requires you to “Telnet” or “SSH” into the Innbox
Terminal Interface. We will be using
“Putty” to telnet into our Innbox Gateway and run “TCPDUMP” to capture any SIP traffic entering and
leaving the Innbox Gateway WAN interface.
1.
Open up Putty and type in your Innbox Default Gateway IP address .
2.
Login into the Innbox with the Above Login Credentials.
3.
Execute “ifconfig” to determine your WAN uplink interface.
Page 20 / 20
CP V51 R2 NZ August 2014
20 |
P a g e
4.
Now
execute “tcpdump –
nqt -i ppp0.1
s 0
A
–vvv port 5060”
1.
Note: ppp0.1 is my VDSL WAN interface
2.
Now everything entering and leaving port 5060 will be displayed back to you in the terminal
console.
For Further Assistance please call (09) 5891350
During office hours 9am - 5pm
Or Visit the Support Forum

Rate

3.7 / 5 based on 3 votes.

Popular Iskratel Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top