亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? operation.sgml

?? SIP Express Router, Linux下的SIP代理服務(wù)器,小巧實用,開發(fā)測試VoIP設(shè)備和應(yīng)用的必備.
?? SGML
?? 第 1 頁 / 共 4 頁
字號:
				</listitem>				<listitem>				    <para>					Set explicitly at which address 					<application moreinfo="none">ser</application>					should be listening, e.g., <varname>listen=192.168.2.16</varname>.				    </para>				</listitem>				<listitem>				    <para>					Redirect log messages to standard error by setting					<varname>log_stderror=yes</varname>				    </para>				</listitem>				<listitem>				    <para>					Set appropriately high log level. (Be sure that you redirected logging					to standard output. Flooding system logs with many detailed messages					would make the logs difficult to read and use.) You can set the global					logging threshold value with the option <varname>debug=nr</varname>,					where the higher <varname>nr</varname> the more detailed output.					If you wish to set log level only for some script events, include					the desired log level as the first parameter of the					<command moreinfo="none">log</command> action in your script.					The messages will be then printed if <command moreinfo="none">log</command>'s					level is lower than the global threshold, i.e., the lower the more					noisy output you get.					<example>					    <title>Logging Script</title>					    <programlisting format="linespecific">&logging;					    </programlisting>					    <para>						The following SIP message causes then logging output as shown						bellow.					    </para>					    <programlisting format="linespecific">REGISTER sip:192.168.2.16 SIP/2.0Via: SIP/2.0/UDP 192.168.2.33:5060From: sip:113311@192.168.2.16To: sip:113311@192.168.2.16Call-ID: 00036bb9-0fd305e2-7daec266-212e5ec9@192.168.2.33Date: Thu, 27 Feb 2003 15:10:52 GMTCSeq: 101 REGISTERUser-Agent: CSCO/4Contact: sip:113311@192.168.2.33:5060Content-Length: 0Expires: 600                                 					    </programlisting>					    <programlisting format="linespecific">[jiri@cat sip_router]$ ./ser -f examples/logging.cfg Listening on               192.168.2.16 [192.168.2.16]::5060Aliases: cat.iptel.org:5060 cat:5060 WARNING: no fork mode  0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 0(17379) REGISTER received 0(17379) request for other domain received										    </programlisting>					</example>				    </para>				</listitem>			    </itemizedlist>			</para>			</answer>		</qandaentry>	    <qandaentry>		<question>		    <para>			Labeling Outbound Requests		    </para>		</question>		<answer>		    <para>		    Without knowing, which pieces of script code a relayed		    request visited, trouble-shooting would be difficult.		    Scripts typically apply different processing to		    different routes such as to IP phones and PSTN		    gateways. We thus recommend to label outgoing		    requests with a label describing the type of processing		    applied to the request.			</para>		    <para>			Attaching "routing-history" hints to relayed			requests is as easy as using the 			<command moreinfo="none">append_hf</command>			action exported by textops module. The following			example shows how different labels are attached			to requests to which different routing logic			was applied.			<example>			    <title>"Routing-history" labels</title>			    <programlisting format="linespecific"># is the request for our domain?# if so, process it using UsrLoc and label it so.if (uri=~[@:\.]domain.foo") {   if (!lookup("location")) {    sl_send_reply("404", "Not Found");    break;   };   # user found -- forward to him and label the request   append_hf("P-hint: USRLOC\r\n");} else {# it is an outbound request to some other domain --# indicate it in the routing-history label   append_hf("P-hint: OUTBOUND\r\n");};t_relay();			    </programlisting>			    <para>				This is how such a labeled requests looks				like. The last header field includes				a label indicating the script processed				the request as outbound.			    </para>			    <programlisting format="linespecific">#U 2002/09/26 02:03:09.807288 195.37.77.101:5060 -> 203.122.14.122:5060SUBSCRIBE sip:rajesh@203.122.14.122 SIP/2.0.Max-Forwards: 10.Via: SIP/2.0/UDP 195.37.77.101;branch=53.b44e9693.0.Via: SIP/2.0/UDP 203.122.14.115:16819.From: sip:rajeshacl@iptel.org;tag=5c7cecb3-cfa2-491d-a0eb-72195d4054c4.To: sip:rajesh@203.122.14.122.Call-ID: bd6c45b7-2777-4e7a-b1ae-11c9ac2c6a58@203.122.14.115.CSeq: 2 SUBSCRIBE.Contact: sip:203.122.14.115:16819.User-Agent: Windows RTC/1.0.Proxy-Authorization: Digest username="rajeshacl", realm="iptel.org", algorithm="MD5", uri="sip:rajesh@203.122.14.122", nonce="3d924fe900000000fd6227db9e565b73c465225d94b2a938", response="a855233f61d409a791f077cbe184d3e3".Expires: 1800.Content-Length: 0.P-hint: OUTBOUND.			    </programlisting>			</example>		</para>		</answer>	    </qandaentry>	</qandaset>	</section> <!-- operational practises -->	<section>	    <title>HOWTOs</title>	    <para>		This section is a "cookbook" for dealing with common tasks,		such as user management or controlling access		to PSTN gateways.	    </para>	    <section>		<title>User Management</title>			<para>			    There are two tasks related to management of SIP users:			    maintaining user accounts and maintaining user contacts.			    Both these jobs can be done using the 			    <application moreinfo="none">serctl</application>			    command-line tool. Also, the complimentary web			    interface, <application moreinfo="none">serweb</application>,			    can be used for this purpose as well.			</para>			<para>			    If user authentication is turned on, which is a highly			    advisable practice, user account must be created before			    a user can log in. To create a new user account, call the			    <command moreinfo="none">serctl add</command> utility			    with username, password and email as parameters. It			    is important that the environment <varname>SIP_DOMAIN</varname>			    is set to your realm and matches realm values used in			    your script. The realm value is used for calculation			    of credentials stored in subscriber database, which are			    bound permanently to this value.			    <screen format="linespecific">[jiri@cat gen_ha1]$ export SIP_DOMAIN=foo.bar[jiri@cat gen_ha1]$ serctl add newuser secret newuser@foo.barMySql Password: new user added			    </screen>			</para>			<para><application moreinfo="none">serctl</application> can			    also change user's password or remove existing accounts			    from system permanently.			    <screen format="linespecific">[jiri@cat gen_ha1]$ serctl passwd newuser newpasswordMySql Password: password change succeeded[jiri@cat gen_ha1]$ serctl rm newuser                MySql Password: user removed			    </screen>			</para>			<para>			    User contacts are typically automatically uploaded by SIP phones			    to server during registration process and administrators do not			    need to worry about them. However, users			    may wish to append permanent contacts to PSTN gateways			    or to locations in other administrative domains. 			    To manipulate the contacts in such cases, use			    <application moreinfo="none">serctl ul</application>			    tool. Note that this is the only correct way			    to update contacts -- direct changes to back-end			    MySql database do not affect server's memory. Also note,			    that if persistence is turned off (usrloc "db_mode"			    parameter set to "0"), all contacts are gone on server			    reboot. Make sure that persistence is enabled if you			    add permanent contacts.			</para>			<para>			    To add a new permanent contact for a user, call 			    <application moreinfo="none">serctl ul add &lt;username&gt			    &lt;contact&gt;</application>. To delete 			    all user's contacts, call 			    <application>serctl ul rm &lt;username&gt;</application>.			    <application moreinfo="none">serctl ul show &lt;username&gt;</application>			    prints all current user's contacts.			    <screen format="linespecific">[jiri@cat gen_ha1]$ serctl ul add newuser sip:666@gateway.foo.barsip:666@gateway.foo.bar200 Added to table('newuser','sip:666@gateway.foo.bar') to 'location'[jiri@cat gen_ha1]$ serctl ul show newuser&lt;sip:666@gateway.foo.bar&gt;;q=1.00;expires=1073741812[jiri@cat gen_ha1]$ serctl ul rm newuser  200 user (location, newuser) deleted[jiri@cat gen_ha1]$ serctl ul show newuser404 Username newuser in table location not found			    </screen>			</para>	    </section> <!-- user management -->	    <section>		<title>User Aliases</title>			<para>			    Frequently, it is desirable for a user to have multiple			    addresses in a domain. For example, a user with username "john.doe" wants to be			    reachable at a shorter address "john" or at a numerical address			    "12335", so that PSTN callers with digits-only key-pad can reach			    him too.			</para>			<para>			    With <application moreinfo="none">ser</application>, you can maintain			    a special user-location table and translate existing aliases to canonical			    usernames using the <command moreinfo="none">lookup</command>			    action from usrloc module. The following script fragment demonstrates			    use of <command moreinfo="none">lookup</command> for this purpose.			    <example>				<title>Configuration of Use of Aliases</title>				<programlisting format="linespecific">if (!uri==myself) { # request not for our domain...  route(1); # go somewhere else, where outbound requests are processed  break;};# the request is for our domain -- process registrations firstif (method=="REGISTER") { route(3); break; };# look now, if there is an alias in the "aliases" table; don't care# about return value: whether there is some or not, move ahead thenlookup("aliases");# there may be aliases which translate to other domain and for which# local processing is not appropriate; check again, if after the# alias translation, the request is still for usif (!uri==myself) { route(1); break; };# continue with processing for our domain......  				</programlisting>			    </example>			</para>			<para>			    The table with aliases is updated using the			    <application moreinfo="none">serctl</application>			    tool. <application moreinfo="none">			    serctl alias add &lt;alias&gt; &lt;uri&gt;</application>			    adds a new alias, 			    <application moreinfo="none">serctl alias show &lt;user&gt;</application>			    prints an existing alias, and			    <application moreinfo="none">serctl alias rm &lt;user&gt;</application>			    removes it.			    <screen format="linespecific">[jiri@cat sip_router]$ serctl alias add 1234 sip:john.doe@foo.barsip:john.doe@foo.bar200 Added to table('1234','sip:john.doe@foo.bar') to 'aliases'[jiri@cat sip_router]$ serctl alias add john sip:john.doe@foo.barsip:john.doe@foo.bar200 Added to table('john','sip:john.doe@foo.bar') to 'aliases'[jiri@cat sip_router]$ serctl alias show john                    &lt;sip:john.doe@foo.bar&gt;;q=1.00;expires=1073741811[jiri@cat sip_router]$ serctl alias rm john  200 user (aliases, john) deleted							    </screen>			</para>			<para>			    Note that persistence needs to be turned on in usrloc			    module. All changes to aliases will be otherwise lost			    on server reboot. To enable persistence, set the			    db_mode usrloc parameter to a non-zero value.			    <programlisting format="linespecific"># ....load module ...loadmodule "modules/usrloc/usrloc.so"# ... turn on persistence -- all changes to user tables are immediately# flushed to mysqlmodparam("usrloc", "db_mode",   1)# the SQL address:modparam("usrloc", "db_url","mysql://ser:secret@dbhost/ser")			    </programlisting>			</para>	    </section> <!-- user aliases -->	    <section id=acl>		<title>Access Control (PSTN Gateway)</title>			<para>			    It is sometimes important to exercise some sort of			    access control. A typical use case is when 			    <application moreinfo="none">ser</application> is used			    to guard a PSTN gateway. If a gateway was not well guarded,			    unauthorized users would be able to use it to terminate calls in PSTN,			    and cause high charges to its operator.			</para>			<para>			    There are few issues you need to understand when			    configuring <application moreinfo="none">ser</application>			    for this purpose. First, if a gateway is built or configured to			    accept calls from anywhere, callers may easily bypass your			    access control server and communicate with the gateway			    directly. You then need to enforce at transport layer			    that signaling is only accepted if coming via			    <application moreinfo="none">ser</application> and			    deny SIP packets coming from other hosts and port numbers.			    Your network must be configured not to allow forged			    IP addresses. Also, you need to turn on record-routing			    to assure that all session requests will travel via 			    <application moreinfo="none">ser</application>.			    			    Otherwise, caller's devices would send subsequent SIP requests 			    directly to your gateway, which would fail because of transport 			    filtering.			</para>			<para>			    Authorization (i.e., the process of determining who may call where)			    is facilitated in <application moreinfo="none">ser</application>			    using <emphasis>group membership</emphasis> concept. Scripts make 			    decisions on whether a caller is authorized to make a call to			    a specific destination based on user's membership in a group.			    For example a policy may be set up to allow calls to international			    destinations only to users, who are members of an "int" group.			    			    Before user's group membership is checked, his identity			    must be verified first. Without cryptographic verification of user's			    identity, it would be impossible to assert that a caller really			    is who he claims to be.			</para>			<para>			    The following script demonstrates, how to configure <application moreinfo="none">ser</application>			    as an access control server for a PSTN gateway. The script verifies user			    identity using digest authentication, checks user's privileges,			    and forces all requests to visit the server.			    <example>				<title>Script for Gateway Access Control</title>				<programlisting format="linespecific">&gatewayacl;				</programlisting>			    </example>			</para>			<para>			    Use the <application moreinfo="none">serctl</application> tool to			    maintain group membership. 			    <application moreinfo="none">serctl acl grant &lt;username&gt; &lt;group&gt;</application>			    makes a user member of a group, 			    <application>serctl acl show &lt;username&gt;</application> shows groups			    of which a user is member, and			    <application>serctl acl revoke &lt;username&gt; [&lt;group&gt;]</application>			    revokes user's membership in one or all groups.			    <screen format="linespecific">[jiri@cat sip_router]$ serctl acl grant john intMySql Password: +------+-----+---------------------+| user | grp | last_modified       |

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲免费av高清| 日韩精品中文字幕一区| 国产精品每日更新在线播放网址| 紧缚奴在线一区二区三区| 欧美一区二区免费| 久久99精品视频| 欧美韩国日本不卡| 不卡高清视频专区| 亚洲免费在线观看| 678五月天丁香亚洲综合网| 日韩国产欧美在线视频| 欧美精品一区视频| www.在线成人| 亚洲国产一区在线观看| 欧美一区二区三区视频在线观看| 毛片不卡一区二区| 中文字幕av一区二区三区免费看 | 99在线热播精品免费| 日韩美女视频一区| 欧美日韩精品福利| 国产一区二区伦理片| 国产精品嫩草影院com| 在线视频一区二区三| 日本美女一区二区三区| 久久久五月婷婷| 色综合色综合色综合色综合色综合| 一区二区三区蜜桃网| 日韩午夜精品电影| 99久久精品免费| 日韩激情一区二区| 国产精品卡一卡二| 欧美一区二区三区公司| 成人性视频免费网站| 亚洲国产精品人人做人人爽| 日韩欧美中文字幕精品| 成人国产一区二区三区精品| 日精品一区二区| 中文欧美字幕免费| 欧美一区二区黄| 91视频你懂的| 韩国午夜理伦三级不卡影院| 亚洲女与黑人做爰| 久久综合99re88久久爱| 欧美亚洲动漫另类| 成人激情动漫在线观看| 日韩成人一级片| 亚洲欧美成人一区二区三区| 久久新电视剧免费观看| 欧洲色大大久久| 成人成人成人在线视频| 久久草av在线| 日韩激情中文字幕| 一区二区视频在线| 中文字幕二三区不卡| 日韩欧美一区二区不卡| 欧美视频三区在线播放| 成人免费精品视频| 国产一区二区三区美女| 秋霞午夜av一区二区三区| 亚洲精品国产成人久久av盗摄| 久久久久综合网| 日韩三级在线观看| 欧美私人免费视频| 在线观看视频欧美| 99久久久精品| av不卡免费电影| 国产精品一区在线| 国产在线播精品第三| 日韩国产成人精品| 石原莉奈一区二区三区在线观看| 一区二区三区在线免费观看| 国产精品免费视频一区| 国产免费观看久久| 国产日韩欧美精品在线| 精品少妇一区二区三区日产乱码 | 欧美大片一区二区| 欧美精品久久99久久在免费线| 一本一本久久a久久精品综合麻豆| 国产成人精品免费| 国产成人综合在线观看| 国产乱码精品一品二品| 国产资源在线一区| 国产一区二区网址| 经典一区二区三区| 国产成人亚洲综合a∨婷婷| 国内精品免费**视频| 国产一区二区三区国产| 国产成人免费9x9x人网站视频| 国产黄色精品网站| caoporen国产精品视频| 色综合一区二区| 91久久精品国产91性色tv| 在线免费观看视频一区| 欧美美女一区二区在线观看| 欧美电影一区二区| 日韩欧美国产1| 久久人人超碰精品| 国产精品久线在线观看| 亚洲美女视频在线| 婷婷久久综合九色国产成人| 日韩黄色小视频| 国产精品一二一区| 99久久er热在这里只有精品66| 在线视频一区二区三区| 欧美二区三区的天堂| 亚洲精品在线电影| 国产精品久久久久一区| 亚洲成人在线观看视频| 久久国产精品色婷婷| 国产不卡高清在线观看视频| 精品国产免费一区二区三区四区| 久久久久久久久久久久久久久99| 中文字幕一区日韩精品欧美| 亚洲第一电影网| 国内不卡的二区三区中文字幕 | 国产精品久久久久久久久图文区| 综合色天天鬼久久鬼色| 天堂久久久久va久久久久| 国产一区二区精品久久91| 一本久道中文字幕精品亚洲嫩| 在线观看91av| 国产欧美视频在线观看| 亚洲国产wwwccc36天堂| 国产麻豆午夜三级精品| 欧美亚洲日本国产| 国产网站一区二区| 亚洲国产精品久久久男人的天堂 | 在线亚洲一区二区| 日韩午夜在线观看| 亚洲色图第一区| 国产自产高清不卡| 欧美日韩美女一区二区| 国产日韩欧美在线一区| 亚洲成人先锋电影| av在线播放一区二区三区| 日韩视频123| 亚洲一线二线三线视频| 高清av一区二区| 欧美一级日韩一级| 亚洲韩国精品一区| 91年精品国产| 日本一区二区在线不卡| 免费在线观看一区二区三区| 91久久精品国产91性色tv| 中文字幕精品在线不卡| 紧缚奴在线一区二区三区| 欧美撒尿777hd撒尿| 亚洲视频在线一区| 国产成人啪午夜精品网站男同| 91精品国产全国免费观看| 一区二区三区在线看| 波多野结衣亚洲一区| 久久久久亚洲综合| 国内欧美视频一区二区| 日韩一区二区三区电影| 亚洲成a人片在线不卡一二三区| av色综合久久天堂av综合| 国产日韩高清在线| 国产一区二区在线看| 精品粉嫩超白一线天av| 日韩成人一区二区三区在线观看| 欧美综合色免费| 亚洲激情图片qvod| 91亚洲精品一区二区乱码| 中文字幕永久在线不卡| 成人av免费在线| 国产精品沙发午睡系列990531| 国模大尺度一区二区三区| 精品久久久久久久久久久久包黑料| 婷婷国产在线综合| 91精品国产综合久久久蜜臀粉嫩| 偷窥国产亚洲免费视频| 欧美精品精品一区| 青青青爽久久午夜综合久久午夜| 欧美日韩一本到| 视频一区中文字幕| 欧美一区二区成人| 精品一区二区三区视频在线观看 | 99精品视频一区| 中文字幕色av一区二区三区| 99re热视频精品| 一区二区三区四区视频精品免费| 色天使色偷偷av一区二区| 亚洲国产一区二区在线播放| 9191久久久久久久久久久| 另类调教123区| 久久人人超碰精品| 99久久精品国产导航| 亚洲综合色区另类av| 这里只有精品免费| 美国十次了思思久久精品导航| 久久这里只有精品视频网| av中文字幕一区| 亚洲国产一二三| 精品噜噜噜噜久久久久久久久试看| 国产一区二区调教| 亚洲九九爱视频| 日韩一区二区三区在线观看| 国产精品一级在线| 亚洲影院久久精品|