Displaying 7 results from an estimated 7 matches similar to: "Grandstream Early Dial"
2016 Feb 19
2
Grandstream Early Dial
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Le 18/02/2016 11:03, Richard Mudgett a ?crit :
> I've been using Grandstream phones for more than 10 years, but onl
y
> yesterday tried to use Early Dial... and I failed. What is needed
on the
> Asterisk side to reply 484 to INVITE? Phones are talking to chan_p
jsip
> on Asterisk-13.7.1.
>
>
> Look into the
2014 Nov 24
1
"!" in dial-pattern not work with overlap dialing
hello all
i want to have overlap dialing in asterisk. it works fine if i don't have
"!" in my pattern. for example pattern "07." works fine and i can call
07122 by overlap dialing via it. but if i define "07!" i can't call 07122
because it doesn't wait to collect all digits and therefore call 07. if i
define "07.!" it works fine again and
2016 Feb 19
2
Grandstream Early Dial
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Bryant,
Thanks for your reply.
It didn't work immediately, I had to create a second context, or else it
was looping between the second and first line. This seems to work:
[earlydial] ; Test Early Dial
exten => _.,1,Set(l_Extension=${EXTEN})
exten => _.,n,Goto(earlydial2,${l_Extension},1)
[earlydial2]
exten => _.,n,Goto(noMatch,1)
2016 Feb 04
0
Asterisk 11.6-cert12, 11.21.1, 13.1-cert3, 13.7.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 11.6 and 13.1 and Asterisk 11 and 13. The available security releases
are released as versions 11.6-cert12, 11.21.1, 13.1-cert3, and 13.7.1.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these versions resolves the following
2016 Feb 04
0
AST-2016-002: File descriptor exhaustion in chan_sip
Asterisk Project Security Advisory - AST-2016-002
Product Asterisk
Summary File descriptor exhaustion in chan_sip
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Minor
2016 Feb 04
0
AST-2016-003: Remote crash vulnerability when receiving UDPTL FAX data.
Asterisk Project Security Advisory - AST-2016-003
Product Asterisk
Summary Remote crash vulnerability when receiving UDPTL FAX
data.
Nature of Advisory Denial of Service
Susceptibility Remote
2016 Feb 04
0
AST-2016-001: BEAST vulnerability in HTTP server
Asterisk Project Security Advisory - AST-2016-001
Product Asterisk
Summary BEAST vulnerability in HTTP server
Nature of Advisory Unauthorized data disclosure due to
man-in-the-middle attack
Susceptibility Remote