similar to: Grandstream Early Dial

Displaying 7 results from an estimated 7 matches similar to: "Grandstream Early Dial"

2016 Feb 19
2
Grandstream Early Dial
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Le 18/02/2016 11:03, Richard Mudgett a ?crit : > I've been using Grandstream phones for more than 10 years, but onl y > yesterday tried to use Early Dial... and I failed. What is needed on the > Asterisk side to reply 484 to INVITE? Phones are talking to chan_p jsip > on Asterisk-13.7.1. > > > Look into the
2014 Nov 24
1
"!" in dial-pattern not work with overlap dialing
hello all i want to have overlap dialing in asterisk. it works fine if i don't have "!" in my pattern. for example pattern "07." works fine and i can call 07122 by overlap dialing via it. but if i define "07!" i can't call 07122 because it doesn't wait to collect all digits and therefore call 07. if i define "07.!" it works fine again and
2016 Feb 19
2
Grandstream Early Dial
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Bryant, Thanks for your reply. It didn't work immediately, I had to create a second context, or else it was looping between the second and first line. This seems to work: [earlydial] ; Test Early Dial exten => _.,1,Set(l_Extension=${EXTEN}) exten => _.,n,Goto(earlydial2,${l_Extension},1) [earlydial2] exten => _.,n,Goto(noMatch,1)
2016 Feb 04
0
Asterisk 11.6-cert12, 11.21.1, 13.1-cert3, 13.7.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified Asterisk 11.6 and 13.1 and Asterisk 11 and 13. The available security releases are released as versions 11.6-cert12, 11.21.1, 13.1-cert3, and 13.7.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The release of these versions resolves the following
2016 Feb 04
0
AST-2016-002: File descriptor exhaustion in chan_sip
Asterisk Project Security Advisory - AST-2016-002 Product Asterisk Summary File descriptor exhaustion in chan_sip Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Minor
2016 Feb 04
0
AST-2016-003: Remote crash vulnerability when receiving UDPTL FAX data.
Asterisk Project Security Advisory - AST-2016-003 Product Asterisk Summary Remote crash vulnerability when receiving UDPTL FAX data. Nature of Advisory Denial of Service Susceptibility Remote
2016 Feb 04
0
AST-2016-001: BEAST vulnerability in HTTP server
Asterisk Project Security Advisory - AST-2016-001 Product Asterisk Summary BEAST vulnerability in HTTP server Nature of Advisory Unauthorized data disclosure due to man-in-the-middle attack Susceptibility Remote