SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Asterisk Quick Start Guide

What is Asterisk?

Asterisk is an open source framework for building communications applications. Asterisk turns
an ordinary computer into a communications server. Asterisk powers IP PBX systems, VoIP
gateways, conference servers and more. It is used by small businesses, large businesses, call
centers, carriers and governments worldwide. Asterisk is free and open source. Asterisk is
sponsored by Digium, the Asterisk Company. Asterisk is “under the hood” in countless voice
communications applications and is capable of interfacing with many traditional Telcom
protocols, VoIP protocols, and codecs. Asterisk provides a staggering list of capabilities and
features including:
IVR
ACD
Audio and Video Conferencing
Voicemail
Call Recording
Fax termination
CDR

About this Quick Start Guide
This guide provides step-by-step instructions for compiling and installing Asterisk. Also included
are basic instructions on controlling Asterisk via its Command Line Interface, or CLI. Sample
Asterisk configuration and SIP soft-phone configuration will also be presented. This will
culminate in your ability to dial over the internet using the IAX2 protocol to Digium.
For further reading, a wealth of resources including information on Commercial Support
provided by Digium, The Asterisk Company can be found at:

http://www.asterisk.org/support
NOTE: Any server accessible from the public Internet should be security hardened, and an

Asterisk is no exception. General security best practices are not within the scope of this Quick
Start Guide; however you may see Table 2 for default IP ports utilized by Asterisk.
Instructions are provided for the Long Term Support (LTS) version of Asterisk, which is currently
1.8.

Copyright ©2012 Digium, The Asterisk Company

1
Asterisk Quick Start Guide

File Structure
The table below contains the default installation paths for Asterisk component files and libraries.
This is not an exhaustive list, only the core components relative to this Quick Start Guide are
listed:
Table 1

Default Installation Paths

Path
/etc/asterisk
/usr/sbin
/var/log/asterisk
/usr/lib/asterisk/modules

Description
Configuration files
Location of binary executable
message(error) logs and CDR
Component module libraries

Default Ports
Protocol
SIP
IAX2
MGCP
SCCP
RTP
Manager
H323
Dundi
Unistim

Port number
5060/5061
4569
2727
2000
10,00 – 20,000
5038
1720
4520
5000

Transport
TCP/UDP
UDP
UDP
TCP
UDP
TCP
TCP
UDP
UDP

Requirements
Asterisk can run on multiple base architectures including embedded systems and there are no
strict requirements on CPU speed or memory size. This document assumes the use of a
standard x86 based processor.
Asterisk can run on a number of Operating Systems. Linux is the only officially supported OS,
and it is recommended to use a 2.6.25 or higher kernel (although Asterisk will run on 2.4
kernels). A current and supported release of distributions such as CentOS or Debian is
recommended.
An Internet connection is also required.

Copyright ©2012 Digium, The Asterisk Company

2
Asterisk Quick Start Guide

Dependencies
There are a number of packages that are required to be pre installed on the host server to
ensure that Asterisk will compile successfully. This Guide provides instructions for obtaining
these packages for RedHat and Debian Distributions.

Downloading
The Asterisk source packages are available at: http://www.asterisk.org/downloads
1. Log in to your Linux machine as the ‘root’ user (superuser). If you are using Ubuntu
Linux log in as normal and prefix each command with ‘sudo.

2. If you are using an X window system, open a terminal window.

3. Download the ‘current’ Asterisk source tarball to the host machine. This will download
the latest (minor) version:

root@localhost:~# cd /usr/src
root@localhost:/usr/src# wget http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.8-current.tar.gz

4. Unzip and extract all of the contained source files:

root@localhost:/usr/src# tar –zxvf asterisk-1.8-current.tar.gz

5. Enter the newly created source directory and execute the ‘install_prereq’ in the
contrib/scripts subdirectory. This will not only install the required dependencies but also
install all packages necessary to build all option Asterisk components.

Copyright ©2012 Digium, The Asterisk Company

3
Asterisk Quick Start Guide

root@localhost:/usr/src# cd /asterisk-1.8.16.0
root@localhost:/usr/src/asterisk-1.8.16.0# ./contrib/scripts/install_prereq

Compiling and Installing
6. Issue each of these commands in sequence:

root@localhost:/usr/src/asterisk-1.8.16.0# ./configure
root@localhost:/usr/src/asterisk-1.8.16.0# make
root@localhost:/usr/src/asterisk-1.8.16.0# make install
root@localhost:/usr/src/asterisk-1.8.16.0# make samples

Configuring Asterisk (demo config)
The previous command ‘make samples’ created sample configuration files in the default
directory ‘/etc/asterisk/’. The commands below show how to create backups of some of these
files and how to create new simplified configuration for demo or testing purposes.

7. Issue each command as shown. The ‘mv’ (move) command is used here to rename
(backup) the provided sample configuration files:

root@localhost:/user/src/asterisk-1.8.16.0#
root@localhost:/etc/asterisk# mv modules.conf modules.conf.sample
root@localhost:/etc/asterisk# mv extensions.conf extensions.conf.sample
root@localhost:/etc/asterisk# mv sip.conf sip.conf.sample
root@localhost:/etc/asterisk# mv iax.conf iax.conf.sample

Copyright ©2012 Digium, The Asterisk Company

4
Asterisk Quick Start Guide

8. Edit ‘modules.conf’ and paste in the configuration provided. The ubiquitous WYSYWG
editor ‘gedit’ is used for example, although any editor will do. Save the file when done
editing:

root@localhost:/etc/asterisk# gedit modules.conf

[modules]
autoload=no
load=pbx_config.so
load=chan_sip.so
Getting Help
load=chan_iax2.so
load=res_rtp_asterisk.so
load=app_hangup.so
load=app_dial.so
load=codec_ulaw.so
load=codec_gsm.so

9. Repeat for ‘extensions.conf:’

root@localhost:/etc/asterisk# gedit extensions.conf

[default]
exten => _.,1,Hangup()
[demo]
exten => 2600,1,Dial(IAX2/guest@pbx.digium.com/s@default)
same => n,Hangup()

Copyright ©2012 Digium, The Asterisk Company

5
Asterisk Quick Start Guide

10. Repeat for ‘sip.conf:

root@localhost:/etc/asterisk# gedit sip.conf

[general]
context=default
allowguest=no
[test_phone_<RANDOM_STRING_1>]
type=friend
host=dynamic
secret= <RANDOM_STRING_2>
context=demo

11. Replace ‘<RANDOM_STRING_X>’ with an actual randomly generated string. You can
create these random strings of letters and numbers at http://www.random.org/strings/

NOTE: IF YOU DO NOT REPLACE THE <RANDOM_STRING> YOUR MACHINE IS
VERY LIKELY TO BE COMPROMISED!!

12. Finally, Configure ‘iax.conf’:

root@localhost:/etc/asterisk# gedit iax.conf

[demo]
type=peer
username=asterisk
secret=supersecret
host=216.207.245.47

Copyright ©2012 Digium, The Asterisk Company

6
Asterisk Quick Start Guide

Configuring a SIP client
There are myriad freely available VoIP clients. The soft-phone used in this example, Zoiper, is
available for Linux, Windows, and Mac OS. No preference or endorsement is implied. The
instructions provided are for Linux only.

13. Download, unzip, and extract the zoiper executable as described. Execute each
command in order:

root@localhost:/etc/asterisk# cd /usr/src
root@localhost:/usr/src# wget http://www.zoiper.com/downloads/free/linux/zoiper219-linux.tar.gz
root@localhost:/usr/src# tar –zxvf zoiper219-linux.tar.gz

14. Execute the binary ‘zoiper. That is extracted into the ‘/usr/src’ directory:

root@localhost:/usr/src# ./zoiper

15. Click the highlighted ‘options’ button:

Copyright ©2012 Digium, The Asterisk Company

7
Asterisk Quick Start Guide

16. Click ‘Add new SIP account’

Copyright ©2012 Digium, The Asterisk Company

8
Asterisk Quick Start Guide

17. Enter the SIP account name that matches ‘test_phone_<RANDOM_STRING_1>’ in
‘/etc/asterisk/sip.conf’.
NOTE: Do NOT use the account name exactly as seen below. Create your OWN
random string. If you copy the account name below your machine will VERY LIKELY
be compromised!

Copyright ©2012 Digium, The Asterisk Company

9
Asterisk Quick Start Guide

18. Enter the account information.
a. ‘Domain’ must match the IP Address of the Asterisk server
b. ‘Username’ must match the account name (including random string) that you
created.
c. ‘Password’ must match the ‘secret’ you created in ‘/etc/asterisk/sip.conf’. This
should be a random string!
d. ‘Caller ID Name’ can be whatever you like

Copyright ©2012 Digium, The Asterisk Company

10
Asterisk Quick Start Guide

19. Check the highlighted ‘Show advanced options’ checkbox:

Copyright ©2012 Digium, The Asterisk Company

11
Asterisk Quick Start Guide

20. Click ‘SIP options’:

Copyright ©2012 Digium, The Asterisk Company

12
Asterisk Quick Start Guide

21. Change ‘Port’ to ‘5070’. Click ‘Save’. This is only necessary if the Zoiper client is running
on the host machine running Asterisk.

Copyright ©2012 Digium, The Asterisk Company

13
Asterisk Quick Start Guide

Making a Test Call
22. Start the Asterisk daemon by simply issuing the ‘asterisk’ command at the terminal. You
should see no message output, and are returned to a Linux prompt:

root@localhost:/usr/src# asterisk
root@localhost:/usr/src#

You are now be able to place a test call. Dial the configured extension ‘2600’ from the softphone. This will dial to a Digium server using the IAX2 protocol and you will hear Digium’s main
IVR menu.
You now have a running Asterisk server and a configured phone, as well as sample
configuration. The extent of what you can do with Asterisk is only limited by your imagination!

Copyright ©2012 Digium, The Asterisk Company

14
Asterisk Quick Start Guide

Appendix A – The Asterisk CLI

1. Connecting to the Asterisk CLI
There are many options that you can apply following the ‘asterisk’ command at the Linux
terminal. A few of the most common and useful are listed and described below. You can see a
detailed list of all the valid options by running ‘asterisk –h’.
asterisk –r
If you’ve started Asterisk using a script or by running ‘asterisk’ at the Linux terminal, you
can then connect to that running instance of asterisk with the ‘-r’ option. You will be
presented license and warranty information, followed by the CLI prompt:

root@localhost:/usr/src# asterisk -r
Asterisk 1.8.16.0, Copyright (C) 1999 - 2012 Digium, Inc. and others.
Created by Mark Spencer <markster@digium.com>
Asterisk comes with ABSOLUTELY NO WARRANTY; type 'core show warranty' for details.
This is free software, with components licensed under the GNU General Public
License version 2 and other licenses; you are welcome to redistribute it under
certain conditions. Type 'core show license' for details.
=========================================================================
Connected to Asterisk 1.8.16.0 currently running on localhost(pid = 80085)
localhost*CLI>

asterisk –c

Starts Asterisk in console mode. This assumes you have not already started asterisk as
a background daemon process by running ‘asterisk’ (or a script). You will immediately
be connected to the Asterisk CLI. Run ‘core stop now’ at the CLI to be end the process
and return to the Linux prompt.

Copyright ©2012 Digium, The Asterisk Company

15
Asterisk Quick Start Guide

asterisk –x
This will issue a valid CLI command to Asterisk and provide the standard output to the
Terminal. This should be immediately followed by the CLI command in quotes e.g.
‘asterisk –x “sip show peers”’

2. Helpful CLI Commands

core show help
lists valid CLI commands.

core restart now
Immediately restarts Asterisk. You will exit the CLI and be returned to the Linux prompt.

core stop now
Immediately stops Asterisk. You will exit the CLI and be returned to the Linux prompt.

sip show peers
Lists all configured SIP devices. The output includes the account name used for a given
device and its IP address.
dialplan show
Displays all of the active (in memory) dialplan. This includes, but is not limited to, the
configuration contained in ‘/etc/asterisk/extensions.conf’.

Copyright ©2012 Digium, The Asterisk Company

16

Contenu connexe

Tendances

Configuring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IOConfiguring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IOHoàng Hải Nguyễn
 
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
FreeBSD on Cavium ThunderX System on a Chip
FreeBSD on Cavium ThunderX System on a ChipFreeBSD on Cavium ThunderX System on a Chip
FreeBSD on Cavium ThunderX System on a ChipSemihalf
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSECVic Hargrave
 
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoShakacon
 
10 techniques from hacking labs1.3 miss confsp4
10 techniques from hacking labs1.3 miss confsp410 techniques from hacking labs1.3 miss confsp4
10 techniques from hacking labs1.3 miss confsp4Manich Koomsusi
 
Incident Response: Tunnelling
Incident Response: TunnellingIncident Response: Tunnelling
Incident Response: TunnellingNapier University
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsNapier University
 
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...IT Tech
 
Network Device Development - Part 5: Firewall 104 ~ Packet Splitter
Network Device Development - Part 5: Firewall 104 ~ Packet SplitterNetwork Device Development - Part 5: Firewall 104 ~ Packet Splitter
Network Device Development - Part 5: Firewall 104 ~ Packet SplitterCheng-Yi Yu
 
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...Cheng-Yi Yu
 
Karl Grzeszczak: September Docker Presentation at Mediafly
Karl Grzeszczak: September Docker Presentation at MediaflyKarl Grzeszczak: September Docker Presentation at Mediafly
Karl Grzeszczak: September Docker Presentation at MediaflyMediafly
 
Chicago Docker Meetup Presentation - Mediafly
Chicago Docker Meetup Presentation - MediaflyChicago Docker Meetup Presentation - Mediafly
Chicago Docker Meetup Presentation - MediaflyMediafly
 
Distributed Compiler Icecc
Distributed Compiler IceccDistributed Compiler Icecc
Distributed Compiler IceccSZ Lin
 
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix LinuxHardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix LinuxSecurity Session
 

Tendances (19)

Configuring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IOConfiguring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IO
 
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
FreeBSD on Cavium ThunderX System on a Chip
FreeBSD on Cavium ThunderX System on a ChipFreeBSD on Cavium ThunderX System on a Chip
FreeBSD on Cavium ThunderX System on a Chip
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
 
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
 
10 techniques from hacking labs1.3 miss confsp4
10 techniques from hacking labs1.3 miss confsp410 techniques from hacking labs1.3 miss confsp4
10 techniques from hacking labs1.3 miss confsp4
 
SIEM
SIEMSIEM
SIEM
 
Incident Response: Tunnelling
Incident Response: TunnellingIncident Response: Tunnelling
Incident Response: Tunnelling
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network Forensics
 
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
 
Network Device Development - Part 5: Firewall 104 ~ Packet Splitter
Network Device Development - Part 5: Firewall 104 ~ Packet SplitterNetwork Device Development - Part 5: Firewall 104 ~ Packet Splitter
Network Device Development - Part 5: Firewall 104 ~ Packet Splitter
 
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
 
Karl Grzeszczak: September Docker Presentation at Mediafly
Karl Grzeszczak: September Docker Presentation at MediaflyKarl Grzeszczak: September Docker Presentation at Mediafly
Karl Grzeszczak: September Docker Presentation at Mediafly
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 
Chicago Docker Meetup Presentation - Mediafly
Chicago Docker Meetup Presentation - MediaflyChicago Docker Meetup Presentation - Mediafly
Chicago Docker Meetup Presentation - Mediafly
 
Distributed Compiler Icecc
Distributed Compiler IceccDistributed Compiler Icecc
Distributed Compiler Icecc
 
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix LinuxHardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix Linux
 
presentation
presentationpresentation
presentation
 

Similaire à Asterisk quick start Guide

Telephony Service Development on Asterisk Platform
Telephony Service Development on Asterisk PlatformTelephony Service Development on Asterisk Platform
Telephony Service Development on Asterisk PlatformHamid Fadishei
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkLT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkIndonesia Network Operators Group
 
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsIDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsAffan Basalamah
 
Wireshark and asterisk
Wireshark and asteriskWireshark and asterisk
Wireshark and asteriskMohsin Zahid
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rulesFreddy Buenaño
 
Asterisksecuritykingasterisk 130723131448-phpapp01
Asterisksecuritykingasterisk 130723131448-phpapp01Asterisksecuritykingasterisk 130723131448-phpapp01
Asterisksecuritykingasterisk 130723131448-phpapp01King Astreisk Technologies
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsOlle E Johansson
 
Installation of DAHDI, libpri and Asterisk
Installation of DAHDI, libpri and Asterisk Installation of DAHDI, libpri and Asterisk
Installation of DAHDI, libpri and Asterisk CaudalFin Technologies
 
IoT Getting Started with Intel® IoT Devkit
IoT Getting Started with Intel® IoT DevkitIoT Getting Started with Intel® IoT Devkit
IoT Getting Started with Intel® IoT DevkitVasily Ryzhonkov
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort webhostingguy
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort webhostingguy
 
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5armmbed
 
DPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabDPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabMichelle Holley
 

Similaire à Asterisk quick start Guide (20)

Telephony Service Development on Asterisk Platform
Telephony Service Development on Asterisk PlatformTelephony Service Development on Asterisk Platform
Telephony Service Development on Asterisk Platform
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your networkLT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
LT04 IDNOG04 - Affan Basalamah (ITB) - Documenting your network
 
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple StepsIDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
IDNOG 4 Lightning Talks - Documenting your Network in 3 Simple Steps
 
Wireshark and asterisk
Wireshark and asteriskWireshark and asterisk
Wireshark and asterisk
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
Esp8266 v12
Esp8266 v12Esp8266 v12
Esp8266 v12
 
What Is IVR ?
What Is IVR ?What Is IVR ?
What Is IVR ?
 
Asterisksecuritykingasterisk 130723131448-phpapp01
Asterisksecuritykingasterisk 130723131448-phpapp01Asterisksecuritykingasterisk 130723131448-phpapp01
Asterisksecuritykingasterisk 130723131448-phpapp01
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installations
 
Installation of DAHDI, libpri and Asterisk
Installation of DAHDI, libpri and Asterisk Installation of DAHDI, libpri and Asterisk
Installation of DAHDI, libpri and Asterisk
 
Book
BookBook
Book
 
IoT Getting Started with Intel® IoT Devkit
IoT Getting Started with Intel® IoT DevkitIoT Getting Started with Intel® IoT Devkit
IoT Getting Started with Intel® IoT Devkit
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
 
DPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabDPDK in Containers Hands-on Lab
DPDK in Containers Hands-on Lab
 

Dernier

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

Dernier (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

Asterisk quick start Guide

  • 1. Asterisk Quick Start Guide What is Asterisk? Asterisk is an open source framework for building communications applications. Asterisk turns an ordinary computer into a communications server. Asterisk powers IP PBX systems, VoIP gateways, conference servers and more. It is used by small businesses, large businesses, call centers, carriers and governments worldwide. Asterisk is free and open source. Asterisk is sponsored by Digium, the Asterisk Company. Asterisk is “under the hood” in countless voice communications applications and is capable of interfacing with many traditional Telcom protocols, VoIP protocols, and codecs. Asterisk provides a staggering list of capabilities and features including: IVR ACD Audio and Video Conferencing Voicemail Call Recording Fax termination CDR About this Quick Start Guide This guide provides step-by-step instructions for compiling and installing Asterisk. Also included are basic instructions on controlling Asterisk via its Command Line Interface, or CLI. Sample Asterisk configuration and SIP soft-phone configuration will also be presented. This will culminate in your ability to dial over the internet using the IAX2 protocol to Digium. For further reading, a wealth of resources including information on Commercial Support provided by Digium, The Asterisk Company can be found at: http://www.asterisk.org/support NOTE: Any server accessible from the public Internet should be security hardened, and an Asterisk is no exception. General security best practices are not within the scope of this Quick Start Guide; however you may see Table 2 for default IP ports utilized by Asterisk. Instructions are provided for the Long Term Support (LTS) version of Asterisk, which is currently 1.8. Copyright ©2012 Digium, The Asterisk Company 1
  • 2. Asterisk Quick Start Guide File Structure The table below contains the default installation paths for Asterisk component files and libraries. This is not an exhaustive list, only the core components relative to this Quick Start Guide are listed: Table 1 Default Installation Paths Path /etc/asterisk /usr/sbin /var/log/asterisk /usr/lib/asterisk/modules Description Configuration files Location of binary executable message(error) logs and CDR Component module libraries Default Ports Protocol SIP IAX2 MGCP SCCP RTP Manager H323 Dundi Unistim Port number 5060/5061 4569 2727 2000 10,00 – 20,000 5038 1720 4520 5000 Transport TCP/UDP UDP UDP TCP UDP TCP TCP UDP UDP Requirements Asterisk can run on multiple base architectures including embedded systems and there are no strict requirements on CPU speed or memory size. This document assumes the use of a standard x86 based processor. Asterisk can run on a number of Operating Systems. Linux is the only officially supported OS, and it is recommended to use a 2.6.25 or higher kernel (although Asterisk will run on 2.4 kernels). A current and supported release of distributions such as CentOS or Debian is recommended. An Internet connection is also required. Copyright ©2012 Digium, The Asterisk Company 2
  • 3. Asterisk Quick Start Guide Dependencies There are a number of packages that are required to be pre installed on the host server to ensure that Asterisk will compile successfully. This Guide provides instructions for obtaining these packages for RedHat and Debian Distributions. Downloading The Asterisk source packages are available at: http://www.asterisk.org/downloads 1. Log in to your Linux machine as the ‘root’ user (superuser). If you are using Ubuntu Linux log in as normal and prefix each command with ‘sudo. 2. If you are using an X window system, open a terminal window. 3. Download the ‘current’ Asterisk source tarball to the host machine. This will download the latest (minor) version: root@localhost:~# cd /usr/src root@localhost:/usr/src# wget http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.8-current.tar.gz 4. Unzip and extract all of the contained source files: root@localhost:/usr/src# tar –zxvf asterisk-1.8-current.tar.gz 5. Enter the newly created source directory and execute the ‘install_prereq’ in the contrib/scripts subdirectory. This will not only install the required dependencies but also install all packages necessary to build all option Asterisk components. Copyright ©2012 Digium, The Asterisk Company 3
  • 4. Asterisk Quick Start Guide root@localhost:/usr/src# cd /asterisk-1.8.16.0 root@localhost:/usr/src/asterisk-1.8.16.0# ./contrib/scripts/install_prereq Compiling and Installing 6. Issue each of these commands in sequence: root@localhost:/usr/src/asterisk-1.8.16.0# ./configure root@localhost:/usr/src/asterisk-1.8.16.0# make root@localhost:/usr/src/asterisk-1.8.16.0# make install root@localhost:/usr/src/asterisk-1.8.16.0# make samples Configuring Asterisk (demo config) The previous command ‘make samples’ created sample configuration files in the default directory ‘/etc/asterisk/’. The commands below show how to create backups of some of these files and how to create new simplified configuration for demo or testing purposes. 7. Issue each command as shown. The ‘mv’ (move) command is used here to rename (backup) the provided sample configuration files: root@localhost:/user/src/asterisk-1.8.16.0# root@localhost:/etc/asterisk# mv modules.conf modules.conf.sample root@localhost:/etc/asterisk# mv extensions.conf extensions.conf.sample root@localhost:/etc/asterisk# mv sip.conf sip.conf.sample root@localhost:/etc/asterisk# mv iax.conf iax.conf.sample Copyright ©2012 Digium, The Asterisk Company 4
  • 5. Asterisk Quick Start Guide 8. Edit ‘modules.conf’ and paste in the configuration provided. The ubiquitous WYSYWG editor ‘gedit’ is used for example, although any editor will do. Save the file when done editing: root@localhost:/etc/asterisk# gedit modules.conf [modules] autoload=no load=pbx_config.so load=chan_sip.so Getting Help load=chan_iax2.so load=res_rtp_asterisk.so load=app_hangup.so load=app_dial.so load=codec_ulaw.so load=codec_gsm.so 9. Repeat for ‘extensions.conf:’ root@localhost:/etc/asterisk# gedit extensions.conf [default] exten => _.,1,Hangup() [demo] exten => 2600,1,Dial(IAX2/guest@pbx.digium.com/s@default) same => n,Hangup() Copyright ©2012 Digium, The Asterisk Company 5
  • 6. Asterisk Quick Start Guide 10. Repeat for ‘sip.conf: root@localhost:/etc/asterisk# gedit sip.conf [general] context=default allowguest=no [test_phone_<RANDOM_STRING_1>] type=friend host=dynamic secret= <RANDOM_STRING_2> context=demo 11. Replace ‘<RANDOM_STRING_X>’ with an actual randomly generated string. You can create these random strings of letters and numbers at http://www.random.org/strings/ NOTE: IF YOU DO NOT REPLACE THE <RANDOM_STRING> YOUR MACHINE IS VERY LIKELY TO BE COMPROMISED!! 12. Finally, Configure ‘iax.conf’: root@localhost:/etc/asterisk# gedit iax.conf [demo] type=peer username=asterisk secret=supersecret host=216.207.245.47 Copyright ©2012 Digium, The Asterisk Company 6
  • 7. Asterisk Quick Start Guide Configuring a SIP client There are myriad freely available VoIP clients. The soft-phone used in this example, Zoiper, is available for Linux, Windows, and Mac OS. No preference or endorsement is implied. The instructions provided are for Linux only. 13. Download, unzip, and extract the zoiper executable as described. Execute each command in order: root@localhost:/etc/asterisk# cd /usr/src root@localhost:/usr/src# wget http://www.zoiper.com/downloads/free/linux/zoiper219-linux.tar.gz root@localhost:/usr/src# tar –zxvf zoiper219-linux.tar.gz 14. Execute the binary ‘zoiper. That is extracted into the ‘/usr/src’ directory: root@localhost:/usr/src# ./zoiper 15. Click the highlighted ‘options’ button: Copyright ©2012 Digium, The Asterisk Company 7
  • 8. Asterisk Quick Start Guide 16. Click ‘Add new SIP account’ Copyright ©2012 Digium, The Asterisk Company 8
  • 9. Asterisk Quick Start Guide 17. Enter the SIP account name that matches ‘test_phone_<RANDOM_STRING_1>’ in ‘/etc/asterisk/sip.conf’. NOTE: Do NOT use the account name exactly as seen below. Create your OWN random string. If you copy the account name below your machine will VERY LIKELY be compromised! Copyright ©2012 Digium, The Asterisk Company 9
  • 10. Asterisk Quick Start Guide 18. Enter the account information. a. ‘Domain’ must match the IP Address of the Asterisk server b. ‘Username’ must match the account name (including random string) that you created. c. ‘Password’ must match the ‘secret’ you created in ‘/etc/asterisk/sip.conf’. This should be a random string! d. ‘Caller ID Name’ can be whatever you like Copyright ©2012 Digium, The Asterisk Company 10
  • 11. Asterisk Quick Start Guide 19. Check the highlighted ‘Show advanced options’ checkbox: Copyright ©2012 Digium, The Asterisk Company 11
  • 12. Asterisk Quick Start Guide 20. Click ‘SIP options’: Copyright ©2012 Digium, The Asterisk Company 12
  • 13. Asterisk Quick Start Guide 21. Change ‘Port’ to ‘5070’. Click ‘Save’. This is only necessary if the Zoiper client is running on the host machine running Asterisk. Copyright ©2012 Digium, The Asterisk Company 13
  • 14. Asterisk Quick Start Guide Making a Test Call 22. Start the Asterisk daemon by simply issuing the ‘asterisk’ command at the terminal. You should see no message output, and are returned to a Linux prompt: root@localhost:/usr/src# asterisk root@localhost:/usr/src# You are now be able to place a test call. Dial the configured extension ‘2600’ from the softphone. This will dial to a Digium server using the IAX2 protocol and you will hear Digium’s main IVR menu. You now have a running Asterisk server and a configured phone, as well as sample configuration. The extent of what you can do with Asterisk is only limited by your imagination! Copyright ©2012 Digium, The Asterisk Company 14
  • 15. Asterisk Quick Start Guide Appendix A – The Asterisk CLI 1. Connecting to the Asterisk CLI There are many options that you can apply following the ‘asterisk’ command at the Linux terminal. A few of the most common and useful are listed and described below. You can see a detailed list of all the valid options by running ‘asterisk –h’. asterisk –r If you’ve started Asterisk using a script or by running ‘asterisk’ at the Linux terminal, you can then connect to that running instance of asterisk with the ‘-r’ option. You will be presented license and warranty information, followed by the CLI prompt: root@localhost:/usr/src# asterisk -r Asterisk 1.8.16.0, Copyright (C) 1999 - 2012 Digium, Inc. and others. Created by Mark Spencer <markster@digium.com> Asterisk comes with ABSOLUTELY NO WARRANTY; type 'core show warranty' for details. This is free software, with components licensed under the GNU General Public License version 2 and other licenses; you are welcome to redistribute it under certain conditions. Type 'core show license' for details. ========================================================================= Connected to Asterisk 1.8.16.0 currently running on localhost(pid = 80085) localhost*CLI> asterisk –c Starts Asterisk in console mode. This assumes you have not already started asterisk as a background daemon process by running ‘asterisk’ (or a script). You will immediately be connected to the Asterisk CLI. Run ‘core stop now’ at the CLI to be end the process and return to the Linux prompt. Copyright ©2012 Digium, The Asterisk Company 15
  • 16. Asterisk Quick Start Guide asterisk –x This will issue a valid CLI command to Asterisk and provide the standard output to the Terminal. This should be immediately followed by the CLI command in quotes e.g. ‘asterisk –x “sip show peers”’ 2. Helpful CLI Commands core show help lists valid CLI commands. core restart now Immediately restarts Asterisk. You will exit the CLI and be returned to the Linux prompt. core stop now Immediately stops Asterisk. You will exit the CLI and be returned to the Linux prompt. sip show peers Lists all configured SIP devices. The output includes the account name used for a given device and its IP address. dialplan show Displays all of the active (in memory) dialplan. This includes, but is not limited to, the configuration contained in ‘/etc/asterisk/extensions.conf’. Copyright ©2012 Digium, The Asterisk Company 16