Email: inbox [at] sysadmin.lk
LinkedIn: https://www.linkedin.com/in/prabatht
Facebook: https://www.facebook.com/prabath.hinoize
Related Articles
Connect Cisco SPA400 SIP Gateway (4 FXO Ports) with Asterisk
On Asterisk /etc/asterisk/sip.conf, you need to configure the account exactly similar to User ID of SPA400 The entries in sip.conf to enable Asterisk register to SPA400 are as follow: [general] register => [email protected]/9000 Replace 9000 with the value you entered in the User ID of SPA400, and replace 192.168.0.2 with the IP address of the […]
Asterisk – Setup Elastix in exist CentOS or VPS
Case 1 (With Elastix Repository) Create new repository vi /etc/yum.repos.d/elastix.repo [elastix-base] name=Base RPM Repository for Elastix mirrorlist=http://mirror.elastix.org/?release=2&arch=$basearch&repo=base #baseurl=http://repo.elastix.org/elastix/2/base/$basearch/ gpgcheck=1 enabled=1 gpgkey=http://repo.elastix.org/elastix/RPM-GPG-KEY-Elastix [elastix-updates] name=Updates RPM Repository for Elastix mirrorlist=http://mirror.elastix.org/?release=2&arch=$basearch&repo=updates #baseurl=http://repo.elastix.org/elastix/2/updates/$basearch/ gpgcheck=1 enabled=1 gpgkey=http://repo.elastix.org/elastix/RPM-GPG-KEY-Elastix [elastix-beta] name=Beta RPM Repository for Elastix mirrorlist=http://mirror.elastix.org/?release=2&arch=$basearch&repo=beta #baseurl=http://repo.elastix.org/elastix/2/beta/$basearch/ gpgcheck=1 enabled=0 gpgkey=http://repo.elastix.org/elastix/RPM-GPG-KEY-Elastix [elastix-extras] name=Extras RPM Repository for Elastix mirrorlist=http://mirror.elastix.org/?release=2&arch=$basearch&repo=extras #baseurl=http://repo.elastix.org/elastix/2/extras/$basearch/ gpgcheck=1 enabled=1 gpgkey=http://repo.elastix.org/elastix/RPM-GPG-KEY-Elastix Install […]
Securing Asterisk IP-PBX with Fail2Ban
What is Fail2Ban? Any service that is exposed to the internet is susceptible to attacks from malicious parties. If your service requires authentication, illegitimate users and bots will attempt to break into your system by repeatedly trying to authenticate using different credentials. A common example of this is with SSH, which will be the subject […]