SIP Scanner hell again
Hortoristic:
Been some time since I've messed with call strings but I'm being attacked by:
From 'ipphone' SP2(ipphone)
Here is my X_InboundCallRoute (partial):
{(x|xx|xxx|xxxx|xxxx|xxxxxx|un@@.):},{ph}
Since "ipphone" meets the string setting "xxxxxxx" - it's considered valid, so it rings.
The X_InboundCallRoute has worked for me for years; can I just somehow block any names like "ipphone"?
Sorry for rookie questions; just been awhile.
Hortoristic:
I'm taking a shot and testing if this one works:
I think the ipphon@@. part will block anything that begins with ipphone
{(x|xx|xxx|xxxx|xxxx|xxxxxx|ipphon@@.|un@@.):},{ph}
Hortoristic:
Since I was getting a call every 5 minutes and haven't for 15 minutes; I'm guessing my change worked.
Can anyone clarify this is how I block callers too?
Would this change block any calls from: 2534876767
{(x|xx|xxx|xxxx|xxxx|xxxxxx|ipphon@@.|un@@.|2534876767):},{ph}
Taoman:
Who is your provider? Do they have few enough SIP server IP addresses that you can use X_AccessList?
gderf:
The 'Oleg Method' would probably be a better approach if it can be used.
Navigation
[0] Message Index
[#] Next page