| 
									
										
										
										
											2003-05-16 02:50:46 +00:00
										 |  |  | ; | 
					
						
							|  |  |  | ; RTP Configuration | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | [general] | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; RTP start and RTP end configure start and end addresses | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2005-05-16 13:22:34 +00:00
										 |  |  | ; Defaults are rtpstart=5000 and rtpend=31000 | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2003-05-16 02:50:46 +00:00
										 |  |  | rtpstart=10000 | 
					
						
							|  |  |  | rtpend=20000 | 
					
						
							| 
									
										
										
										
											2004-07-17 21:08:12 +00:00
										 |  |  | ; | 
					
						
							|  |  |  | ; Whether to enable or disable UDP checksums on RTP traffic | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ;rtpchecksums=no | 
					
						
							| 
									
										
										
										
											2005-11-01 00:06:43 +00:00
										 |  |  | ; | 
					
						
							|  |  |  | ; The amount of time a DTMF digit with no 'end' marker should be | 
					
						
							|  |  |  | ; allowed to continue (in 'samples', 1/8000 of a second) | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ;dtmftimeout=3000 | 
					
						
							| 
									
										
										
										
											2009-05-28 14:39:21 +00:00
										 |  |  | ; rtcpinterval = 5000 	; Milliseconds between rtcp reports | 
					
						
							|  |  |  | 			;(min 500, max 60000, default 5000) | 
					
						
							| 
									
										
										
										
											2008-01-24 17:47:50 +00:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2017-12-11 18:20:06 -06:00
										 |  |  | ; Enable strict RTP protection.  This will drop RTP packets that do not come | 
					
						
							| 
									
										
										
										
											2021-10-30 21:04:38 -04:00
										 |  |  | ; from the recognized source of the RTP stream.  Strict RTP qualifies RTP | 
					
						
							| 
									
										
										
										
											2017-12-11 18:20:06 -06:00
										 |  |  | ; packet stream sources before accepting them upon initial connection and | 
					
						
							|  |  |  | ; when the connection is renegotiated (e.g., transfers and direct media). | 
					
						
							|  |  |  | ; Initial connection and renegotiation starts a learning mode to qualify | 
					
						
							|  |  |  | ; stream source addresses.  Once Asterisk has recognized a stream it will | 
					
						
							|  |  |  | ; allow other streams to qualify and replace the current stream for 5 | 
					
						
							|  |  |  | ; seconds after starting learning mode.  Once learning mode completes the | 
					
						
							|  |  |  | ; current stream is locked in and cannot change until the next | 
					
						
							|  |  |  | ; renegotiation. | 
					
						
							| 
									
										
										
										
											2018-09-10 11:28:09 -05:00
										 |  |  | ; Valid options are "no" to disable strictrtp, "yes" to enable strictrtp, | 
					
						
							|  |  |  | ; and "seqno", which does the same thing as strictrtp=yes, but only checks | 
					
						
							|  |  |  | ; to make sure the sequence number is correct rather than checking the time | 
					
						
							|  |  |  | ; interval as well. | 
					
						
							| 
									
										
										
										
											2017-12-11 18:20:06 -06:00
										 |  |  | ; This option is enabled by default. | 
					
						
							| 
									
										
										
										
											2008-01-24 17:47:50 +00:00
										 |  |  | ; strictrtp=yes | 
					
						
							| 
									
										
										
										
											2012-01-17 17:15:05 +00:00
										 |  |  | ; | 
					
						
							|  |  |  | ; Number of packets containing consecutive sequence values needed | 
					
						
							|  |  |  | ; to change the RTP source socket address. This option only comes | 
					
						
							|  |  |  | ; into play while using strictrtp=yes. Consider changing this value | 
					
						
							|  |  |  | ; if rtp packets are dropped from one or both ends after a call is | 
					
						
							|  |  |  | ; connected. This option is set to 4 by default. | 
					
						
							|  |  |  | ; probation=8 | 
					
						
							| 
									
										
										
										
											2012-07-01 17:28:57 +00:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2021-01-26 10:09:53 -07:00
										 |  |  | ; Enable sRTP replay protection. Buggy SIP user agents (UAs) reset the | 
					
						
							|  |  |  | ; sequence number (RTP-SEQ) on a re-INVITE, for example, with Session Timers | 
					
						
							|  |  |  | ; or on Call Hold/Resume, but keep the synchronization source (RTP-SSRC). If | 
					
						
							|  |  |  | ; the new RTP-SEQ is higher than the previous one, the call continues if the | 
					
						
							|  |  |  | ; roll-over counter (sRTP-ROC) is zero (the call lasted less than 22 minutes). | 
					
						
							|  |  |  | ; In all other cases, the call faces one-way audio or even no audio at all. | 
					
						
							|  |  |  | ; "replay check failed (index too old)" gets printed continuously. This is a | 
					
						
							|  |  |  | ; software bug. You have to report this to the creator of that UA. Until it is | 
					
						
							|  |  |  | ; fixed, you could disable sRTP replay protection (see RFC 3711 section 3.3.2). | 
					
						
							|  |  |  | ; This option is enabled by default. | 
					
						
							|  |  |  | ; srtpreplayprotection=yes | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2017-12-04 15:33:16 +01:00
										 |  |  | ; Whether to enable or disable ICE support. This option is enabled by default. | 
					
						
							|  |  |  | ; icesupport=false | 
					
						
							| 
									
										
										
										
											2012-07-01 17:28:57 +00:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2012-09-24 12:42:19 +00:00
										 |  |  | ; Hostname or address for the STUN server used when determining the external | 
					
						
							|  |  |  | ; IP address and port an RTP session can be reached at. The port number is | 
					
						
							|  |  |  | ; optional. If omitted the default value of 3478 will be used. This option is | 
					
						
							| 
									
										
										
										
											2021-04-05 15:06:38 -04:00
										 |  |  | ; disabled by default. Name resolution will occur at load time, and if DNS is | 
					
						
							|  |  |  | ; used, name resolution will occur repeatedly after the TTL expires. | 
					
						
							| 
									
										
										
										
											2012-09-24 12:42:19 +00:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2024-09-25 11:54:01 +02:00
										 |  |  | ; e.g. stunaddr=mystun.server.com:3478 | 
					
						
							| 
									
										
										
										
											2012-09-24 12:42:19 +00:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2012-07-01 17:28:57 +00:00
										 |  |  | ; stunaddr= | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2017-04-07 16:14:16 -05:00
										 |  |  | ; Some multihomed servers have IP interfaces that cannot reach the STUN | 
					
						
							|  |  |  | ; server specified by stunaddr.  Blacklist those interface subnets from | 
					
						
							|  |  |  | ; trying to send a STUN packet to find the external IP address. | 
					
						
							|  |  |  | ; Attempting to send the STUN packet needlessly delays processing incoming | 
					
						
							|  |  |  | ; and outgoing SIP INVITEs because we will wait for a response that can | 
					
						
							|  |  |  | ; never come until we give up on the response. | 
					
						
							|  |  |  | ; * Multiple subnets may be listed. | 
					
						
							|  |  |  | ; * Blacklisting applies to IPv4 only.  STUN isn't needed for IPv6. | 
					
						
							|  |  |  | ; * Blacklisting applies when binding RTP to specific IP addresses and not | 
					
						
							|  |  |  | ; the wildcard 0.0.0.0 address.  e.g., A PJSIP endpoint binding RTP to a | 
					
						
							|  |  |  | ; specific address using the bind_rtp_to_media_address and media_address | 
					
						
							|  |  |  | ; options.  Or the PJSIP endpoint specifies an explicit transport that binds | 
					
						
							| 
									
										
										
										
											2019-11-27 15:54:39 +02:00
										 |  |  | ; to a specific IP address.  Blacklisting is done via ACL infrastructure | 
					
						
							|  |  |  | ; so it's possible to whitelist as well. | 
					
						
							| 
									
										
										
										
											2017-04-07 16:14:16 -05:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-11-27 15:54:39 +02:00
										 |  |  | ; stun_acl = named_acl | 
					
						
							|  |  |  | ; stun_deny = 0.0.0.0/0 | 
					
						
							|  |  |  | ; stun_permit = 1.2.3.4/32 | 
					
						
							| 
									
										
										
										
											2017-04-07 16:14:16 -05:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-11-27 15:54:39 +02:00
										 |  |  | ; For historic reasons stun_blacklist is an alias for stun_deny. | 
					
						
							| 
									
										
										
										
											2017-04-07 16:14:16 -05:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2021-05-19 20:13:36 +02:00
										 |  |  | ; Whether to report the PJSIP version in a SOFTWARE attribute for all | 
					
						
							|  |  |  | ; outgoing STUN packets. This option is enabled by default. | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; stun_software_attribute=yes | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2012-09-24 12:42:19 +00:00
										 |  |  | ; Hostname or address for the TURN server to be used as a relay. The port | 
					
						
							|  |  |  | ; number is optional. If omitted the default value of 3478 will be used. | 
					
						
							|  |  |  | ; This option is disabled by default. | 
					
						
							| 
									
										
										
										
											2012-07-01 17:28:57 +00:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2012-09-24 12:42:19 +00:00
										 |  |  | ; e.g. turnaddr=myturn.server.com:34780 | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; turnaddr= | 
					
						
							| 
									
										
										
										
											2012-07-01 17:28:57 +00:00
										 |  |  | ; | 
					
						
							|  |  |  | ; Username used to authenticate with TURN relay server. | 
					
						
							|  |  |  | ; turnusername= | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; Password used to authenticate with TURN relay server. | 
					
						
							|  |  |  | ; turnpassword= | 
					
						
							| 
									
										
										
										
											2016-01-27 11:44:10 -05:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-11-27 15:54:39 +02:00
										 |  |  | ; An ACL can be used to determine which discovered addresses to include for | 
					
						
							|  |  |  | ; ICE, srflx and relay discovery.  This is useful to optimize the ICE process | 
					
						
							|  |  |  | ; where a system has multiple host address ranges and/or physical interfaces | 
					
						
							|  |  |  | ; and certain of them are not expected to be used for RTP. For example, VPNs | 
					
						
							|  |  |  | ; and local interconnections may not be suitable or necessary for ICE. Multiple | 
					
						
							|  |  |  | ; subnets may be listed. If left unconfigured, all discovered host addresses | 
					
						
							|  |  |  | ; are used. | 
					
						
							| 
									
										
										
										
											2016-10-05 12:24:54 +13:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-11-27 15:54:39 +02:00
										 |  |  | ; ice_acl = named_acl | 
					
						
							|  |  |  | ; ice_deny = 0.0.0.0/0 | 
					
						
							|  |  |  | ; ice_permit = 1.2.3.4/32 | 
					
						
							| 
									
										
										
										
											2016-10-05 12:24:54 +13:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-11-27 15:54:39 +02:00
										 |  |  | ; For historic reasons ice_blacklist is an alias for ice_deny. | 
					
						
							| 
									
										
										
										
											2016-10-05 12:24:54 +13:00
										 |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-06-11 09:26:42 -03:00
										 |  |  | ; The MTU to use for DTLS packet fragmentation. This option is set to 1200 | 
					
						
							|  |  |  | ; by default. The minimum MTU is 256. | 
					
						
							|  |  |  | ; dtls_mtu = 1200 | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2016-01-27 11:44:10 -05:00
										 |  |  | [ice_host_candidates] | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; When Asterisk is behind a static one-to-one NAT and ICE is in use, ICE will | 
					
						
							|  |  |  | ; expose the server's internal IP address as one of the host candidates. | 
					
						
							|  |  |  | ; Although using STUN (see the 'stunaddr' configuration option) will provide a | 
					
						
							|  |  |  | ; publicly accessible IP, the internal IP will still be sent to the remote | 
					
						
							|  |  |  | ; peer. To help hide the topology of your internal network, you can override | 
					
						
							|  |  |  | ; the host candidates that Asterisk will send to the remote peer. | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; IMPORTANT: Only use this functionality when your Asterisk server is behind a | 
					
						
							|  |  |  | ; one-to-one NAT and you know what you're doing. If you do define anything | 
					
						
							|  |  |  | ; here, you almost certainly will NOT want to specify 'stunaddr' or 'turnaddr' | 
					
						
							|  |  |  | ; above. | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ; The format for these overrides is: | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-05-17 17:44:37 -06:00
										 |  |  | ;    <local address> => <advertised address>,[include_local_address] | 
					
						
							| 
									
										
										
										
											2016-01-27 11:44:10 -05:00
										 |  |  | ; | 
					
						
							|  |  |  | ; The following will replace 192.168.1.10 with 1.2.3.4 during ICE | 
					
						
							|  |  |  | ; negotiation: | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ;192.168.1.10 => 1.2.3.4 | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2019-05-17 17:44:37 -06:00
										 |  |  | ; The following will include BOTH 192.168.1.10 and 1.2.3.4 during ICE | 
					
						
							|  |  |  | ; negotiation instead of replacing 192.168.1.10.  This can make it easier | 
					
						
							|  |  |  | ; to serve both local and remote clients. | 
					
						
							|  |  |  | ; | 
					
						
							|  |  |  | ;192.168.1.10 => 1.2.3.4,include_local_address | 
					
						
							|  |  |  | ; | 
					
						
							| 
									
										
										
										
											2016-01-27 11:44:10 -05:00
										 |  |  | ; You can define an override for more than 1 interface if you have a multihomed | 
					
						
							|  |  |  | ; server. Any local interface that is not matched will be passed through | 
					
						
							|  |  |  | ; unaltered. Both IPv4 and IPv6 addresses are supported. |