GSM/3G User Manual
43 | 82
Table 4-6 Definition of IAX2 Options
Authenication name in your IAX2 server
Authenticating with the gateway and characters are allowed.
None --- Not registering;
Endpoint registers with this gateway --- When register as this type,
it means the GSM/3G gateway acts as a IAX2 server, and IAX2
endpoints register to the gateway;
This gateway registers with the endpoint --- When register as this
type, it means the GSM/3G gateway acts as a IAX2 client, and the
endpoint should be register to a IAX2 server;
IP address or hostname of the endpoint or 'dynamic' if the endpoint
has a dynamic IP address. This will require registration.
There are three authentication methods that are supported: md5,
plaintext and rsa. The least secure is "plaintext", which sends
passwords cleartext across the net. "md5" uses a challenge/response
md5 sum arrangement, but still requires both ends have plain text
access to the secret. "rsa" allows unidirectional secret knowledge
through public/private keys.If "rsa" authentication is used, "inkeys" is a
list of acceptable public keys on the local system that can be used to
authenticate the remote peer, separated by the ":" character. "outkey"
is a single, private key to use to authenticate to the other side.
This application allows you to transfer calls.
"trunk=yes" Purpose: To obtain a better chart of actual bandwidth
usage per codec as seen "on-the-wire" when using IAX2 trunking
between two Asterisk telephony servers.