What Are You Doing Right Now
-
It's full on Winter outside. . . WTF
@Minion-Queen who did you piss off to cause this?!
-
@rojoloco said in What Are You Doing Right Now:
@rojoloco said in What Are You Doing Right Now:
@dustinb3403 said in What Are You Doing Right Now:
@rojoloco said in What Are You Doing Right Now:
YAY! Partial power outage here. No biggie, it's just the front end of the office... where the server room is. No overhead lights and blaring UPS alarms. I thought Monday was yesterday.
How do you have a partial power outage? This seems more like a breaker box issue than a outage caused by your service provider. . .
Apparently Georgia Power managed to fuck over part of the feed to the building. They expect to have it back on by 1:45, so half the building is on a long lunch.
2 hours after Ga Power's claimed fix it time... Not at all surprised. Still no fucking power. Can I go home?
Are you certain that didn't say 3:30PM Friday the 20th?
-
@dustinb3403 My kids asked me to sing Frosty the Snowman
-
@minion-queen said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
Heading towards 90 today. Just kicked on the AC.
Stuff it. It's snowing... again
Welcome to my yesterday..
-
@jaredbusch said in What Are You Doing Right Now:
@minion-queen said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
Heading towards 90 today. Just kicked on the AC.
Stuff it. It's snowing... again
Welcome to my yesterday..
mine too. I am so over this!
-
Looking up what I open on my firewall for FreePBX.
-
@eddiejennings said in What Are You Doing Right Now:
Looking up what I open on my firewall for FreePBX.
Umm nothing?
-
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
Looking up what I open on my firewall for FreePBX.
Umm nothing?
Methinks VyOS is going to have fun dropping traffic unless I allow some inbound connections to my PBX
-
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
-
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
-
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
The IP phone at my home will need to grab a configuration over the Internet. Also, it will send traffic outbound (inbound to the PBX) to register the extension, will it not?
-
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
The IP phone at my home will need to grab a configuration over the Internet. Also, it will send traffic outbound (inbound to the PBX) to register the extension, will it not?
Then you need 443, 5061, and some range of ports for RTP.
Obviously 443 should hit your reverse proxy. The rest are straight to your PBX.
For the RTP ports, I suggest setting a small range in your phone's config to force it to use a known set of port and then only forward those to reduce the exposure.
-
The PBX itself does not needs SSL installed (self signed is already there).
-
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
The IP phone at my home will need to grab a configuration over the Internet. Also, it will send traffic outbound (inbound to the PBX) to register the extension, will it not?
Then you need 443, 5061, and some range of ports for RTP.
Obviously 443 should hit your reverse proxy. The rest are straight to your PBX.
For the RTP ports, I suggest setting a small range in your phone's config to force it to use a known set of port and then only forward those to reduce the exposure.
That was the plan. I like the idea of reducing the range of ports for RTP.
-
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
The IP phone at my home will need to grab a configuration over the Internet. Also, it will send traffic outbound (inbound to the PBX) to register the extension, will it not?
Then you need 443, 5061, and some range of ports for RTP.
Obviously 443 should hit your reverse proxy. The rest are straight to your PBX.
For the RTP ports, I suggest setting a small range in your phone's config to force it to use a known set of port and then only forward those to reduce the exposure.
That was the plan. I like the idea of reducing the range of ports for RTP.
Note, I said 5061 and not 5060. That is the TLS port for PJSIP.
You don't' want your phone sending its login over clear text do you?
-
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
The IP phone at my home will need to grab a configuration over the Internet. Also, it will send traffic outbound (inbound to the PBX) to register the extension, will it not?
Then you need 443, 5061, and some range of ports for RTP.
Obviously 443 should hit your reverse proxy. The rest are straight to your PBX.
For the RTP ports, I suggest setting a small range in your phone's config to force it to use a known set of port and then only forward those to reduce the exposure.
That was the plan. I like the idea of reducing the range of ports for RTP.
Note, I said 5061 and not 5060. That is the TLS port for PJSIP.
You don't' want your phone sending it's login over clear text do you?
I do not, another good idea. On that note, will Yealink phones gripe about the fact that the PBX is presenting a self-signed cert?
-
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
@jaredbusch said in What Are You Doing Right Now:
@eddiejennings said in What Are You Doing Right Now:
I suppose I could attach the NIC of FreePBX to the NIC on my host using macvtap, and bypass my firewall VM.
My point was why are you needing to open something INBOUND
The IP phone at my home will need to grab a configuration over the Internet. Also, it will send traffic outbound (inbound to the PBX) to register the extension, will it not?
Then you need 443, 5061, and some range of ports for RTP.
Obviously 443 should hit your reverse proxy. The rest are straight to your PBX.
For the RTP ports, I suggest setting a small range in your phone's config to force it to use a known set of port and then only forward those to reduce the exposure.
That was the plan. I like the idea of reducing the range of ports for RTP.
Note, I said 5061 and not 5060. That is the TLS port for PJSIP.
You don't' want your phone sending it's login over clear text do you?
I do not, another good idea. On that note, will Yealink phones gripe about the fact that the PBX is presenting a self-signed cert?
No.
-
Signing up as a new user & typing this!
-
Headed to Syracuse office today to install network gear
-
Good morning!