Table of Contents
List of Examples
A stun server working with the same port as SIP (5060) in order to gain accurate information. The benefit would be an exact external address in the case of NATs translating differently when given different destination ports.
The stun server will use 4 sockets:
The sockets come from existing SIP sockets or are created.
Socket1 must allways be a SIP UDP listener from OpenSIPS.
The server will create a separate process. This process will listen for data on created sockets. The server will register a callback function to SIP. This function is called when a specific (stun)header is found.
This stun implements RFC3489 (and XOR_MAPPED_ADDRESS from RFC5389)
Not supported attributes:
and associated ERROR_CODEs
The ip of the an interface configured as UDP SIP listener in OpenSIPS. It is a mandatory paramter, by default empty.
The port configured (together with the primary_ip) as an UDP SIP listener in OpenSIPS. It is a mandatory paramter, by default 5060.
Another ip from another interface. It is mandatory to be set, default is empty (not set).