Calling name over H323 between CCME and Panasonic NCP

Unanswered Question
Jun 17th, 2010
User Badges:


Hi Guys



After many days banging my head against the wall I've manged to get a Panasonic NCP 500 and a Cisco 2811(running c2800nm-adventerprisek9-mz.151-1.T) and CCME 7.0.1.1 to call each other over H323.



Now the call works both ways however I'm unable to get the Calling Name displayed in either direction.  After many hours researching this on the net it would seem that it's because the calling display is populated in an ISDN messages in the Display Information Element (IE) of the Q.931 Setup packet.




The following commands appear to resolve this on a serial interface :



voice service voip
h323
h225 display-ie ccm-compatible
int s0/0/0:23
isdn supplementary-service name calling



However unfortunately "isdn supplementary-service name calling" is not supported on Fast Ethernet ports.  Does anyone know of another way of getting this information to display as I've got 99% of the functionality working now and this wold be the icing on the cake?



Many Thanks in Advance




Tim

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
Aaron Harrison Fri, 06/18/2010 - 04:24
User Badges:
  • Super Bronze, 10000 points or more
  • Community Spotlight Award,

    Member's Choice, May 2015

Hi Tim


Can you enable these commands on the CME GW:


debug cch323

debug h225 asn1

debug h225 events


Make a test call in each direction, and post back?


Aaron

timothyshipp Fri, 06/18/2010 - 04:31
User Badges:

Hi Aaron


For some reason my router is not showing any debugging despite having the following turned on:


DIALPEER:

  debug voip dialpeer inout is ON (filter is OFF)

H.225:

  H.225 Event Messages debugging is on

  H.225 ASN1 Messages debugging is on

H.323 RAS:

  H.323 RAS Messages debugging is on

Voice call trap  debugging is ON


CCAPI:

  debug voip ccapi inout is ON (filter is OFF)

CCH323 SPI: H225 State Machine tracing is enabled (filter is OFF)

CCH323 SPI: H245 State Machine tracing is enabled (filter is OFF)

CCH323 SPI: RAS State Machine tracing is enabled (filter is OFF)

CCH323 SPI: NXE transport tracing is enabled

CCH323 SPI: Session tracing is enabled (filter is OFF)

CCH323 SPI: Error debug is enabled

CCH323 SPI: Rawmsg debug is enabled (filter is OFF)

CCH323 SPI: Call Capacity Information tracing is enabled (filter is OFF)

CCH323 SPI: Preauth debug is enabled (filter is OFF)

CCH323 SPI: IP-to-IP call debug is enabled (filter is OFF)

CCH323 SPI: H245 Video tracing is enabled (filter is OFF)



DSM:

  debug voip dsm dsp is ON (filter is OFF)



Any ideas on why it's not outputting as I've had to resort to wireshark?


Thanks


Tim

Aaron Harrison Fri, 06/18/2010 - 04:37
User Badges:
  • Super Bronze, 10000 points or more
  • Community Spotlight Award,

    Member's Choice, May 2015

Hi Tim


If you are connecting via telnet or SSH you need to type 'term mon' to output debug info to your session.


If there's still no output, do a 'show logging' and post that back.


Regards


Aaron

timothyshipp Fri, 06/18/2010 - 04:39
User Badges:

thanks Aaron


Every days a school day!


from Panasonic to CME:



*Jun 18 12:02:08.767: //238/0020D49D2041/H323/send_notify_msg: [cnum]/[oct]/[oct3a] = [302]/[0x00]/[0x00]
*Jun 18 12:02:08.767: H225 NONSTD OUTGOING PDU ::=


value H323_UU_NonStdInfo ::=
    {
      callSignallingParam
      {
        connectedNumber '4C050000333032'H
      }
    }




*Jun 18 12:02:08.767: H225 NONSTD OUTGOING ENCODE BUFFER::= 8182000943004C050000333032
*Jun 18 12:02:08.767:
*Jun 18 12:02:08.767: compose_TunnelledSignallingMessage_ciscoNo tunnelled content.
*Jun 18 12:02:08.767: H225.0 OUTGOING PDU ::=


value H323_UserInformation ::=
    {
      h323-uu-pdu
      {
        h323-message-body notify :
        {
          protocolIdentifier { 0 0 8 2250 0 4 }
          callIdentifier
          {
            guid '0020D49DB255B81F2040F58AFB187157'H
          }
        }
        h245Tunneling FALSE
        nonStandardControl
        {


          {
            nonStandardIdentifier h221NonStandard :
            {
              t35CountryCode 181
              t35Extension 0
              manufacturerCode 18
            }
            data '8182000943004C050000333032'H
          }
        }
      }
    }




*Jun 18 12:02:08.771: H225.0 OUTGOING ENCODE BUFFER::= 28501900060008914A0004000020D49DB255B81F2040F58AFB18715710A00100140140B50000120D8182000943004C050000333032
*Jun 18 12:02:08.771:
Hex representation of the NOTIFY TPKT to send.: 0802824B6E2701F1280650686F6E65327E00360528501900060008914A0004000020D49DB255B81F2040F58AFB18715710A00100140140B50000120D8182000943004C050000333032
h225NotifyRequest: Q.931 NOTIFY sent from fd=2
*Jun 18 12:02:08.771: //239/0020D49D2041/CCAPI/cc_api_caps_ack:
   Destination Interface=0x4924A54C, Destination Call Id=238, Source Call Id=239,
   Caps(Codec=g729r8(0x4), Fax Rate=Invalid(0x0), Fax Version:=0, Vad=OFF(0x1),
   Modem=OFF(0x0), Codec Bytes=20, Signal Type=2, Seq Num Start=1786)
*Jun 18 12:02:08.771: //238/0020D49D2041/H323/cch323_peer_caps_ack: Sending caps resp event to CAP sm
*Jun 18 12:02:08.775: //238/0020D49D2041/H323/cch323_peer_caps_ack: ccb not interested in caps_ack primitive
*Jun 18 12:02:08.775: //238/0020D49D2041/CCAPI/cc_process_notify_bridge_done:
   Conference Id=0x4C, Call Id1=238, Call Id2=239
*Jun 18 12:02:08.775: //239/0020D49D2041/CCAPI/cc_api_voice_mode_event:
   Call Id=239
*Jun 18 12:02:08.775: //239/0020D49D2041/CCAPI/cc_api_voice_mode_event:
   Call Entry(Context=0x48325ED0)
*Jun 18 12:02:11.935: //-1/xxxxxxxxxxxx/H323/cch323_indicate_rt_packet_stats: callID=238
*Jun 18 12:02:11.935: //-1/xxxxxxxxxxxx/H323/cch323_do_process_statistics: Entry, call_id=238
*Jun 18 12:02:12.143: //239/0020D49D2041/CCAPI/cc_api_call_disconnected:
   Cause Value=16, Interface=0x4B1ABD44, Call Id=239
*Jun 18 12:02:12.143: //239/0020D49D2041/CCAPI/cc_api_call_disconnected:
   Call Entry(Responsed=TRUE, Cause Value=16, Retry Count=0)
*Jun 18 12:02:12.143: //238/0020D49D2041/CCAPI/ccConferenceDestroy:
   Conference Id=0x4C, Tag=0x0
*Jun 18 12:02:12.143: tdiff:177490692 tx1:163 rx1:164 pps1:50 ve:0 exp_p1:10604 pmc:1


*Jun 18 12:02:12.147: Potential Mute Call:
*Jun 18 12:02:12.147: CallID1=238; CallID2=239; ConfID=76
*Jun 18 12:02:12.147: Leg 1: CallID=238; TX packets: 163; RX packets: 164
*Jun 18 12:02:12.147: Leg 2: CallID=239; TX packets: 160; RX packets: 158
*Jun 18 12:02:12.147: //238/xxxxxxxxxxxx/CCAPI/cc_api_bridge_drop_done:
   Conference Id=0x4C, Source Interface=0x4924A54C, Source Call Id=238,
   Destination Call Id=239, Disposition=0x0, Tag=0x0
*Jun 18 12:02:12.147: //239/xxxxxxxxxxxx/CCAPI/cc_api_bridge_drop_done:
   Conference Id=0x4C, Source Interface=0x4B1ABD44, Source Call Id=239,
   Destination Call Id=238, Disposition=0x0, Tag=0x0
*Jun 18 12:02:12.147: //238/0020D49D2041/CCAPI/cc_generic_bridge_done:
   Conference Id=0x4C, Source Interface=0x4B1ABD44, Source Call Id=239,
   Destination Call Id=238, Disposition=0x0, Tag=0x0
*Jun 18 12:02:12.151: //-1/xxxxxxxxxxxx/H323/cch323_post_call_statistics: callID=238
*Jun 18 12:02:12.151: //238/0020D49D2041/CCAPI/ccCallDisconnect:
   Cause Value=16, Tag=0x0, Call Entry(Previous Disconnect Cause=0, Disconnect Cause=0)
*Jun 18 12:02:12.151: //238/0020D49D2041/CCAPI/ccCallDisconnect:
   Cause Value=16, Call Entry(Responsed=TRUE, Cause Value=16)
*Jun 18 12:02:12.151: //238/0020D49D2041/CCAPI/cc_api_get_transfer_info:
   Transfer Number Is Null
*Jun 18 12:02:12.151: //239/0020D49D2041/CCAPI/ccCallDisconnect:
   Cause Value=16, Tag=0x0, Call Entry(Previous Disconnect Cause=0, Disconnect Cause=16)
*Jun 18 12:02:12.151: //239/0020D49D2041/CCAPI/ccCallDisconnect:
   Cause Value=16, Call Entry(Responsed=TRUE, Cause Value=16)
*Jun 18 12:02:12.151: //239/0020D49D2041/CCAPI/cc_api_get_transfer_info:
   Transfer Number Is Null
*Jun 18 12:02:12.155: //-1/xxxxxxxxxxxx/H323/cch323_do_get_call_statistics: Entry, call_id=238
*Jun 18 12:02:12.155: //238/0020D49D2041/H323/cch323_do_get_call_statistics: Stats requested for callID=238
*Jun 18 12:02:12.155: //238/0020D49D2041/H323/cch323_do_call_disconnect: gw_id=1, discCause=16
*Jun 18 12:02:12.155: //-1/xxxxxxxxxxxx/H323/cch323_indicate_rt_packet_stats: callID=238
*Jun 18 12:02:12.159: //239/0020D49D2041/CCAPI/cc_api_call_feature:
   Feature Type=6, Interface=0x4B1ABD44, Call Id=239
*Jun 18 12:02:12.159: //-1/xxxxxxxxxxxx/H323/cch323_do_process_statistics: Entry, call_id=238
*Jun 18 12:02:12.163: //238/0020D49D2041/CCAPI/cc_api_get_transfer_info:
   Transfer Number Is Null
*Jun 18 12:02:12.163: //238/0020D49D2041/H323/cch323_do_call_disconnect: gw_id=1, discCause=16
*Jun 18 12:02:12.163: //-1/xxxxxxxxxxxx/H323/cch323_iev_queue_service: Dispatch 0x9 internal event to H225 SM
*Jun 18 12:02:12.163: //238/0020D49D2041/H323/run_h225_sm: Received event H225_EV_RELEASE while at state H225_ACTIVE
*Jun 18 12:02:12.163: //238/0020D49D2041/H323/cch323_h225_send_release: Cause = 16; Location = 0
*Jun 18 12:02:12.163: //238/0020D49D2041/H323/cch323_h225_send_release: h225TerminateRequest: src address = -1062726455; dest address = 192.168.20.210
*Jun 18 12:02:12.163: compose_TunnelledSignallingMessage_ciscoNo tunnelled content.
*Jun 18 12:02:12.163: H225.0 OUTGOING PDU ::=


value H323_UserInformation ::=
    {
      h323-uu-pdu
      {
        h323-message-body releaseComplete :
        {
          protocolIdentifier { 0 0 8 2250 0 4 }
          callIdentifier
          {
            guid '0020D49DB255B81F2040F58AFB187157'H
          }
        }
        h245Tunneling FALSE
      }
    }




*Jun 18 12:02:12.163: H225.0 OUTGOING ENCODE BUFFER::= 2580060008914A0004110011000020D49DB255B81F2040F58AFB18715710800100
*Jun 18 12:02:12.163:
Hex representation of the RELEASE COMPLETE TPKT to send.: 0802824B5A080280907E0022052580060008914A0004110011000020D49DB255B81F2040F58AFB18715710800100
h225TerminateRequest: Q.931 RELEASE COMPLETE sent from fd=2. Call state changed to [Null].
*Jun 18 12:02:12.167: //238/0020D49D2041/H323/cch323_h225_set_new_state: Changing from H225_ACTIVE state to H225_IDLE state
*Jun 18 12:02:12.167: //238/0020D49D2041/H323/cch323_call_generic_cleanup: Disconnected flag 1
*Jun 18 12:02:12.167: //238/0020D49D2041/H323/cch323_store_call_history_entry: Trying to store call history/remove call_info while RTP session exists
*Jun 18 12:02:12.167: //238/0020D49D2041/H323/cch323_store_call_history_entry: Call Active Playout Mode: 1,Init 60, Min 40, Max 1000, Fax 300
*Jun 18 12:02:12.167: //238/0020D49D2041/H323/cch323_store_call_history_entry: Call History Playout Mode: 1,Init 60, Min 40, Max 1000, Fax 300
*Jun 18 12:02:12.167: //-1/xxxxxxxxxxxx/H323/h323_gw_clean_send_blocked_watch: fd 2
*Jun 18 12:02:12.167: h323chan_close: TCP connection from fd=2 closed
*Jun 18 12:02:12.167: //238/0020D49D2041/H323/run_h245_iwf_sm: received IWF_EV_H245_DISCONN while at state IWF_ACTIVE
*Jun 18 12:02:12.171: //238/0020D49D2041/H323/cch323_send_event_to_h245_connection_sm: Changing to new event H245_DISCONNECT_EVENT
*Jun 18 12:02:12.171: //238/0020D49D2041/H323/cch323_h245_connection_sm: state=2, event=4, ccb=483C50AC, listen state=0
*Jun 18 12:02:12.171: //238/0020D49D2041/H323/cch323_h245_connection_sm: H245_CONNECT: Received event H245_DISCONNECT_EVENT while at H245_CONNECTED state
*Jun 18 12:02:12.171: //-1/xxxxxxxxxxxx/H323/h323_gw_clean_send_blocked_watch: fd 3
*Jun 18 12:02:12.171: h323chan_close: TCP connection from fd=3 closed
*Jun 18 12:02:12.171: //238/0020D49D2041/H323/h245_iwf_set_new_state: changing from IWF_ACTIVE state to IWF_IDLE state
*Jun 18 12:02:12.171: //-1/xxxxxxxxxxxx/H323/cch323_cleanup_xport: hashDestroy for TcpFDTbl
*Jun 18 12:02:12.171: //238/0020D49D2041/CCAPI/cc_api_call_disconnect_done:
   Disposition=0, Interface=0x4924A54C, Tag=0x0, Call Id=238,
   Call Entry(Disconnect Cause=16, Voice Class Cause Code=0, Retry Count=0)
*Jun 18 12:02:12.171: //238/0020D49D2041/CCAPI/cc_api_call_disconnect_done:
   Call Disconnect Event Sent
*Jun 18 12:02:12.171: //-1/xxxxxxxxxxxx/CCAPI/cc_free_feature_vsa:


*Jun 18 12:02:12.171: :cc_free_feature_vsa freeing 4B9CFEE8
*Jun 18 12:02:12.171: //-1/xxxxxxxxxxxx/CCAPI/cc_free_feature_vsa:


*Jun 18 12:02:12.171:  vsacount in free is 1
*Jun 18 12:02:12.171: //-1/xxxxxxxxxxxx/H323/cch323_call_generic_cleanup: Freeing ccb (0x483C50AC)
*Jun 18 12:02:12.183: //239/0020D49D2041/CCAPI/cc_api_call_disconnect_done:
   Disposition=0, Interface=0x4B1ABD44, Tag=0x0, Call Id=239,
   Call Entry(Disconnect Cause=16, Voice Class Cause Code=0, Retry Count=0)
*Jun 18 12:02:12.183: //239/0020D49D2041/CCAPI/cc_api_call_disconnect_done:
   Call Disconnect Event Sent
*Jun 18 12:02:12.183: //-1/xxxxxxxxxxxx/CCAPI/cc_free_feature_vsa:


*Jun 18 12:02:12.183: :cc_free_feature_vsa freeing 4B9D0188
*Jun 18 12:02:12.183: //-1/xxxxxxxxxxxx/CCAPI/cc_free_feature_vsa:


*Jun 18 12:02:12.183:  vsacount in free is 0

timothyshipp Fri, 06/18/2010 - 04:49
User Badges:

Cisco to Panasonic:


          reason undefinedReason : NULL
          callIdentifier
          {
            guid '9637847F7A0911DF800985425A005AEC'H
          }
          multipleCalls FALSE
          maintainConnection TRUE
          featureSet
          {
            replacementFeatureSet FALSE
            neededFeatures
            {
            }
            desiredFeatures
            {
            }
            supportedFeatures
            {
            }
          }
        }
        h245Tunneling FALSE
        tunnelledSignallingMessage
        {
          tunnelledProtocolID
          {
            id tunnelledProtocolObjectID : { 1 3 12 9 }
          }
          messageContent
          {
            '0801814508028190'H
          }
        }
      }
    }




*Jun 18 12:12:28.719: //-1/xxxxxxxxxxxx/H323/cch323_h225_receiver: Received msg of type FACILIND_CHOSEN
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_prnt_rawmsg: (for facility_ind): raw message is 26 bytes:
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_prnt_rawmsg:     1C 18 9E 01 08 31 2E 33 2E 31 32 2E 39 00 00 00
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_prnt_rawmsg:     00 08 08 01 81 45 08 02 81 90
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_h225_receiver: FACILIND_CHOSEN: src address = 192.168.20.201; dest address = 192.168.20.211
*Jun 18 12:12:28.719: //4/9636E8578007/H323/run_h225_sm: Received event H225_EV_FACILITY_IND while at state H225_ACTIVE
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_prnt_rawmsg: (for facility_notify): raw message is 26 bytes:
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_prnt_rawmsg:     1C 18 9E 01 08 31 2E 33 2E 31 32 2E 39 00 00 00
*Jun 18 12:12:28.719: //4/9636E8578007/H323/cch323_prnt_rawmsg:     00 08 08 01 81 45 08 02 81 90
*Jun 18 12:12:29.427: //-1/xxxxxxxxxxxx/H323/cch323_indicate_rt_packet_stats: callID=4
*Jun 18 12:12:29.431: //-1/xxxxxxxxxxxx/H323/cch323_do_process_statistics: Entry, call_id=4
*Jun 18 12:12:29.707: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 2 Event 0x1
*Jun 18 12:12:29.707: h323chan_chn_process_read_socket: fd=2 of type CONNECTED has data


*Jun 18 12:12:29.707: //-1/xxxxxxxxxxxx/H323/cch323_gw_process_read_socket: owner_data=0x4B845328, len=53, msgPtr=0x4B8062F8
*Jun 18 12:12:29.707: //-1/xxxxxxxxxxxx/H323/cch323_gw_process_read_socket: Received msg for H.225
Hex representation of the SETUP TPKT received: 080280025A080280907E0029052580060008914A0005110911009637847F7A0911DF800985425A005AEC0140047000000010800100
h225ParseData: Q.931 RELEASE COMPLETE received on fd=2
*Jun 18 12:12:29.707: H225.0 INCOMING ENCODE BUFFER::= 2580060008914A0005110911009637847F7A0911DF800985425A005AEC0140047000000010800100
*Jun 18 12:12:29.707:
*Jun 18 12:12:29.707: H225.0 INCOMING PDU ::=


value H323_UserInformation ::=
    {
      h323-uu-pdu
      {
        h323-message-body releaseComplete :
        {
          protocolIdentifier { 0 0 8 2250 0 5 }
          callIdentifier
          {
            guid '9637847F7A0911DF800985425A005AEC'H
          }
          screeningIndicator 2
          featureSet
          {
            replacementFeatureSet FALSE
            neededFeatures
            {
            }
            desiredFeatures
            {
            }
            supportedFeatures
            {
            }
          }
        }
        h245Tunneling FALSE
      }
    }




*Jun 18 12:12:29.711: //-1/xxxxxxxxxxxx/H323/cch323_h225_receiver: Received msg of type RELEASEIND_CHOSEN
*Jun 18 12:12:29.711: //4/9636E8578007/H323/release_ind: Disconnect cause 16 location code 0
*Jun 18 12:12:29.711: //-1/xxxxxxxxxxxx/H323/h323_set_release_source_for_peer: ownCallId[4], src[4]
*Jun 18 12:12:29.711: //4/9636E8578007/H323/cch323_h225_receiver: RELEASEIND_CHOSEN: src address = 192.168.20.201; dest address = 192.168.20.211
*Jun 18 12:12:29.711: //4/9636E8578007/H323/run_h225_sm: Received event H225_EV_RELEASE_IND while at state H225_ACTIVE
*Jun 18 12:12:29.711: //4/9636E8578007/H323/cch323_traverse_enum_contact_list: State = 9
*Jun 18 12:12:29.711: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 3 Event 0x1
*Jun 18 12:12:29.711: h323chan_chn_process_read_socket: fd=3 of type CONNECTED has data


*Jun 18 12:12:29.711: //-1/xxxxxxxxxxxx/H323/cch323_gw_process_read_socket: owner_data=0x483E11A4, len=8, msgPtr=0x4B81B454
*Jun 18 12:12:29.711: //-1/xxxxxxxxxxxx/H323/cch323_gw_process_read_socket: Received msg for H.245
*Jun 18 12:12:29.711: //4/9636E8578007/H323/h245_olc_in_sm: Received H245_EV_OLC_CLC_IND while at state H245_OLC_IN_STATE_ESTABLISHED
*Jun 18 12:12:29.715: //4/9636E8578007/H323/h245_olc_in_set_new_state: Changing from H245_OLC_IN_STATE_ESTABLISHED state to H245_OLC_IN_STATE_IDLE state
*Jun 18 12:12:29.715: //-1/xxxxxxxxxxxx/H323/cch323_iev_queue_service: Dispatch 0x1C internal event to H245 IWF SM
*Jun 18 12:12:29.715: //4/9636E8578007/H323/run_h245_iwf_sm: received IWF_EV_CLC_IND while at state IWF_OLC_DONE
*Jun 18 12:12:29.715: //4/9636E8578007/H323/h323_common_setup_rtcp_parameters: updating RTP session type, ccb->status = 9800271B,
olc->rtcp_session.type = 1, do_rtcp = 1, iwf_state = 10,
negotiated_codec = G729IETF, mediaWait = 0, h245_lport = 17588,
srcAddress = 192.168.20.201, srcCallID = 4, h245.status = 2106448C
*Jun 18 12:12:29.715: //4/9636E8578007/H323/h245_iwf_set_new_state: changing from IWF_OLC_DONE state to IWF_OLC_OUT_DONE state
*Jun 18 12:12:29.715: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 2 Event 0x1
*Jun 18 12:12:29.715: h323chan_chn_process_read_socket: fd=2 of type CONNECTED has data


*Jun 18 12:12:29.715: h323chan_recvdata: Connection lost fd=2h323chan_chn_close: Calls[1] Exist on socketfd=2 Owner[2]


*Jun 18 12:12:29.715: //-1/xxxxxxxxxxxx/H323/h323_gw_clean_send_blocked_watch: fd 2
*Jun 18 12:12:29.715: h323chan_close: TCP connection from fd=2 closed
*Jun 18 12:12:29.715: //-1/xxxxxxxxxxxx/H323/cch323_cleanup_xport: hashDestroy for TcpFDTbl
*Jun 18 12:12:29.715: //-1/xxxxxxxxxxxx/H323/cch323_iev_queue_service: Dispatch 0x2D internal event to H225 SM
*Jun 18 12:12:29.715: //4/9636E8578007/H323/run_h225_sm: Received event H225_EV_CONN_LOST while at state H225_ACTIVE
*Jun 18 12:12:29.715: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 3 Event 0x1
*Jun 18 12:12:29.715: h323chan_chn_process_read_socket: fd=3 of type CONNECTED has data


*Jun 18 12:12:29.719: //-1/xxxxxxxxxxxx/H323/cch323_gw_process_read_socket: owner_data=0x483E11A4, len=2, msgPtr=0x4B81B534
*Jun 18 12:12:29.719: //-1/xxxxxxxxxxxx/H323/cch323_gw_process_read_socket: Received msg for H.245
*Jun 18 12:12:29.719: //-1/xxxxxxxxxxxx/H323/cch323_ct_main: SOCK 3 Event 0x1
*Jun 18 12:12:29.719: h323chan_chn_process_read_socket: fd=3 of type CONNECTED has data


*Jun 18 12:12:29.719: h323chan_recvdata: Connection lost fd=3
*Jun 18 12:12:29.719: //4/9636E8578007/H323/cch323_send_event_to_h245_connection_sm: Changing to new event H245_DISCONNECT_EVENT
*Jun 18 12:12:29.719: //4/9636E8578007/H323/cch323_h245_connection_sm: state=2, event=4, ccb=483E11A4, listen state=0
*Jun 18 12:12:29.719: //4/9636E8578007/H323/cch323_h245_connection_sm: H245_CONNECT: Received event H245_DISCONNECT_EVENT while at H245_CONNECTED state
*Jun 18 12:12:29.719: //-1/xxxxxxxxxxxx/H323/h323_gw_clean_send_blocked_watch: fd 3
*Jun 18 12:12:29.719: h323chan_close: TCP connection from fd=3 closed
*Jun 18 12:12:29.719: //4/9636E8578007/H323/cch323_gw_process_read_socket:
cch323_gw_process_read_socket: H.245 socket error, ccb status = -1744820453, call release = 0, call disconnected = 1, fd = 3, rc = 4
*Jun 18 12:12:29.727: //-1/xxxxxxxxxxxx/H323/cch323_post_call_statistics: callID=4
*Jun 18 12:12:29.731: //-1/xxxxxxxxxxxx/H323/cch323_do_get_call_statistics: Entry, call_id=4
*Jun 18 12:12:29.731: //4/9636E8578007/H323/cch323_do_get_call_statistics: Stats requested for callID=4
*Jun 18 12:12:29.731: //4/9636E8578007/H323/cch323_do_call_disconnect: gw_id=1, discCause=16
*Jun 18 12:12:29.735: //-1/xxxxxxxxxxxx/H323/cch323_indicate_rt_packet_stats: callID=4
*Jun 18 12:12:29.735: //-1/xxxxxxxxxxxx/H323/cch323_do_process_statistics: Entry, call_id=4
*Jun 18 12:12:29.735: //4/9636E8578007/H323/cch323_do_call_disconnect: gw_id=1, discCause=16
*Jun 18 12:12:29.735: //-1/xxxxxxxxxxxx/H323/cch323_iev_queue_service: Dispatch 0x9 internal event to H225 SM
*Jun 18 12:12:29.735: //4/9636E8578007/H323/run_h225_sm: Received event H225_EV_RELEASE while at state H225_ACTIVE
*Jun 18 12:12:29.735: //4/9636E8578007/H323/cch323_h225_set_new_state: Changing from H225_ACTIVE state to H225_IDLE state
*Jun 18 12:12:29.735: //4/9636E8578007/H323/cch323_call_generic_cleanup: Disconnected flag 1
*Jun 18 12:12:29.735: //4/9636E8578007/H323/cch323_store_call_history_entry: Trying to store call history/remove call_info while RTP session exists
*Jun 18 12:12:29.735: //4/9636E8578007/H323/cch323_store_call_history_entry: Call Active Playout Mode: 1,Init 60, Min 40, Max 1000, Fax 300
*Jun 18 12:12:29.735: //4/9636E8578007/H323/cch323_store_call_history_entry: Call History Playout Mode: 1,Init 60, Min 40, Max 1000, Fax 300
*Jun 18 12:12:29.739: //4/9636E8578007/H323/run_h245_iwf_sm: received IWF_EV_H245_DISCONN while at state IWF_ACTIVE
*Jun 18 12:12:29.739: //4/9636E8578007/H323/cch323_send_event_to_h245_connection_sm: Changing to new event H245_DISCONNECT_EVENT
*Jun 18 12:12:29.739: //4/9636E8578007/H323/cch323_h245_connection_sm: state=0, event=4, ccb=483E11A4, listen state=0
*Jun 18 12:12:29.739: //4/9636E8578007/H323/cch323_h245_connection_sm: H245_CONNECT: Received event H245_DISCONNECT_EVENT while at H245_NONE state
*Jun 18 12:12:29.739: //4/9636E8578007/H323/h245_iwf_set_new_state: changing from IWF_ACTIVE state to IWF_IDLE state
*Jun 18 12:12:29.739: //-1/xxxxxxxxxxxx/H323/cch323_call_generic_cleanup: Freeing ccb (0x483E11A4)

Aaron Harrison Fri, 06/18/2010 - 05:59
User Badges:
  • Super Bronze, 10000 points or more
  • Community Spotlight Award,

    Member's Choice, May 2015

Are those the full logs? Are you logging to text or copy/pasting the output from the command window?


A Wireshark cap may not be a bad idea either if you are in a position to do that easily.


Aaron

Aaron Harrison Fri, 06/18/2010 - 08:30
User Badges:
  • Super Bronze, 10000 points or more
  • Community Spotlight Award,

    Member's Choice, May 2015

Hi Tim


As far as I can see neither end is sending any name info; I've had a good look around and I don't see much in the way of configurable settings to affect this. Someone else may chip in as this point :-)


I did a quick google and it appears that the Panasonic kit may support SIP - have you tried this?


Since you've invested some time already I guess you won't want to lose what you have so far, but you should be able to set it up in parallel for a couple of test numbers - on the CME just create a new dial-peer with 'destination-pattern 1234' or whatever your target ext on the Panasonic is. To set the peer to use SIP, just add 'session-protocol sipv2' to the dial-peer; and then look at what's required on the Panasonic.


Aaron

timothyshipp Mon, 06/21/2010 - 01:14
User Badges:

Hi Aaron


Sorry for not getting back to you sooner, had an early finish on Friday


Thanks for taking a look at the captures.  The Panasonic call ID is in the first Q.931 packet but I can only see it in the hex (Caller ID is Panasonic IP).


The Panasonic PBX does support SIP but functionality is limited until next software version released later this year.  I will test the SIP connection also to see if the calling name is presented.


Thanks for your help.


Best Regards



Tim

Aaron Harrison Mon, 06/21/2010 - 01:26
User Badges:
  • Super Bronze, 10000 points or more
  • Community Spotlight Award,

    Member's Choice, May 2015

Hi Tim


Yeah, saw that - but as Wireshark couldn't decode it and it said 'Panasonic' I assumed it was a vendor ID or something!


Aaron

timothyshipp Mon, 06/21/2010 - 01:47
User Badges:

Yeah, I've changed the caller ID's to something hugely inappropriate to make it easier to spot now


Fortunately I've also got links back to Panasonic Support in Japan so I will see if there are any mods that can be Panasonic side to present the caller ID in a more CME friendly format, I'll let you know if I have any luck.


Best Regards



Tim

paolo bevilacqua Mon, 06/21/2010 - 19:38
User Badges:
  • Super Gold, 25000 points or more
  • Hall of Fame,

    Founding Member

H.323 across vendors is a know source of trouble that's why cisco calls it "session protocol cisco".

Hopefully you can be lucky enough to have the other vendor provide a fix, or switch to SIP as Aaron suggested.

Actions

This Discussion