Are you running Cisco IOS 15.1(2)T? If so, have you verified the trust list?
A new feature has been introduced in Cisco IOS® Software Release 15.1(2)T to guard against the incidence of toll-fraud on Voice GateWays (VGWs) installed with Cisco IOS. Starting with IOS 15.1(2)T and newer releases of IOS based on this version, the toll-fraud prevention settings are the default behavior of Cisco IOS-based VGWs.
The purpose of this document is to raise awareness of this new feature, as upgrading to this release will require additional configuration to permit certain types of voice calls to be placed and route to completion. It is important to note that upgrading to 15.1(2)T will block all inbound VoIP call setups until the VGW is properly configured to trust these sources. Any plans to upgrade to releases with this feature must include extra steps to configure trusted VoIP hosts after the upgrade in order for calls to route successfully. Additionally, two-stage dialing is no longer enabled by default with this release.
I am running IOS 15.1(4)T as you can see on the following command:
sh ver Cisco IOS Software, 3800 Software (C3825-SPSERVICESK9-M), Version 15.1(4)M5, REL EASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2012 by Cisco Systems, Inc. Compiled Tue 04-Sep-12 17:25 by prod_rel_team
ROM: System Bootstrap, Version 12.4(13r)T10, RELEASE SOFTWARE (fc1)
R3-ARBUE-2548-01-VGW-01 uptime is 2 days, 14 hours, 49 minutes System returned to ROM by reload at 20:20:59 ARBUE Fri Jun 13 2014 System restarted at 20:23:06 ARBUE Fri Jun 13 2014 System image file is "flash:c3825-spservicesk9-mz.151-4.M5.bin" Last reload type: Normal Reload
This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to email@example.com.
Cisco 3825 (revision 1.2) with 1010688K/37888K bytes of memory. Processor board ID FTX1236A3Q3 2 Gigabit Ethernet interfaces 8 Channelized E1/PRI ports 8 Voice FXO interfaces DRAM configuration is 64 bits wide with parity enabled. 479K bytes of NVRAM. 126976K bytes of ATA System CompactFlash (Read/Write)
------------------------------------------------- Device# PID SN ------------------------------------------------- *0 CISCO3825
I've had a ICT between my cluster. we are using only one gateway to delivery those calls. However I have 2 E1 delivering calls and only has stopped to work. Both of them are the same Service Provider, and the first one has stopped last week. Nothing was changed. I've already reset the ICT trunk in both sides and restarted the gateway as well. Nothing worked out.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...