Sadly same result.
I can make a test call to them fine, but for some reason it seems not to want to register with them on IAX for incoming. I have created this truck about 5 times, and religiously entered the username and password as was sent, even have gone so far as to cut and past from the working older system.
I am not a whiz with wireshark, so is there as way for me to see what is coming back from them?
As an aside, does this new version block outgoing and incoming SIP by default on the external interface (Server Gateway mode) or do you explicitly have to do an "config setprop sailSIP status disabled" ? Of course after doing the remoteaccess-update.
As even after that mine says :-
[root@voipsbs ~]# /etc/init.d/masq status | grep 5060
ACCEPT udp -- 0.0.0.0/0 (external IP) udp dpt:5060
Only reason I asked, as I noticed I was getting failed SIP request from a chancer, and that was after a short amount of time. Liked the idea of the OSSEC works well.
Regards