STUN server na debiane
STUN – Simple Traversal of UDP through NATs (RFC 3489) STUN je to protokol umožňujúci prechod cez NAT v tzv. near-end implementácii, pomocou ktorej nie je potrebné meniť nastavenie SIP Servera, po...
View ArticleSip over NAT
If you use the article, please cite me:SIP over NAT [SIP cez NAT] / Pavel Segeč. In: Journal of Information, Control and Management Systems. - ISSN 1336-1716. - Vol. 7, No. 1 (2009), p....
View ArticleBuiliding RTPproxy server 1.2.1 from GIT on debian lenny
As the result of the testing, the rtpproxy 1.2.1 builded using git is faulted, see the end of the article or article about kamamilio nat traversal with rtpproxy. The article describe how to install the...
View ArticleConfiguring NAT traversal using Kamailio 3.1 and the Rtpproxy server
This article continues on series of articles about the Kamailio 3.1.x SIP proxy server deployed on the debian lenny and its features. In previous articles we have focused on:1) installing clear...
View ArticleRiešenie NAT pre SIP OpenSER server
Riešenie NAT pre SIP OpenSER server Testovaná topológia: Použitý SIP server pri testovaní: OpenSER Použitý softphone: X-lite 4 read more
View ArticleEnabling USB Wi-Fi dongle adapter on VirtualBox VM
When we have Wi-Fi adapter in our PC, we may use it as a network interface of VM, but the VM will recognize it just… The post Enabling USB Wi-Fi dongle adapter on VirtualBox VM appeared first on NIL -...
View ArticleMaking a QEMU ASA 8.4 for GNS3 in Win10
By Peter Hadač This article is all about how to prepare ASA 8.4 in GNS3 simulation (on Windows 10, but compatible with other OS )… The post Making a QEMU ASA 8.4 for GNS3 in Win10 appeared first on NIL...
View ArticleSIP clients – security features analysis
Table provides the overview of security features of nine analysed open-source SIP clients (some sources call them the RTC communicator). Source: P. Segeč, M. Moravčík,… The post SIP clients – security...
View ArticleTools for a quick SIP diagnostics – ngrep, sipgrep and sngrep
Sometimes there is a need for simple and quick analysis of a SIP server and its call functions. Of course, we should use the well-known… The post Tools for a quick SIP diagnostics – ngrep, sipgrep and...
View ArticleOpenVAS/GVM installation and configuration from source code
Author: Martin Dvorsky Greenbone Vulnerability Manager (formerly OpenVAS) is the most popular open source vulnerability scanner.In this tutorial we will install, configure and prepare GVM… The post...
View ArticleKIS 2019 network dataset
KIS 2019 network dataset Authors : Jana Uramová, Tomáš Mokoš, Patrik Rodina, Peter Seemann, Miroslav Kohútik This article describes the KIS 2019 network dataset. If… The post KIS 2019 network dataset...
View ArticleInstalling full Linux from Windows on USB with persistent storage
This guide will describe how to install a full Linux OS on an USB flash disk with permanent storage feature, i.e. the system does not… The post Installing full Linux from Windows on USB with persistent...
View ArticleElasticsearch cluster upgrade
Elasticsearch cluster upgrade from 5.5.1 to 6.8.1 Author : Miroslav Kohútik Operating System : Ubuntu 16.04 In this guide we will show you how to… The post Elasticsearch cluster upgrade appeared first...
View ArticleNetacad – message “You did not complete all requirements”
My students received the message “You did not complete all requirements” even though they are set to “Pass”. It is an Netacad issue. The instructor… The post Netacad – message “You did not complete all...
View ArticleList of network simulators and virtualization tools
The page provides summarized and updated (2020) overview of simulation and virtualization tools suitable for the practice of networking teachers or researchers. The post List of network simulators and...
View ArticleNetwork traffic dataset anonymization
Network traffic dataset anonymization Author: Miroslav Kohútik Sometimes you may need to provide PCAP files to third-party organizations or perhaps, in our case, publish a… The post Network traffic...
View ArticleNetwork traffic dataset PCAP anonymization
Network traffic dataset PCAP anonymization Author: Miroslav Kohútik Sometimes you may need to provide PCAP files to third-party organizations or perhaps, in our case, publish… The post Network traffic...
View ArticleConfigruration L2TP over IPsec
Configuration of L2TP over IPsec tunnel connection with Cisco router as a server and MikroTik router as a client. Configuration of Cisco server Now we… The post Configruration L2TP over IPsec appeared...
View ArticleVLC – SAP problem – the playlist is empty
Our ISP provider (SANET) offers an IPTV service, where the list of TV/radio programs is offered using SAP multicast at IPv4 address of 233.10.47.10. However,… The post VLC – SAP problem – the playlist...
View ArticleAdjust microphone volume in Windows 10
When others can hear you silently, you can boost microphone volume level. We have to mention, that this option is not available on every microphone,… The post Adjust microphone volume in Windows 10...
View Article