I’ve been trying to get things working for days without success.
Same old story: Everything worked a few months ago. In frustration, I’ve been reduced to trial and error rather than problem solving. Nothing works.
Asterisk connects to outside line but no sound in either direction. Works fine on phone extensions that are inside my network.
A firewall problem?
Thanks for any help or suggestions.
-Steve
Ports 10000-20000 are open for udp and tcp
UFW Status Output:
Status: active
To Action From
-- ------ ----
Apache Full ALLOW Anywhere
22 ALLOW Anywhere
80 ALLOW Anywhere
443 ALLOW Anywhere
5060/tcp ALLOW Anywhere
10000:20000/tcp ALLOW Anywhere
520/udp ALLOW Anywhere
143 ALLOW Anywhere
993 ALLOW Anywhere
10000:20000/udp ALLOW Anywhere
5060/udp ALLOW Anywhere
23/tcp ALLOW Anywhere
465 ALLOW Anywhere
2027 ALLOW Anywhere
2727 ALLOW Anywhere
4520 ALLOW Anywhere
4569 ALLOW Anywhere
5000 ALLOW Anywhere
5060 ALLOW 192.168.1.1
Anywhere ALLOW 192.168.1.1
Anywhere ALLOW 67.86.108.167
5060:5061/udp ALLOW Anywhere
10000:65000/tcp ALLOW Anywhere
10000:65000/udp ALLOW Anywhere
Apache Full (v6) ALLOW Anywhere (v6)
22 (v6) ALLOW Anywhere (v6)
80 (v6) ALLOW Anywhere (v6)
443 (v6) ALLOW Anywhere (v6)
5060/tcp (v6) ALLOW Anywhere (v6)
10000:20000/tcp (v6) ALLOW Anywhere (v6)
520/udp (v6) ALLOW Anywhere (v6)
143 (v6) ALLOW Anywhere (v6)
993 (v6) ALLOW Anywhere (v6)
10000:20000/udp (v6) ALLOW Anywhere (v6)
5060/udp (v6) ALLOW Anywhere (v6)
23/tcp (v6) ALLOW Anywhere (v6)
465 (v6) ALLOW Anywhere (v6)
2027 (v6) ALLOW Anywhere (v6)
2727 (v6) ALLOW Anywhere (v6)
4520 (v6) ALLOW Anywhere (v6)
4569 (v6) ALLOW Anywhere (v6)
5000 (v6) ALLOW Anywhere (v6)
5060:5061/udp (v6) ALLOW Anywhere (v6)
10000:65000/tcp (v6) ALLOW Anywhere (v6)
10000:65000/udp (v6) ALLOW Anywhere (v6)
80/tcp ALLOW OUT Anywhere
53/udp ALLOW OUT Anywhere
53/tcp ALLOW OUT Anywhere
Anywhere ALLOW OUT 192.168.1.1
53 (v6) ALLOW OUT Anywhere (v6)
80/tcp (v6) ALLOW OUT Anywhere (v6)
53/udp (v6) ALLOW OUT Anywhere (v6)
53/tcp (v6) ALLOW OUT Anywhere (v6)
rules.v4 file:
# Generated by iptables-save v1.6.0 on Sun Aug 16 00:59:07 2020
*nat
:PREROUTING ACCEPT [1751:419836]
:INPUT ACCEPT [574:346213]
:OUTPUT ACCEPT [687:60300]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o enp1s0 -j MASQUERADE
COMMIT
# Completed on Sun Aug 16 00:59:07 2020
# Generated by iptables-save v1.6.0 on Sun Aug 16 00:59:07 2020
*filter
:INPUT DROP [3:124]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [2:120]
:f2b-ASTERISK - [0:0]
:f2b-apache-overflows - [0:0]
:f2b-auth - [0:0]
:f2b-badbots - [0:0]
:f2b-noscript - [0:0]
:f2b-php-url-fopen - [0:0]
:f2b-sshd - [0:0]
:ufw-after-forward - [0:0]
:ufw-after-input - [0:0]
:ufw-after-logging-forward - [0:0]
:ufw-after-logging-input - [0:0]
:ufw-after-logging-output - [0:0]
:ufw-after-output - [0:0]
:ufw-before-forward - [0:0]
:ufw-before-input - [0:0]
:ufw-before-logging-forward - [0:0]
:ufw-before-logging-input - [0:0]
:ufw-before-logging-output - [0:0]
:ufw-before-output - [0:0]
:ufw-logging-allow - [0:0]
:ufw-logging-deny - [0:0]
:ufw-not-local - [0:0]
:ufw-reject-forward - [0:0]
:ufw-reject-input - [0:0]
:ufw-reject-output - [0:0]
:ufw-skip-to-policy-forward - [0:0]
:ufw-skip-to-policy-input - [0:0]
:ufw-skip-to-policy-output - [0:0]
:ufw-track-forward - [0:0]
:ufw-track-input - [0:0]
:ufw-track-output - [0:0]
:ufw-user-forward - [0:0]
:ufw-user-input - [0:0]
:ufw-user-limit - [0:0]
:ufw-user-limit-accept - [0:0]
:ufw-user-logging-forward - [0:0]
:ufw-user-logging-input - [0:0]
:ufw-user-logging-output - [0:0]
:ufw-user-output - [0:0]
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-auth
-A INPUT -j f2b-ASTERISK
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-php-url-fopen
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-apache-overflows
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-noscript
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-badbots
-A INPUT -p tcp -m multiport --dports 22 -j f2b-sshd
-A INPUT -j ufw-before-logging-input
-A INPUT -j ufw-before-input
-A INPUT -j ufw-after-input
-A INPUT -j ufw-after-logging-input
-A INPUT -j ufw-reject-input
-A INPUT -j ufw-track-input
-A FORWARD -j ufw-before-logging-forward
-A FORWARD -j ufw-before-forward
-A FORWARD -j ufw-after-forward
-A FORWARD -j ufw-after-logging-forward
-A FORWARD -j ufw-reject-forward
-A FORWARD -j ufw-track-forward
-A OUTPUT -j ufw-before-logging-output
-A OUTPUT -j ufw-before-output
-A OUTPUT -j ufw-after-output
-A OUTPUT -j ufw-after-logging-output
-A OUTPUT -j ufw-reject-output
-A OUTPUT -j ufw-track-output
-A f2b-ASTERISK -s 104.229.79.4/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ASTERISK -s 103.145.12.217/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ASTERISK -j RETURN
-A f2b-apache-overflows -j RETURN
-A f2b-auth -j RETURN
-A f2b-badbots -j RETURN
-A f2b-noscript -j RETURN
-A f2b-php-url-fopen -j RETURN
-A f2b-sshd -s 218.92.0.192/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 2.232.250.91/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 180.76.101.202/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 222.186.175.148/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 64.225.39.69/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 222.186.15.62/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 121.162.235.44/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 222.186.180.8/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 27.154.225.186/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 220.249.114.237/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 218.92.0.148/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 222.186.180.17/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -j RETURN
-A ufw-after-input -p udp -m udp --dport 137 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 138 -j ufw-skip-to-policy-input
-A ufw-after-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input
-A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input
-A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input
-A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input
-A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A ufw-before-forward -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ufw-before-forward -j ufw-user-forward
-A ufw-before-input -i lo -j ACCEPT
-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP
-A ufw-before-input -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A ufw-before-input -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ufw-before-input -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A ufw-before-input -j ufw-not-local
-A ufw-before-input -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT
-A ufw-before-input -d 239.255.255.250/32 -p udp -m udp --dport 1900 -j ACCEPT
-A ufw-before-input -j ufw-user-input
-A ufw-before-output -o lo -j ACCEPT
-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-output -j ufw-user-output
-A ufw-logging-allow -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
-A ufw-logging-deny -m conntrack --ctstate INVALID -m limit --limit 3/min --limit-burst 10 -j RETURN
-A ufw-logging-deny -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
-A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN
-A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN
-A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny
-A ufw-not-local -j DROP
-A ufw-skip-to-policy-forward -j ACCEPT
-A ufw-skip-to-policy-input -j DROP
-A ufw-skip-to-policy-output -j ACCEPT
-A ufw-track-forward -p tcp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-track-forward -p udp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT
-A ufw-user-input -p tcp -m multiport --dports 80,443 -m comment --comment "\'dapp_Apache%20Full\'" -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 22 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 22 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 80 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 80 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 443 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 443 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 5060 -j ACCEPT
-A ufw-user-input -p tcp -m multiport --dports 10000:20000 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 520 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 143 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 143 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 993 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 993 -j ACCEPT
-A ufw-user-input -p udp -m multiport --dports 10000:20000 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 5060 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 23 -j ACCEPT
-A ufw-user-input -p tcp -m tcp --dport 465 -j ACCEPT
-A ufw-user-input -p udp -m udp --dport 465 -j ACCEPT
-A ufw-user-limit -m limit --limit 3/min -j LOG --log-prefix "[UFW LIMIT BLOCK] "
-A ufw-user-limit -j REJECT --reject-with icmp-port-unreachable
-A ufw-user-limit-accept -j ACCEPT
-A ufw-user-output -p tcp -m tcp --dport 80 -j ACCEPT
-A ufw-user-output -p udp -m udp --dport 53 -j ACCEPT
-A ufw-user-output -p tcp -m tcp --dport 53 -j ACCEPT
COMMIT
# Completed on Sun Aug 16 00:59:07 2020