Dear forum members,
In their book, Van Meggelen et al. (“Asterisk - The definitive guide”) recommend naming endpoints, AORs, auths and auth-username all the same by something unique to the telephone device, e.g. the MAC address.
In their example setup, they propose the following (pages 68 f.):
- Endpoints: 0000f30A0A01, 0000f30B0B02, SOFTPHONE_A, SOFTPHONE_B
- AORs: 0000f30A0A01, 0000f30B0B02, SOFTPHONE_A, SOFTPHONE_B
- Auths: 0000f30A0A01, 0000f30B0B02, SOFTPHONE_A, SOFTPHONE_B - each with the identifier as “username” (e.g. 0000f30A0A01).
- Endpoint 0000f30A0A01 is mapped to AOR 0000f30A0A01 and to auth 0000f30A0A01 (with the username 0000f30A0A01).
I’m trying to build the following setup with Asterisk:
- I have a few users (actual humans).
- Each human has 1 softphone and 1 desk phone.
- In the example from the book, these would be named SOFTPHONE_LINDA (softphone) and 000E3B74… (desk phone identified by its MAC address).
- If a human is called, I always want their softphone and their desk phone ring parallely. (I guess each DIAL(PJSIP/…) in the dial plan would contain multiple “entries” (=endpoint names? or =AOR names?).
- E.g. extension 234 should ring the softphone and the desk phone parallely. So users don’t have to know if your colleague is at the desk or somewhere else (softphone on notebook).
- There will be no different extensions for softphones and desk phones in the dial plan.
- So Linda’s softphone can’t make calls to Linda’s desk phone.
- And users can’t call only someone’s softphone or only their desk phone.
- Let’s say, my users are alex, john and linda.
Is the approach with device MAC addresses from the book the right for me?
Shouldn’t my endpoints, AORs and auths simply be alex, john and linda?
And each AOR has max_contacts >= 2 to allow softphone and desk phone in parallel?
So no MAC addresses at all?
In the best case I could have different passwords for softphones and desk phones. So if someone exposes their softphone password by accident, I could just change that (“softphone_linda”) without having to reconfigure the desk phone (different username/password, e.g. “deskphone_linda”). But that’s an optional requirement. Same credentials for softphones and deskphones would be fine as well.
What would be my endpoints, AORs and auths and the auth usernames?
Can you point me to the right track! I’d be very thankful!
“The penny hasn’t yet dropped.”
Reg