SIP T2 without Authorization Header

Hello,

I have an issue for registration. I compare configuration of a functional Gateway(registered) and this one with trouble and they are identical

so I make a tcpdump on my proxy server(10.12.114.173) to see what’s going on … we can see the gateway (sip:7855@10.11.50.215) try T1 sip register to the proxy and the proxy redirect the register packet to the asterisk server (10.11.1.116)

the asterisk server reply with a 401 status and a WWW-Authenticate header at the proxy and the proxy redirect the packet to the gateway.

Everything seems normal so far.

but from here I don’t find (in comparison to the functional gateway) the Authorization Header reply.

I have just 7 retries (default value configuring in my gateway) from the malfunctioning gateway to the proxy and proxy resend the packet with WWW-Authenticate header to the gateway.

I don’t understand why the malfunctioning gateway won’t respond correctly.

Apologies for my approximate English, I’m French.

TCPDUMP extract :

[code]No. Time Source Destination Protocol Length Info
1646 8.771690 10.11.50.215 10.12.114.173 SIP 587 Request: REGISTER sip:10.12.114.173 (1 binding) |

Frame 1646: 587 bytes on wire (4696 bits), 587 bytes captured (4696 bits)
Ethernet II, Src: CiscoInc_ab:8b:00 (64:9e:f3:ab:8b:00), Dst: IntelCor_25:10:ac (a0:36:9f:25:10:ac)
Internet Protocol Version 4, Src: 10.11.50.215, Dst: 10.12.114.173
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 573
Identification: 0x0353 (851)
Flags: 0x00
Fragment offset: 0
Time to live: 59
Protocol: UDP (17)
Header checksum: 0x8e3b [validation disabled]
Source: 10.11.50.215
Destination: 10.12.114.173
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 553
Checksum: 0x04c7 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 75]
Session Initiation Protocol (REGISTER)
Request-Line: REGISTER sip:10.12.114.173 SIP/2.0
Method: REGISTER
Request-URI: sip:10.12.114.173
Request-URI Host Part: 10.12.114.173
[Resent Packet: False]
Message Header
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
Max-Forwards: 70
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Contact: sip:7855@10.11.50.215;expires=240
Supported: em,timer,replaces,path,resource-priority
Allow: REGISTER,OPTIONS,INVITE,ACK,CANCEL,BYE,NOTIFY,PRACK,REFER,INFO,SUBSCRIBE,UPDATE
Expires: 240
User-Agent: Audiocodes-Sip-Gateway-MP-112 FXS/v.5.60A.027.002
Content-Length: 0

No. Time Source Destination Protocol Length Info
1647 8.771841 10.12.114.173 10.12.1.116 SIP 712 Request: REGISTER sip:10.12.114.173 (1 binding) |

Frame 1647: 712 bytes on wire (5696 bits), 712 bytes captured (5696 bits)
Ethernet II, Src: IntelCor_25:10:ac (a0:36:9f:25:10:ac), Dst: All-HSRP-routers_66 (00:00:0c:07:ac:66)
Internet Protocol Version 4, Src: 10.12.114.173, Dst: 10.12.1.116
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x10 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 698
Identification: 0x0000 (0)
Flags: 0x02 (Don’t Fragment)
Fragment offset: 0
Time to live: 64
Protocol: UDP (17)
Header checksum: 0x7d65 [validation disabled]
Source: 10.12.114.173
Destination: 10.12.1.116
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 678
Checksum: 0xbd75 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 0]
Session Initiation Protocol (REGISTER)
Request-Line: REGISTER sip:10.12.114.173 SIP/2.0
Method: REGISTER
Request-URI: sip:10.12.114.173
Request-URI Host Part: 10.12.114.173
[Resent Packet: False]
Message Header
Record-Route: sip:10.12.114.173;lr;ftag=1c1557493509
Via: SIP/2.0/UDP 10.12.114.173:5060;branch=z9hG4bKe6e4.c4945532.0
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
Max-Forwards: 70
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Contact: sip:7855@10.11.50.215;expires=240
Supported: em,timer,replaces,path,resource-priority
Allow: REGISTER,OPTIONS,INVITE,ACK,CANCEL,BYE,NOTIFY,PRACK,REFER,INFO,SUBSCRIBE,UPDATE
Expires: 240
User-Agent: Audiocodes-Sip-Gateway-MP-112 FXS/v.5.60A.027.002
Content-Length: 0

No. Time Source Destination Protocol Length Info
1656 8.791746 10.12.1.116 10.12.114.173 SIP 642 Status: 401 Unauthorized |

Frame 1656: 642 bytes on wire (5136 bits), 642 bytes captured (5136 bits)
Ethernet II, Src: CiscoInc_ab:8b:00 (64:9e:f3:ab:8b:00), Dst: IntelCor_25:10:ac (a0:36:9f:25:10:ac)
Internet Protocol Version 4, Src: 10.12.1.116, Dst: 10.12.114.173
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 628
Identification: 0x77b4 (30644)
Flags: 0x00
Fragment offset: 0
Time to live: 60
Protocol: UDP (17)
Header checksum: 0x4a07 [validation disabled]
Source: 10.12.1.116
Destination: 10.12.114.173
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 608
Checksum: 0x175d [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 0]
Session Initiation Protocol (401)
Status-Line: SIP/2.0 401 Unauthorized
Status-Code: 401
[Resent Packet: False]
[Request Frame: 1647]
[Response Time (ms): 19]
Message Header
Via: SIP/2.0/UDP 10.12.114.173:5060;branch=z9hG4bKe6e4.c4945532.0;received=10.12.114.173
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215;tag=as14377598
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Server: Asterisk PBX 11.11.0-0+celya3.raring
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm=“asterisk”, nonce="372e08c0"
Content-Length: 0

No. Time Source Destination Protocol Length Info
1657 8.791824 10.12.114.173 10.11.50.215 SIP 550 Status: 401 Unauthorized |

Frame 1657: 550 bytes on wire (4400 bits), 550 bytes captured (4400 bits)
Ethernet II, Src: IntelCor_25:10:ac (a0:36:9f:25:10:ac), Dst: All-HSRP-routers_66 (00:00:0c:07:ac:66)
Internet Protocol Version 4, Src: 10.12.114.173, Dst: 10.11.50.215
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x10 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 536
Identification: 0x0000 (0)
Flags: 0x02 (Don’t Fragment)
Fragment offset: 0
Time to live: 64
Protocol: UDP (17)
Header checksum: 0x4ca3 [validation disabled]
Source: 10.12.114.173
Destination: 10.11.50.215
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 516
Checksum: 0xee37 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 75]
Session Initiation Protocol (401)
Status-Line: SIP/2.0 401 Unauthorized
Status-Code: 401
[Resent Packet: False]
[Request Frame: 1646]
[Response Time (ms): 20]
Message Header
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215;tag=as14377598
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Server: Asterisk PBX 11.11.0-0+celya3.raring
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm=“asterisk”, nonce="372e08c0"
Content-Length: 0

No. Time Source Destination Protocol Length Info
1730 9.284177 10.11.50.215 10.12.114.173 SIP 587 Request: REGISTER sip:10.12.114.173 (1 binding) |

Frame 1730: 587 bytes on wire (4696 bits), 587 bytes captured (4696 bits)
Ethernet II, Src: CiscoInc_ab:8b:00 (64:9e:f3:ab:8b:00), Dst: IntelCor_25:10:ac (a0:36:9f:25:10:ac)
Internet Protocol Version 4, Src: 10.11.50.215, Dst: 10.12.114.173
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 573
Identification: 0x0358 (856)
Flags: 0x00
Fragment offset: 0
Time to live: 59
Protocol: UDP (17)
Header checksum: 0x8e36 [validation disabled]
Source: 10.11.50.215
Destination: 10.12.114.173
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 553
Checksum: 0x04c7 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 75]
Session Initiation Protocol (REGISTER)
Request-Line: REGISTER sip:10.12.114.173 SIP/2.0
Method: REGISTER
Request-URI: sip:10.12.114.173
Request-URI Host Part: 10.12.114.173
[Resent Packet: True]
[Suspected resend of frame: 1646]
Message Header
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
Max-Forwards: 70
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Contact: sip:7855@10.11.50.215;expires=240
Supported: em,timer,replaces,path,resource-priority
Allow: REGISTER,OPTIONS,INVITE,ACK,CANCEL,BYE,NOTIFY,PRACK,REFER,INFO,SUBSCRIBE,UPDATE
Expires: 240
User-Agent: Audiocodes-Sip-Gateway-MP-112 FXS/v.5.60A.027.002
Content-Length: 0

No. Time Source Destination Protocol Length Info
1731 9.284305 10.12.114.173 10.11.50.215 SIP 550 Status: 401 Unauthorized |

Frame 1731: 550 bytes on wire (4400 bits), 550 bytes captured (4400 bits)
Ethernet II, Src: IntelCor_25:10:ac (a0:36:9f:25:10:ac), Dst: All-HSRP-routers_66 (00:00:0c:07:ac:66)
Internet Protocol Version 4, Src: 10.12.114.173, Dst: 10.11.50.215
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x10 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 536
Identification: 0x0000 (0)
Flags: 0x02 (Don’t Fragment)
Fragment offset: 0
Time to live: 64
Protocol: UDP (17)
Header checksum: 0x4ca3 [validation disabled]
Source: 10.12.114.173
Destination: 10.11.50.215
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 516
Checksum: 0xee37 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 75]
Session Initiation Protocol (401)
Status-Line: SIP/2.0 401 Unauthorized
Status-Code: 401
[Resent Packet: True]
[Suspected resend of frame: 1657]
[Request Frame: 1646]
[Response Time (ms): 513]
Message Header
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215;tag=as14377598
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Server: Asterisk PBX 11.11.0-0+celya3.raring
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm=“asterisk”, nonce="372e08c0"
Content-Length: 0

No. Time Source Destination Protocol Length Info
3549 20.289837 10.11.50.215 10.12.114.173 SIP 587 Request: REGISTER sip:10.12.114.173 (1 binding) |

Frame 3549: 587 bytes on wire (4696 bits), 587 bytes captured (4696 bits)
Ethernet II, Src: CiscoInc_ab:8b:00 (64:9e:f3:ab:8b:00), Dst: IntelCor_25:10:ac (a0:36:9f:25:10:ac)
Internet Protocol Version 4, Src: 10.11.50.215, Dst: 10.12.114.173
0100 … = Version: 4
… 0101 = Header Length: 20 bytes
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 573
Identification: 0x0384 (900)
Flags: 0x00
Fragment offset: 0
Time to live: 59
Protocol: UDP (17)
Header checksum: 0x8e0a [validation disabled]
Source: 10.11.50.215
Destination: 10.12.114.173
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Source Port: 5060
Destination Port: 5060
Length: 553
Checksum: 0x04c7 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[Stream index: 75]
Session Initiation Protocol (REGISTER)
Request-Line: REGISTER sip:10.12.114.173 SIP/2.0
Method: REGISTER
Request-URI: sip:10.12.114.173
Request-URI Host Part: 10.12.114.173
[Resent Packet: True]
[Suspected resend of frame: 1646]
Message Header
Via: SIP/2.0/UDP 10.11.50.215;branch=z9hG4bKac1557498195
Max-Forwards: 70
From: sip:7855@10.11.50.215;tag=1c1557493509
To: sip:7855@10.11.50.215
Call-ID: 2050654265412016154226@10.11.50.215
CSeq: 11 REGISTER
Contact: sip:7855@10.11.50.215;expires=240
Supported: em,timer,replaces,path,resource-priority
Allow: REGISTER,OPTIONS,INVITE,ACK,CANCEL,BYE,NOTIFY,PRACK,REFER,INFO,SUBSCRIBE,UPDATE
Expires: 240
User-Agent: Audiocodes-Sip-Gateway-MP-112 FXS/v.5.60A.027.002
Content-Length: 0
[/code]

The gateway isn’t seeing your responses, as it is resending with the same CSEQ each time.

Thanks for your reply.

this was I thought, but I make a verification with an ACL on the routeur directly connected at the gateway and this give me this :

On ACL 198 packets leaving (from gateway to Proxy; “Access-group 198 in” on the interface directly connected on the gateway)

2016-01-05T08:52:58+01:00 ROUTER/ROUTER 2414: ROUTER: 002230: Jan 5 08:52:41.852: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 1 packet 2016-01-05T08:53:16+01:00 ROUTER/ROUTER 2415: ROUTER: 002231: Jan 5 08:52:59.759: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 2 packets 2016-01-05T08:54:24+01:00 ROUTER/ROUTER 2416: ROUTER: 002232: Jan 5 08:54:07.326: %SYS-5-CONFIG_I: Configured from console by user on vty0 (10.11.49.19) 2016-01-05T08:57:42+01:00 ROUTER/ROUTER 2417: ROUTER: 002233: Jan 5 08:57:25.519: %SYS-5-CONFIG_I: Configured from console by user on vty0 (10.11.49.19) 2016-01-05T08:58:37+01:00 ROUTER/ROUTER 2418: ROUTER: 002234: Jan 5 08:58:20.262: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 28 packets 2016-01-05T09:03:37+01:00 ROUTER/ROUTER 2419: ROUTER: 002235: Jan 5 09:03:20.240: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 28 packets 2016-01-05T09:08:36+01:00 ROUTER/ROUTER 2420: ROUTER: 002236: Jan 5 09:08:20.217: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 28 packets 2016-01-05T09:13:36+01:00 ROUTER/ROUTER 2421: ROUTER: 002237: Jan 5 09:13:20.194: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 28 packets 2016-01-05T09:21:38+01:00 ROUTER/ROUTER 2435: ROUTER: 002251: Jan 5 09:21:21.394: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(514) -> 10.11.49.19(514), 1 packet 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2436: ROUTER: 002252: Jan 5 09:21:55.295: %SEC-6-IPACCESSLOGP: list 198 permitted tcp 10.12.50.215(80) -> 10.11.49.10(53019), 1 packet 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2437: ROUTER: 002253: Jan 5 09:21:56.319: %SEC-6-IPACCESSLOGP: list 198 permitted tcp 10.12.50.215(80) -> 10.11.49.10(53021), 1 packet 2016-01-05T09:23:01+01:00 ROUTER/ROUTER 2452: ROUTER: 002268: Jan 5 09:22:44.299: %SEC-6-IPACCESSLOGP: list 198 permitted tcp 10.12.50.215(80) -> 10.11.49.10(53019), 1 packet 2016-01-05T09:23:01+01:00 ROUTER/ROUTER 2453: ROUTER: 002269: Jan 5 09:22:44.299: %SEC-6-IPACCESSLOGP: list 198 permitted tcp 10.12.50.215(80) -> 10.11.49.10(53021), 1 packet 2016-01-05T09:23:01+01:00 ROUTER/ROUTER 2454: ROUTER: 002270: Jan 5 09:22:44.299: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(514) -> 10.11.49.19(514), 35 packets 2016-01-05T09:23:01+01:00 ROUTER/ROUTER 2455: ROUTER: 002271: Jan 5 09:22:44.299: %SEC-6-IPACCESSLOGP: list 198 permitted udp 10.12.50.215(5060) -> 10.11.114.173(5060), 9 packets

On ACL 143 packets incoming (from Proxy to Gateway; “Access-group 143 out” on the interface directly connected on the gateway)

from what I understand, the gateway must receive the respond of the Asterisk/Proxy

2016-01-05T09:16:55+01:00 ROUTER/ROUTER 2423: ROUTER: 002239: Jan 5 09:16:38.247: %SEC-6-IPACCESSLOGP: list 143 permitted udp 10.11.114.173(5060) -> 10.12.50.215(5060), 1 packet 2016-01-05T09:17:33+01:00 ROUTER/ROUTER 2424: ROUTER: 002240: Jan 5 09:17:16.864: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(52999) -> 10.12.50.215(80), 1 packet 2016-01-05T09:17:35+01:00 ROUTER/ROUTER 2425: ROUTER: 002241: Jan 5 09:17:19.052: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53000) -> 10.12.50.215(80), 1 packet 2016-01-05T09:17:37+01:00 ROUTER/ROUTER 2426: ROUTER: 002242: Jan 5 09:17:20.092: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53001) -> 10.12.50.215(80), 1 packet 2016-01-05T09:17:44+01:00 ROUTER/ROUTER 2427: ROUTER: 002243: Jan 5 09:17:27.791: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53003) -> 10.12.50.215(80), 1 packet 2016-01-05T09:18:00+01:00 ROUTER/ROUTER 2428: ROUTER: 002244: Jan 5 09:17:43.578: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53013) -> 10.12.50.215(80), 1 packet 2016-01-05T09:18:03+01:00 ROUTER/ROUTER 2429: ROUTER: 002245: Jan 5 09:17:46.250: %SEC-6-IPACCESSLOGP: list 143 permitted udp 10.11.114.173(5060) -> 10.12.50.215(5060), 1 packet 2016-01-05T09:19:33+01:00 ROUTER/ROUTER 2431: ROUTER: 002247: Jan 5 09:19:16.711: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53019) -> 10.12.50.215(80), 1 packet 2016-01-05T09:21:12+01:00 ROUTER/ROUTER 2433: ROUTER: 002249: Jan 5 09:20:55.140: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53021) -> 10.12.50.215(80), 1 packet 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2438: ROUTER: 002254: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53014) -> 10.12.50.215(80), 13 packets 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2439: ROUTER: 002255: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53015) -> 10.12.50.215(80), 13 packets 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2440: ROUTER: 002256: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53000) -> 10.12.50.215(80), 48 packets 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2441: ROUTER: 002257: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53016) -> 10.12.50.215(80), 15 packets 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2442: ROUTER: 002258: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53017) -> 10.12.50.215(80), 120 packets 2016-01-05T09:22:12+01:00 ROUTER/ROUTER 2443: ROUTER: 002259: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53018) -> 10.12.50.215(80), 13 packets 2016-01-05T09:22:13+01:00 ROUTER/ROUTER 2444: ROUTER: 002260: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted udp 10.11.114.173(5060) -> 10.12.50.215(5060), 1 packet 2016-01-05T09:22:13+01:00 ROUTER/ROUTER 2445: ROUTER: 002261: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53019) -> 10.12.50.215(80), 32 packets 2016-01-05T09:22:13+01:00 ROUTER/ROUTER 2446: ROUTER: 002262: Jan 5 09:21:56.807: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53021) -> 10.12.50.215(80), 4 packets 2016-01-05T09:22:13+01:00 ROUTER/ROUTER 2447: ROUTER: 002263: Jan 5 09:21:56.811: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53020) -> 10.12.50.215(80), 4 packets 2016-01-05T09:22:13+01:00 ROUTER/ROUTER 2448: ROUTER: 002264: Jan 5 09:21:56.811: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53010) -> 10.12.50.215(80), 80 packets 2016-01-05T09:22:13+01:00 ROUTER/ROUTER 2449: ROUTER: 002265: Jan 5 09:21:56.811: %SEC-6-IPACCESSLOGP: list 143 permitted tcp 10.11.49.10(53022) -> 10.12.50.215(80), 4 packets