This Technical Bulletin aims to inform the reader on the troubleshooting software tools available and how to use them, thus providing capabilities to diagnose a problem or properly report the problem to Mediatrix. Some examples are used to illustrate the functionality of each software tool. More specifically, the following is detailed in this Technical Bulletin
When reporting a problem and to make sure that all the relevant information is given to the Mediatrix support team at once, a Mediatrix partner should consider providing the following:
Network Configuration / Call Setup
Saving the Configuration of a Mediatrix Product using SIP v5.0, H.323 or MGCP
The following is the recommended method to save the whole configuration of a Mediatrix analog product
Send the proper XML file to Mediatrix (based on the MAC address). It can normally be found in C:\Program Files\Unit Manager Network 3.2\UnitManager\CfgFile.
Saving the Configuration of a Mediatrix Product using Dgw v2.0
Wireshark is a network protocol analyzer. It is an Open Source software released under the GNU General Public License. It can decode SIP, MGCP, H.323, RTP, and a lot more protocols.
The following link should take you directly to the latest Wireshark download site: http://www.wireshark.org/download.html.
Note: Select the Windows version. Make sure you install winpcap and read the instructions.
In the Capture menu, select options(Ctrl+K).
Knowing the MAC address of the device, the capture filter would be
ether host 00:90:f8:00:60:82
Note: Capturing at the MAC level allows to capture Ethernet protocols such as DHCP.
Knowing the IP address of the device, the capture filter would be
When using a Mediatrix unit running firmware DGW v2.0r17.285 or higher, it is possible to remotely start a network capture on the Mediatrix unit and send the result to a PC running Wireshark. CLI access is required to execute this procedure.
Open a command line and enter the following command by replacing each field with the information in your setup
plink.exe -pw "PASSWORD" USERNAME@IP_ADDRESS "pcapture -raw –i any" | wireshark -k -i –
plink.exe -pw "1234" firstname.lastname@example.org "pcapture -raw –i any" | “wireshark -k -i –
This command would connect to the CLI of unit with IP address 192.168.0.100 using the public username and the 1234 password. The pcapture command will be executed in the CLI and the result will be sent to a new Wireshark window.
You can look at the DGW v2.0 Software Configuration Guide for more information on the pcapture command.
How to Create Filters
sip || bootp || syslog || rtp || t38 || mgcp || h245 || q931 || h225
rtp && rtp.p_type != 13 && rtp.p_type != 96
2. To create a new filter for a particular field value in any frame, select a frame (must be a known protocol, meaning decoded by Wireshark). Then right-click Apply as Filter and then choose your type of filter.
Converting an RTP Stream to an Audio File
rtp && rtp.p_type != 13 && rtp.p_type != 96
rtp.p_type == 0 && rtp.p_type != 13 && rtp.p_type != 96
rtp.p_type == 8 && rtp.p_type != 13 && rtp.p_type != 96
2. In the following screen, click the Save payload button.
3. In the following screen, select the .au format and the forward direction. Select also the proper folder, enter a filename, then click the OK button to save your audio file.
4. To view this file in Audacity, drag and drop from Windows explorer into the Audacity screen.
Audacity is a free, easy-to-use audio editor and recorder. It is an Open Source software released under the GNU General Public License.
The following link should take you directly to the latest Audacity download site: http://audacity.sourceforge.net/
Plot Spectrum Utility
The SIP Scenario Generator creates SIP Call Flows or SIP scenario diagrams, in HTML format, of SIP messages from Ethernet capture files. SIP Scenario Generator shows the actual call processing trace in a format that is easily understood using browser technology. Clicking on a SIP message hyperlink displays the contents of the traced SIP. It definitely helps reporting a problem to a vendor or a customer.
SIP Scenario can be downloaded at http://www.iptel.org/~sipsc/.
Creating a SIP Scenario File
The following syslog daemons have been used successfully by Mediatrix
Note: Wireshark can also decode syslog messages; therefore, a syslog daemon is not mandatory.
Kiwi Syslog Daemon has logging and filter functionalities and can run as a service on Windows NT-based machines. This daemon listens on port 514 for incoming syslog messages. The Kiwi Syslog Daemon can also receive signaling logs from our units (see Signaling Logs).
Enabling Syslogs in Debug Mode
Using the Unit Manager Network (Mediatrix 1100/1200/4100, 2102, Liaison)
Using the unit’s web page of the Mediatrix 1200/4100, 2102, Liaison
Using the unit’s web page of the Mediatrix 3400/3500/3600/4400
Signaling logs, which are copies of the ongoing SIP or MGCP signaling, can be sent to a program listening for UDP packets on a specific port, much like syslog daemons. Mediatrix has created a little UDP Listener for its own need. It is provided “as is” with no guarantee that it will not harm or slow down your system. Logging over a long period of time would require file logging capability as you may overload your system memory. Note that the Kiwi syslog daemon has file logging capability and can receive UDP logs as well.
You can use Signaling logs when debugging a remote unit and/or when taking a Wireshark capture is impossible.
The Mediatrix UDP Listener can be freely downloaded on the Mediatrix Download Portal (http://www.mediatrix.com).
Enabling Signaling Logs on a Mediatrix 1100/1200/4100, 2102 and Liaison
The following path should take you to the signaling log configuration
Enabling Signaling Logs on a Mediatrix 3400/3500/3600/4400
The following path should take you to the signaling log configurationprivate>enterprises-->mediatrix-->mediatrixSystem-->gen5-->mediatrixCommon--> mediatrixServices-->sipEpMIB-->sipEpMIBObjects-->debugGroup