1 Overview................................................................................................................3
2 Building & Installation.............................................................................................4
2.1 Prerequisites...................................................................................................4
2.2 Compiling and Installing..................................................................................4
3 Configuration..........................................................................................................5
3.1 The Configuration File 'siproxd.conf'...............................................................5
3.2 Command Line Options..................................................................................9
4 Features...............................................................................................................10
4.1 Custom Firewall Module...............................................................................10
4.2 Chroot() jail...................................................................................................10
5 Trouble shooting...................................................................................................11
5.1 Problem reporting.........................................................................................11
5.2 Creating a debug log file...............................................................................11
5.3 Siproxd crashes............................................................................................11
6 Sample Configurations.........................................................................................13
6.1 The "standard scenario"................................................................................13
6.2 GS BT-100 behind NAT router running siproxd............................................14
6.3 GS BT-100 with siproxd running "in front of" a NAT router...........................15
6.4 Transparent SIP proxy..................................................................................17
6.5 Masquerading an Asterisk box.....................................................................18
References