tcpdump -i ens19 -s0 ip src белый_ip_сервера -vv
tcpdump: listening on ens19, link-type EN10MB (Ethernet), capture size 262144 bytes
21:50:28.356025 IP (tos 0x10, ttl 64, id 12989, offset 0, flags [DF], proto TCP (6), length 60)
белый_ip_сервера.34860 > белый_ip_шлюза.radmin-port: Flags [S], cksum 0xdbc0 (incorrect -> 0x4373), seq 2559544667, win 29200, options [mss 1460,sackOK,TS val 1124315820 ecr 0,nop,wscale 7], length 0
21:50:29.384597 IP (tos 0x10, ttl 64, id 12990, offset 0, flags [DF], proto TCP (6), length 60)
белый_ip_сервера.34860 > белый_ip_шлюза.radmin-port: Flags [S], cksum 0xdbc0 (incorrect -> 0x3f6e), seq 2559544667, win 29200, options [mss 1460,sackOK,TS val 1124316849 ecr 0,nop,wscale 7], length 0
21:50:31.400663 IP (tos 0x10, ttl 64, id 12991, offset 0, flags [DF], proto TCP (6), length 60)
белый_ip_сервера.34860 > белый_ip_шлюза.radmin-port: Flags [S], cksum 0xdbc0 (incorrect -> 0x378e), seq 2559544667, win 29200, options [mss 1460,sackOK,TS val 1124318865 ecr 0,nop,wscale 7], length 0
^C
3 packets captured
3 packets received by filter
0 packets dropped by kernel
Это можно сделать посредством asterisk?
[ext_incoming]
exten => 84999БЛАБЛАБЛА,1,Goto(quest_ring_incoming,s,1)
[quest_ring_incoming]
exten => s,n,Set(fname=${STRFTIME(${EPOCH},,%Y-%m-%d-%H%M)}-${CALLERID(number)})
exten => s,n,Monitor(wav,/home/asterisk/${fname},mb)
exten => s,1,Background(/var/lib/asterisk/IVR/my_avtootvetchik/pivetstvie)
exten => 666,1,Goto(operator666,s,1)
exten => 777,1,Goto(operator777,s,1)
[operator666]
exten => s,n,Dial(SIP/mytrunk/8499номероператора666,,m(moh_названиемузыкидляфона))
[operator777]
exten => s,n,Dial(SIP/mytrunk/8499номероператора777,,m(moh_названиемузыкидляфона))