Integrating VICIdial with CRM: Solving Custom Field and Data Sync Issues

VICIdial is one of the most powerful and widely used open-source dialer platforms for call centers. It supports inbound, outbound, and blended campaigns and is trusted by organizations worldwide. However, when VICIdial is used without proper CRM integration, critical customer data often becomes fragmented across systems, leading to inefficiencies, reporting gaps, and operational challenges.

Continue reading
Posted in Vicidial | Tagged , , , , , , | Leave a comment

How to Remove +91 / 91 from Incoming Caller ID in VICIdial (Fix Lead Matching Issue)

Problem Overview

 == Using SIP RTP CoS mark 5
       > 0x7f81dc00eab0 -- Strict RTP learning after remote address set to: 172.16.10.222:19274
    -- Executing [5101@trunkinbound:1] NoOp("SIP/JIO-00000003", "Inbound call from +918318841546") in new stack
    -- Executing [5101@trunkinbound:2] ExecIf("SIP/JIO-00000003", "1?Set(CALLERID(num)=8318841546)") in new stack
    -- Executing [5101@trunkinbound:3] ExecIf("SIP/JIO-00000003", "0?Set(CALLERID(num)=18841546)") in new stack
    -- Executing [5101@trunkinbound:4] NoOp("SIP/JIO-00000003", "CallerID after strip: 8318841546") in new stack
    -- Executing [5101@trunkinbound:5] AGI("SIP/JIO-00000003", "agi-DID_route.agi") in new stack
    -- Launched AGI Script /usr/share/asterisk/agi-bin/agi-DID_route.agi
    -- AGI Script Executing Application: (Monitor) Options: (wav,/var/spool/asterisk/monitor/MIX/20260110121607_5101_8318841546)
    -- <SIP/JIO-00000003>AGI Script agi-DID_route.agi completed, returning 0
    -- Executing [99909*2***DID@default:1] Answer("SIP/JIO-00000003", "") in new stack
       > 0x7f81dc00eab0 -- Strict RTP qualifying stream type: audio
       > 0x7f81dc00eab0 -- Strict RTP switching source address to 172.16.60.1:19274
    -- Executing [99909*2***DID@default:2] AGI("SIP/JIO-00000003", "agi-VDAD_ALL_inbound.agi") in new stack

In many VICIdial installations in India, inbound calls arrive with the caller ID in E.164 format, such as:

Continue reading
Posted in Vicidial | Tagged , , , , , | Leave a comment

How to Retrieve VICIdial Admin Password from MySQL Database

Losing or forgetting the VICIdial admin password is a common issue, especially when systems are handed over between teams or managed by multiple administrators. Fortunately, VICIdial stores user credentials in its MySQL database, and an administrator with server access can retrieve or reset the password directly from the database.

This article explains how to retrieve the VICIdial admin user password using MySQL, along with important security notes and best practices.


Continue reading
Posted in Vicidial | Tagged , , , , , , , , | Leave a comment

How to Manage KVM Virtual Machines on Ubuntu Server Using virsh

Kernel-based Virtual Machine (KVM) is the most widely used virtualization technology on Linux servers. On Ubuntu Server, KVM is managed using libvirt, and the primary command-line tool provided by libvirt is virsh.

This guide explains how to manage KVM virtual machines on Ubuntu Server using virsh. It covers real-world examples such as starting and stopping virtual machines, enabling auto-start after reboot, accessing the VM console, monitoring resources, managing disks and networks, and troubleshooting common issues. This article is suitable for production environments.

Continue reading
Posted in KVM | Tagged , , , , , , , , , , , , , , , | Leave a comment

Palo Alto UNAT Configuration – Step-by-Step Lab Guide (LAN → DMZ via WAN)

Introduction

In real-world enterprise networks, it is common to access DMZ servers using a public IP address, even from internal LAN users. This design improves consistency, simplifies DNS, and mirrors real internet access behavior.

In this blog, I will demonstrate User NAT / Destination NAT (UNAT) configuration on a Palo Alto Networks firewall using a practical lab setup with LAN, WAN, and DMZ zones.

This guide explains how traffic from a LAN PC reaches a DMZ mail server using its public IP, with UNAT applied on the firewall.

Read more: Palo Alto UNAT Configuration – Step-by-Step Lab Guide (LAN → DMZ via WAN) Continue reading
Posted in Paloalto Firewall | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

Point-to-Point Wireless Devices Comparison: Practical Hardware Selection Guide

Point-to-point (PtP) wireless connectivity is a proven and widely used networking solution to connect two locations without laying fiber. It is commonly deployed for office-to-office connectivity, factories, warehouses, CCTV backhaul, ISPs, schools, and branch offices.

Choosing the correct point-to-point wireless hardware is critical for achieving stable performance, reliable bandwidth, and long-term scalability. This guide is based on real field experience shared by vendor engineers and system integrators.

Continue reading
Posted in Mikrotik, Network | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

Excitel Broadband Router Default Login

Excitel Broadband Default Router Login

If you have an Excitel-provided router and need to access its admin page, many devices are shipped with default credentials you can use to sign in. Default username: excitelDefault password: exc@123

Step-by-step: How to log in

Continue reading
Posted in Network | Leave a comment

FortiGate Tip: How to Change WAN Web Access Port After Configuring IPsec VPN

When you configure an IPsec Site-to-Site VPN on a FortiGate firewall (especially models like 40F, 60F, 80F), you may suddenly lose access to the web GUI on the WAN interface (port 443).
FortiGate also shows a warning during IPsec setup that HTTPS access on the WAN may be affected.

This happens because the VPN configuration can modify interface roles, local-in policies, and route priorities — which sometimes blocks the default management port (443).


Continue reading
Posted in Network | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

How to Configure Site-to-Site IPsec VPN Between Two FortiGate 40F Firewalls (FortiOS v6 and v7)

Connecting branch offices or partners through a secure VPN tunnel is one of the most common FortiGate tasks.
This guide shows how to configure a manual IPsec site-to-site VPN between two FortiGate 40F units running different firmware versions:

SiteModelFirmware
Site BFortiGate-40Fv7.6.3, build 3510 (GA.F)
Site CFortiGate-40Fv6.4.7, build 8726 (GA)
Continue reading
Posted in Network | Tagged , , , , , , , , , , , , , , , , | Leave a comment

How to configure Tata SIP trunks in VICIdial — registered and peer setups (safe examples)

Quick overview: Register vs Peer

Registration (client registers to provider)

  • Your VICIdial server authenticates to the provider by sending a REGISTER.
  • Useful when provider expects a dynamic/unknown IP on your side or requires auth.
  • You’ll typically provide username, secret, and a register => string.

Peer / No registration

  • Provider accepts calls from your server IP without you performing SIP REGISTER.
  • You configure the provider as a SIP peer (host=provider.domain), and they accept INVITEs from your IP.
  • Preferred for fixed-IP servers — slightly simpler and often more reliable for direct routing.
Continue reading
Posted in IP Telephony | Tagged , , , , , , , | Leave a comment