A Step-by-Step Guide to Port Forwarding on MikroTik Router for Vicidial Remote Agents

A Step-by-Step Guide to Port Forwarding on MikroTik Router for Vicidial Remote Agents

In today’s remote work landscape, maintaining a seamless connection between your Vicidial call center software and remote agents is crucial. One way to achieve this is by correctly configuring port forwarding on your MikroTik router. This guide will walk you through the process, ensuring your remote agents can access Vicidial without any hiccups.

Why Port Forwarding Matters

Port forwarding is essential for enabling external access to specific devices or services within your local network. In the context of Vicidial, it allows remote agents to connect to the call center software securely. Without proper port forwarding, remote access can be challenging or impossible.

Prerequisites

Before diving into the configuration, make sure you have the following:

  1. A MikroTik router.
  2. Access to the router’s web interface or Winbox.
  3. Vicidial already set up and running within your local network.

Continue reading A Step-by-Step Guide to Port Forwarding on MikroTik Router for Vicidial Remote Agents

How to connect your Cloud Vicidial with your office Issabel PBX

How to connect your Cloud Vicidial with your office  Issabel PBX.

Vicidial is a powerful open-source call center software that is widely used by businesses to manage their call center operations. Issabel, on the other hand, is a popular open-source PBX (Private Branch Exchange) system that allows businesses to manage their phone systems. Connecting your Cloud Vicidial with your office Issabel PBX can provide your business with a seamless communication solution that can help improve your call center operations. In this blog post, we will guide you on how to connect your Cloud Vicidial with your office Issabel PBX.

Connecting your Cloud Vicidial with your office Issabel PBX can provide your business with a seamless communication solution that can help improve your call center operations. By following these simple steps, you can easily set up the connection between your Cloud Vicidial and your office Issabel PBX. This can help your business to streamline its communication processes and enhance customer service.

If  you are planning to run campaign from cloud Vicidial and your PRI or SIP Trunk is connected to your local Issabel PBX . and which is not having a public IP and its behind the NAT and your internet connection is giving you a dynamic IP.

So you can not make IP to IP SIP trunk .

So we can make a SIP trunk in Issabel which will register  with Cloud Vicidial .We are doing this  because of Cloud Vicidial is having Static Public IP and it will not change.So it will be easy to make SIP trunk. We are using registration with authentication.

Continue reading How to connect your Cloud Vicidial with your office Issabel PBX

vicibox 10 time synchronization problem with your system

vicibox 10 time synchronization problem with your system

If you PHP time and DB time is matching and not syncing with system time

and its showing red line

If DB time is wrong it means that /usr/share/astguiclient/AST_update.pl script does not update DB value. Try to launch it manually and check for output.

If it throws error:

pattern match timed-out at /usr/share/astguiclient/AST_update.pl line 470

 

 

 

 

 

 

 

Continue reading vicibox 10 time synchronization problem with your system

How to secure Vicidial on Public IP

How to secure Vicidial on Public IP.

Vicidial has given  many security options to secure your server as below

• White List (ViciWhite)– Blocks all access except for IPs specifically defined in a ViciDial IP List
• Black List (ViciBlack)– Block any IP specifically defined in a ViciDial IP List (Defaults to SIP/IAX/RTC)
• Dynamic List (ViciBox Dynamic Portal)– Allows agents to manually authenticate with a portal to gain access to ViciDial
• VoIPBL – Community generated list of known SIP attackers, works the same as a Black List
• GeoBlock – Block IPs based on their assigned geographical location, similar to the Black List

ViciWhite is the best method to secure your Vicidial server.

Step -1  Enable IP Lists under admin  > System Setting

 

 

 

 

 

 

 

 

 

 

Continue reading How to secure Vicidial on Public IP

How to create scripts in Vicidial for Inbound or OutBound Campaign

How to create scripts in Vicidial for Inbound or Outbound Campaign

Script  will show the content which we will configure in the script screen on agent screen . when calling to  outbound campaign number or call is coming to inbound campaign .

for example I have created a script for outbound campaign to just just the agent name who is calling and to whom he is calling. its depends upon how much data you have related to the you are calling or receiving call.

Your script will show under script tab   as in below image .

Continue reading How to create scripts in Vicidial for Inbound or OutBound Campaign

How to change default Vicidial login 6666 to admin other name

How to change default Vicidial login 6666 to admin other name

After fresh setup of vicidial  its gives you default login and password as 6666 and 1234 .

you can change default login 6666 to admin or as you want .

1- Login to your server

2- login to mysql

3-

mysql -u root -ppassw0rd
use asterisk;
update vicidial_users set user='admin' where user='6666';

It will change all records  related to this user .

its is good to change due to security  issue.

How to configure firewall IPTABLES on Vicidial on cloud

How to configure firewall IPTABLES on Vicidial on cloud .

If you are hosting your Vicidial on the cloud then there are big issue with illegal’s SIP registration attacks and illegal’s calls issue.

So its better to block every thing  allow your IPs and RTP packets . this need to be done very carefully otherwise you will lock your self.

Here I am giving an example step by step . and I hope someone can come up some good addition to secure more .

Access your server by ssh

iptables -F
iptables -N SIP
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -s X.X.X.X -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -s 8.8.8.8/32 -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -p udp --dport 5060 -j SIP
iptables -A INPUT -p udp --dport 5060 -j DROP
iptables -A INPUT -p udp --dport 5061 -j SIP
iptables -A INPUT -p udp --dport 5061 -j DROP
iptables -A INPUT -p udp --dport 10000:20000 -j ACCEPT
iptables -I INPUT 1 -i ens192 -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -I INPUT 2 -i ens192 -p tcp --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A SIP -s X.X.X.X/32 -j ACCEPT
iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT ACCEPT
/sbin/service iptables save


Continue reading How to configure firewall IPTABLES on Vicidial on cloud