Skip to content

Required Tools

Install the following tools on your local machine before starting work.

Local Machine

cloudflared

Required for SSH access to the NUC when working remotely. Routes SSH through Cloudflare Tunnel.

brew install cloudflared

After installation, configure your ~/.ssh/config as described in Access Setup.

Zoiper (Softphone)

Used for testing inbound and outbound calls through the Astradial PBX.

Download: https://www.zoiper.com/

Configuration:

Setting Value
Server devsip.astradial.com
Port 5080
Transport UDP
STUN Disabled

Disable STUN

STUN must be disabled in Zoiper. The dev SIP endpoint expects direct media paths. Enabling STUN will cause one-way audio or call setup failures.

Tip

Request a dev extension and password from Hari before configuring Zoiper.

SSH Client

Any standard SSH client works. macOS and Linux include one by default. On Windows, use the built-in OpenSSH client or PuTTY.

Ensure you have generated an SSH key pair:

ssh-keygen -t ed25519 -C "your-name@astradial"

Send the contents of ~/.ssh/id_ed25519.pub to Hari for provisioning.

Web Browser

Required for accessing:

  • Netdata dashboards -- system monitoring on NUC and cloud
  • Cloudflare dashboard -- DNS and tunnel management

No special browser extensions are needed.

git

Required for cloning and working with Astradial repositories.

# macOS (comes with Xcode CLI tools)
xcode-select --install

# Or via Homebrew
brew install git

Verify access after your GitHub account has been added to the organization:

git clone git@github.com:astradial/sip-gateway.git

NUC Tools

The following tools are pre-installed on the NUC and used for SIP debugging. You do not need to install these locally.

sngrep

Interactive SIP message flow viewer. Essential for debugging call setup, registration, and oudio negotiation issues.

# On the NUC
sudo sngrep

Common usage patterns:

# Filter by SIP method
sudo sngrep -c INVITE

# Filter by IP address
sudo sngrep -d eth0 host 10.10.10.1

# Save capture to file
sudo sngrep -O /tmp/capture.pcap

Tip

sngrep provides a real-time TUI showing SIP dialogs as ladder diagrams. Press Enter on any dialog to see the full message exchange. Press F7 to save a capture.

tcpdump

Low-level packet capture tool. Use when you need to inspect traffic beyond SIP (RTP streams, WireGuard packets, etc.).

# Capture SIP traffic on the WireGuard interface
sudo tcpdump -i wg0 -w /tmp/capture.pcap port 5060

# Capture all traffic to/from Tata SIP endpoint
sudo tcpdump -i eth0 -w /tmp/tata.pcap host <tata-sip-ip>

# Quick SIP packet inspection without writing to file
sudo tcpdump -i any -n port 5060 -A

Warning

Large packet captures on the NUC can fill up disk space quickly. Always write captures to /tmp/ and clean them up when done. Do not leave long-running captures unattended.

Tool Summary

Tool Install Location Purpose
cloudflared Local machine SSH tunnel to NUC via Cloudflare
Zoiper Local machine SIP softphone for call testing
SSH client Local machine Remote access to servers
Web browser Local machine Dashboards and Cloudflare management
git Local machine Repository access
sngrep NUC (pre-installed) SIP message debugging
tcpdump NUC (pre-installed) Packet capture and analysis