Required Tools¶
Install the following tools on your local machine before starting work.
Local Machine¶
cloudflared¶
Required for SSH access to the NUC when working remotely. Routes SSH through Cloudflare Tunnel.
After installation, configure your ~/.ssh/config as described in Access Setup.
Zoiper (Softphone)¶
Used for testing inbound and outbound calls through the Astradial PBX.
Download: https://www.zoiper.com/
Configuration:
| Setting | Value |
|---|---|
| Server | devsip.astradial.com |
| Port | 5080 |
| Transport | UDP |
| STUN | Disabled |
Disable STUN
STUN must be disabled in Zoiper. The dev SIP endpoint expects direct media paths. Enabling STUN will cause one-way audio or call setup failures.
Tip
Request a dev extension and password from Hari before configuring Zoiper.
SSH Client¶
Any standard SSH client works. macOS and Linux include one by default. On Windows, use the built-in OpenSSH client or PuTTY.
Ensure you have generated an SSH key pair:
Send the contents of ~/.ssh/id_ed25519.pub to Hari for provisioning.
Web Browser¶
Required for accessing:
- Netdata dashboards -- system monitoring on NUC and cloud
- Cloudflare dashboard -- DNS and tunnel management
No special browser extensions are needed.
git¶
Required for cloning and working with Astradial repositories.
Verify access after your GitHub account has been added to the organization:
NUC Tools¶
The following tools are pre-installed on the NUC and used for SIP debugging. You do not need to install these locally.
sngrep¶
Interactive SIP message flow viewer. Essential for debugging call setup, registration, and oudio negotiation issues.
Common usage patterns:
# Filter by SIP method
sudo sngrep -c INVITE
# Filter by IP address
sudo sngrep -d eth0 host 10.10.10.1
# Save capture to file
sudo sngrep -O /tmp/capture.pcap
Tip
sngrep provides a real-time TUI showing SIP dialogs as ladder diagrams. Press Enter on any dialog to see the full message exchange. Press F7 to save a capture.
tcpdump¶
Low-level packet capture tool. Use when you need to inspect traffic beyond SIP (RTP streams, WireGuard packets, etc.).
# Capture SIP traffic on the WireGuard interface
sudo tcpdump -i wg0 -w /tmp/capture.pcap port 5060
# Capture all traffic to/from Tata SIP endpoint
sudo tcpdump -i eth0 -w /tmp/tata.pcap host <tata-sip-ip>
# Quick SIP packet inspection without writing to file
sudo tcpdump -i any -n port 5060 -A
Warning
Large packet captures on the NUC can fill up disk space quickly. Always write captures to /tmp/ and clean them up when done. Do not leave long-running captures unattended.
Tool Summary¶
| Tool | Install Location | Purpose |
|---|---|---|
| cloudflared | Local machine | SSH tunnel to NUC via Cloudflare |
| Zoiper | Local machine | SIP softphone for call testing |
| SSH client | Local machine | Remote access to servers |
| Web browser | Local machine | Dashboards and Cloudflare management |
| git | Local machine | Repository access |
| sngrep | NUC (pre-installed) | SIP message debugging |
| tcpdump | NUC (pre-installed) | Packet capture and analysis |