Ss7

From VoIPmonitor.org
Jump to navigation Jump to search

For enable the parsing of ISUP/ss7 packets you need to use voipmonitor including wireshark libs

Generic ss7 ISUP support

sniffer binary

download static binary

you can download it from [sourceforge] the binary voipmonitor-wireshark-amd is the one that you need to gets used (download it, unpack and place it to /usr/local/sbin/voipmonitor)

make from sources

or you can get sources using git and then use make ss7 to build dynamic voipmonitor binary including wireshark libs

git clone https://github.com/voipmonitor/sniffer.git ./sniffer-git
cd sniffer-git
./configure
make ss7
make install

sniffer settings /etc/voipmonitor.conf

add following option to sniffer's config

ss7=yes

GUI's settings

There is no need to do any changes - there will appears new section SS7 in the GUI's menu after first SS7 call stored in to ss7 table in db.

Sonus STPs SS7

sniffer binary

make from sources

you need to get sources using git and then use make ss7 to build voipmonitor including wireshark libs (static binary cannot be used)

sniffer settings /etc/voipmonitor.conf

enable following options in sniffer's service config

ss7 = yes
ss7port = 7377
ss7callid = cic
ws_param = mtp3.heuristic_standard:TRUE
ws_param = mtp3.standard:ANSI
ws_param = mtp3.itu_pc_structure:3-8-3

GUI's settings /var/www/html/config/configuration.php

GUI requires additional options added to its configuration.php file:

define("TSHARK_PATHNAME", "tshark");
define("TSHARK_PARAMS_SS7_SONUS", "mtp3.heuristic_standard:TRUE;mtp3.standard:ANSI;mtp3.itu_pc_structure:3-8-3");

add and configure tshark with lua plugins

in usr/share/wireshark (or /usr/local/share/wireshark) edit the file init.lua and add at the end of the file:

dofile(DATA_DIR.."sonuscm.1.12.lua")
dofile(DATA_DIR.."sonusimf.1.12.lua")

upload the lua files to same directory where init.lua was created (you can get lua files from voipmonitor sniffer sources in ./scripts/ss7/lua subfolder)

testing

tshark -o 'mtp3.heuristic_standard:TRUE' -o 'mtp3.standard:ANSI' -o 'mtp3.itu_pc_structure:3-8-3' -r imf_sample.pcap -T json 'frame.number==22'

then wipe the packet #22 and use for voipmonitor upload - the output of tshark and voipmonitor should be same:

voipmonitor --config-file=./config/voipmonitor.conf -p XobmuJ -b voipmonitor_ipv6 -k -v1,dump_packets_via_wireshark -r imf_sample_frame22.pcap --json_config='[{"ws_param":"mtp3.heuristic_standard:TRUE"},{"ws_param":"mtp3.standard: ANSI"},{"ws_param":"mtp3.itu_pc_structure: 3-8-3"},{"ss7":"yes"},{"ss7port":"7377"},{"ss7callid":"cic"}]'