None if you use the binary from the releases
Download heplify and execute 'chmod +x heplify'
Download heplify.exe
If you have Go 1.11+ installed, build the latest heplify binary by running make
.
You can also build a docker image:
docker build --no-cache -t sipcapture/heplify:latest -f docker/heplify/Dockerfile .
-i Listen on interface (default "any")
-nt Network types are [udp, tcp, tls] (default "udp")
-t Capture types are [pcap, af_packet] (default "pcap")
-m Capture modes [SIP, SIPDNS, SIPLOG, SIPRTCP] (default "SIPRTCP")
-pr Portrange to capture SIP (default "5060-5090")
-hs HEP UDP server address (default "127.0.0.1:9060")
-hi HEP Node ID (default 2002)
-di Discard uninteresting packets by string
-dim Discard uninteresting SIP packets by CSeq [OPTIONS,NOTIFY]
-cid remove prefix from correlationID which is obtain from callID [asbc,isbc,sbcpfx]
-fi Filter interesting packets by string
-rf Read PCAP file
-rs Use original timestamps when reading PCAP file
-wf Path to write pcap file
-zf Enable pcap compression
-e Log to stderr and disable syslog/file output
-d Enable certain debug selectors [fragment,layer,payload,rtp,rtcp,sdp]
# Capture SIP and RTCP packets on any interface and send them to 127.0.0.1:9060
./heplify
# Capture SIP and RTCP packets on any interface and send them via TLS to 192.168.1.1:9060
./heplify -hs 192.168.1.1:9060 -nt tls
# Capture SIP and RTCP packets on any interface and send them to 192.168.1.1:9060. Use a HEPNodeName
./heplify -hs 192.168.1.1:9060 -hn someNodeName
# Capture SIP and RTCP packets on any interface and send them to 192.168.1.1:9060. Print info to stdout
./heplify -hs 192.168.1.1:9060 -e
# Capture SIP and RTCP packets on any interface and send them to 192.168.1.1:9060 and 192.168.2.2:9060
./heplify -hs "192.168.1.1:9060,192.168.2.2:9060"
# Capture SIP and RTCP packets on any interface and send them to 192.168.1.1:9060. Print debug selectors
./heplify -hs 192.168.1.1:9060 -e -d fragment,payload,rtcp
# Capture SIP and RTCP packets with custom SIP port range on eth2 and send them to 192.168.1.1:9060
./heplify -i eth2 -pr 6000-6010 -hs 192.168.1.1:9060
# Capture SIP and RTCP packets on eth2, send them to homer and compressed to /srv/pcapdumps/
./heplify -i eth2 -hs 192.168.1.1:9060 -wf /srv/pcapdumps/ -zf
# Read example/rtp_rtcp_sip.pcap and send SIP and correlated RTCP packets to 192.168.1.1:9060
./heplify -rf example/rtp_rtcp_sip.pcap -hs 192.168.1.1:9060
# Capture and send packets except SIP OPTIONS and NOTIFY to 192.168.1.1:9060.
./heplify -hs 192.168.1.1:9060 -dim OPTIONS,NOTIFY
This Open-Source project is made possible by actual Humans without corporate sponsors, angels or patreons.
If you use this software in production, please consider supporting its development with contributions or donations