[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Can i connect a verifone to a asterisk FXS port?

Posted on 2009-02-17
2
Medium Priority
?
512 Views
Last Modified: 2013-11-12
I want to know if there is a way to make a verifone work connecting it to a digium card with fxs ports, can i use several digium cards on the same asterisk server? ex 1 T1 Pri card and another one with multiple  fxs ports.

0
Comment
Question by:vcruzcid
2 Comments
 
LVL 25

Accepted Solution

by:
Ron Malmstead earned 2000 total points
ID: 23666647
Yes you can connect them to fxs ports....it will function as an anolog line like any other.

You can also have PRI cards and FXS/FXO cards in the same box, just make sure that you configure the zaptel.conf file correctly...  The PRI spans always start at channel 1...then you specify the channels for fxs/fxo's...

http://www.voip-info.org/wiki-Asterisk+config+zaptel.conf
0
 

Author Closing Comment

by:vcruzcid
ID: 31548015
thanks
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The point of this post is to give you a copy/paste installation solution to setting up Asterisk 1.6 on Ubuntu 9.04 (or similar) server. # Setup the system apt-get install subversion apt-get install make apt-get install linux-source kernel-p…
I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month17 days, 17 hours left to enroll

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question