Asterisk: Run PBX as a VM ?

Posted on 2009-05-02
Last Modified: 2013-12-27
I would like to reduce the server number in my network and I was wondering if its possible to run an Asterisk/Trixbox server as a VM. My current server has a Digium analog card installed. Is it possible using perferrably VM workstation or even ESX server to have a VM work with that hardware device in its host?
Question by:jonnydollar
    LVL 31

    Expert Comment

    Yep, I've done this myself using VMWare Server. I expect it would work with esx server

    TrixBox downloads as a "live cd" that you can install. So you just create the virtual machine in vmware with adequate hardware, capture the ISO, boot from it, and install. Configure the network so that it uses bridged networking, and maybe assign the server a static IP address. Then make sure your ports are forwarded properly. You should know what they are from your previous server but I can get it for you if necessary.
    LVL 31

    Expert Comment

    There is also an AsteriskNow vmware appliance in the virtual appliance marketplace, you can use that directly if you like, however it is considered a "beta" and not for production use, although I haven't experienced any problems with it.

    Author Comment

    what about my digium card? how do i get the VM machine to see the digium card that is in the host machine?
    LVL 31

    Accepted Solution

    My system uses a voip line so I don't have that problem.

    As of 2006, vmware was not capable of abstracting things like PCI cards to virtual machines. It required more standardization on the part of PCI cards and the vmkernel needed a rewrite, so as of those days, vmware doesn't support FXO/FXS cards.

    However, that was three years ago. Things could have changed since then, I'm honestly not sure.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Suggested Solutions

    So you think no one can listen in on your VOIP conversations, eh? Well... if you haven't setup Secure Real Time Transport (SRTP), your voice communications can be hacked into by just about anyone! First, let's talk about the intended audience for…
    I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now