Solved

how to write  dial plan in asterisk

Posted on 2014-01-12
3
480 Views
Last Modified: 2014-02-08
Dear Experts:

Please suggest the how to docs to write the dial plan in asterisk or any online training to write the dial plan

Thanks in advance
0
Comment
Question by:D_wathi
3 Comments
 
LVL 20

Assisted Solution

by:José Méndez
José Méndez earned 166 total points
ID: 39774907
0
 
LVL 7

Accepted Solution

by:
nauliv earned 167 total points
ID: 39775166
D_Wathi,

The reference for Asterisk are the books written by Russell Bryant, Leif Madsen. Not only you will learn how to create dialplans, but how Asterisk was born, how it is architectured, what the different files are for, etc. It is written in a way that is easy to understand even for beginners.

3rd edition (covers up to asterisk 1.8) http://www.asteriskdocs.org/
4th edition (covers up to asterisk 11) http://shop.oreilly.com/product/0636920025894.do

Enjoy!
0
 
LVL 24

Assisted Solution

by:Mohammed Hamada
Mohammed Hamada earned 167 total points
ID: 39776584
Try using this tool  Visual Dialplan for asterisk, scroll to the end of the page
this is easier for you.

http://www.voip-info.org/wiki/view/Asterisk+Dialplan+Introduction
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Although VoiceOver IP has been around for a while, internet connections have only recently become fast enough to provide good call quality. Now, VoIP has become a real option for businesses looking at ways to improve their business model. In this ar…
Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question