Hello! We are using TG1600 and encountered problem that a lot of calls are rejected with below error. What could be the reason?
<------------->
[2020-03-06 11:05:58] VERBOSE[1665] chan_sip.c: --- (8 headers 0 lines) ---
[2020-03-06 11:06:02] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9998"<sip:9998@27.110.234.218;transport=TCP>;tag=42b83259
[2020-03-06 11:06:02] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9998"<sip:9998@27.110.234.218;transport=TCP>;tag=42b83259
[2020-03-06 11:06:04] VERBOSE[1665] chan_sip.c: Really destroying SIP dialog 'EoyFDHeBWNqMWA58_OdPdA..' Method: ACK
[2020-03-06 11:06:13] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9998"<sip:9998@27.110.234.218;transport=TCP>;tag=cb61396b
[2020-03-06 11:06:13] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9998"<sip:9998@27.110.234.218;transport=TCP>;tag=cb61396b
[2020-03-06 11:06:17] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9998"<sip:9998@27.110.234.218;transport=TCP>;tag=79599f6d
[2020-03-06 11:06:17] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9998"<sip:9998@27.110.234.218;transport=TCP>;tag=79599f6d
[2020-03-06 11:06:19] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=4c3b937a
[2020-03-06 11:06:19] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=4c3b937a
[2020-03-06 11:06:23] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=50fd3452
[2020-03-06 11:06:23] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=50fd3452
[2020-03-06 11:06:33] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=efbec63f
[2020-03-06 11:06:34] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=efbec63f
[2020-03-06 11:06:37] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=807be761
[2020-03-06 11:06:37] NOTICE[3171] chan_sip.c: Sending fake auth rejection for device "9999"<sip:9999@27.110.234.218:5060;transport=TCP>;tag=807be761
[2020-03-06 11:06:45] VERBOSE[1665] chan_sip.c: Really destroying SIP dialog '6MIh6litMPxKTwOxE1DlEg..' Method: ACK
[2020-03-06 11:06:45] VERBOSE[1665] chan_sip.c: Reliably Transmitting (NAT) to 3.0.165.5:5060:
OPTIONS sip:3.0.165.5 SIP/2.0
Via: SIP/2.0/UDP 192.168.10.48:5060;branch=z9hG4bK2a7abedb;rport
Max-Forwards: 70
From: "Unknown" <sip:Unknown@192.168.10.48>;tag=as32fe5cb0
To: <sip:3.0.165.5> Contact: <sip:Unknown@192.168.10.48>
Call-ID: 486558f0598b774454ed7aec6ed1099c@192.168.10.48
CSeq: 102 OPTIONS
Date: Fri, 06 Mar 2020 03:06:45 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO
Supported: replaces, timer
Content-Length: 0