Archives July 2021

How to – install a webphone/viciphone on your Vicidial server

webrtc installation

How to – install a webphone/viciphone on your Vicidial server

UPDATED: Oct. 10th 2023

I’ve been having a bunch of people ask me to write up an article for installing the Viciphone which I never did before because has some really great instructions already. But I will create this post with picture and alternative Viciphones for you guys to use. There is also an easier method by using my auto installer on my GitHub at this link: This will complete all the steps below for CentOS, Alma, Rocky or Ubuntu based systems. Leap or ViciBox users will still have to follow the commands below:


Step 1 – Create the SSL certificate to use for your server and viciphone

This is a pretty easy process using certbot which uses letsencrypt. the first thing you have to do is setup your FQDN(Fully qualified domain name) to point to your server. For this demonstration I will show you with registrar services. You want to add an A record as shown below:

This you need to run the following command for certbot:

  • certbot certonly –webroot

You’re output should look as it does below:

Step 2 – Install the SSL certificate in Apache

  • cd /etc/apache
  • nano ssl-global.conf
  • scroll down until you see these two lines and change them to point to your certificate and uncomment the SSLCertificateFIle and SSLCertificateKeyFile as show below:
  • cd vhosts.d/
  • nano 1111-default-ssl.conf
  • Edit this file if you have installed using the Vicibox iso, if this is a scratch install you can skip this step.

Step 3 – Install the SSL certificate in Asterisk

  • cd /etc/asterisk/
  • nano http.conf
  • enter the following information as shown below:


  • service apache restart
  • service asterisk restart
  • run this command to make sure the ports are now open and running: ss -ltnu

Go into Aterisk with “asterisk -r” to verify it and type the command: http show status

Step 4 – Install Viciphone 3 or you can try my version of the Viciphone which I call CyburPhone

I will provide two githubs of which you can choose which version you want to use. The first one is by Mike from of whom I have the utmost respect for his work on the Viciphone to improve it and update to sip.js-0.20. His link is:


To use this you need to go into your root web directory and then git cloning by running the following commands:

  • cd /srv/www/htdocs for Leap or cd /var/www/html for CentOS, Alma or Rocky
  • git clone

Or if you prefer to use my version which looks like this:


You can go to my github at:

You should already be in the web directory at this point but to use my webrtc phone clone it with this command:

  • git clone

Now that you’ve downloaded the webrtc phone you’ve decided to use, you need to set the proper permissions for it, for this article I will demonstrate on my version

  • chmod -R 777 CyburPhone/
  • chown -R wwwrun:www CyburPhone/ – Leap
  • chown -R apache:apache CyburPhone – CentOS, Alma and Rocky

You would do the same thing for the Viciphone by just replacing CyburPhone with ViciPhone

Thats it for the phone installation, now to set what you need in the Vicidial GUI

Step 4 – Setting the webphone in Vicidial

Go into Admin > system settings and scroll down near the bottom:

Set the webphone url to the above or if you’re using the Viciphone use

Step 5 – Setting the Web Socket URL on the server

Go to admin > servers > your server

Step 6 – Creating the webrtc template

Go to admin > templates and create a new template

Enter the folllwing into the template and change the domain to yours:


WebRTC Template

Thats all there is to it, now you are all set to use webrtc technology and do away with annoying softphone configurations and reps always complaining about their phone not registering, lol. I hope this article has helped and if you have any problems, feel free to stop by our live support channel on skype or post a comment here:

I hope this helps

-Chris aka carpenox

How to – Scratch install the dynportal on CentOs, Rocky or Alma Linux


How to – Scratch install the dynportal on CentOs, Rocky, or Alma Linux

This article will go over the steps to Scratch install the dynportal on a scratch CentOs, Rocky or Alma Linux Vicidial box that normally comes with the ISO. I have created the files you need and host them on one of my sites for download.

Step 1 – Download the necessary files

You will need 4 files to get this working on your server that you can download below

yum install -y firewalld
cd /home

Step 2 – Move and unzip the files

You can copy and paste the following

  • mkdir -p /var/www/vhosts/dynportal
  • mv /home/ /var/www/vhosts/dynportal/
  • mv /home/ /etc/firewalld/
  • cd /var/www/vhosts/dynportal/
  • unzip
  • cd etc/httpd/conf.d/
  • mv viciportal-ssl.conf viciportal.conf /etc/httpd/conf.d/
  • cd /etc/firewalld/
  • unzip -o
  • mv /home/aggregate /usr/bin/
  • chmod +x /usr/bin/aggregate
  • mv /home/VB-firewall /usr/bin/
  • chmod +x /usr/bin/VB-firewall
Unzip your files

Step 3 – Add your SSL cert to dynportal-ssl.conf and location for redirect is

You need to edit your dynportal-ssl.conf file in /etc/httpd/conf.d/

nano /etc/httpd/conf.d/viciportal-ssl.conf

change the location to your SSL cert files

Scratch install the dynportal on CentOs
Dynportal SSL config

nano /var/www/vhosts/dynportal/inc/

Step 4 – add entry to crontab

Add the following lines to the bottom of your crontab by typing: crontab -e

### ViciBox integrated firewall, by default just load the VoIP Black list and reload it every 4 hours
### You can lock everyone out of your server if you set this wrong, so understand what you are doing!!!
@reboot /usr/bin/VB-firewall --whitelist=ViciWhite --dynamic --quiet
* * * * * /usr/bin/VB-firewall --whitelist=ViciWhite --dynamic --quiet --flush

Step 5 – Add ports to firewall and apache

Now use firewall-cmd and open port 446 on the firewall for public zone like such:

firewall-offline-cmd --add-port=446/tcp --zone=public --permanent

And edit the apache conf file to add the port to it:

  • nano /etc/httpd/conf/httpd.conf
  • Add this line: Listen 446

Step 6 – Restart services

  • service firewalld restart
  • service httpd restart
  • systemctl enable firewalld

That’s it, now go to and you should see the following:

Dynportal Interface
Dynportal Interface

Why doesn’t my webphone/Viciphone work anymore?

webrtc installation

Why doesn’t my webphone/Viciphone work anymore?

UPDATE: October of 2023

There is a new issue since the evolution of the ViciPhone version 3 and CyburPhone version 3.2.5 that has been happening and I will go over how to solve it for everyone. The new feature in ViciDial that uses a settings container called “viciphone settings” has a setting by default that has the webphone dial its own extension which then gets you a result of a sound file telling you that “The number you have dialed is not in service”. The solution for this is simple, just need to change one line in the settings container as described below:

  1. Go into your Vicidial admin GUI
  2. Click on Admin and then Settings Containers
  3. Change the line that says “dialRegExten” from a 1 to a 0 as shown below

This will now fix your webphone. If you have any questions feel free to comment below or join our live support on Skype:

2021 Issue Solution:

This article is to help those of you having problems with viciphone lately. It seems that googles stun server has reached end of life and no longer works correctly. You need to change the stun server to a different one. Here is a list of public stun servers:

Free Public STUN servers

How do I change my STUN server for viciphone?

Good question, you need to edit your rtp.conf file for asterisk.

  • cd /etc/asterisk
  • nano rtp.conf
  • scroll down to the very bottom and change it to one on the list above

That’s it, youre done. If you have any problems or questions feel free to comment below.

I hope this helps.

-Chris aka Nox

T-Mobile is fighting back against scam calls with 100% STIR/SHAKEN compliance

STIR/SHAKEN – What to know

BELLEVUE, Wash. — June 30, 2021 — T-Mobile (NASDAQ: TMUS) today announced that it has filed a certification of completion of STIR/SHAKEN implementation in the Federal Communications Commission’s Robocall Mitigation Database. With the filing, the Un-carrier is certifying that all calls originating on the T-Mobile network are 100% STIR/SHAKEN compliant.


T-Mobile was the first US wireless provider to work with all other major networks to implement STIR/SHAKEN to fight number spoofing and further protect customers from scammers. With these partnerships, T-Mobile authenticates calls with wireless and network providers that collectively represent around 98% of wireless customers in the U.S.

Number Verification provided by STIR/SHAKEN, coupled with free Caller ID provided by T-Mobile Scam Shield, helps T-Mobile customers rest assured that the calls they receive are authenticated as coming from the phone number displayed in Caller ID and have not been spoofed. This makes Caller ID even stronger in the fight against scam and robocalls, and with Scam Shield, all T-Mobile, Metro by T-Mobile and Sprint brand individuals, families and small business get free Caller ID.

T-Mobile currently provides STIR/SHAKEN implementations with AT&T, Comcast, Spectrum Voice from Charter Communications, UScellular, and Verizon Wireless as well as Altice USA, Bandwidth, Brightlink, Clear Rate, Google Fi, Inteliquent, Intrado, Magicjack, Peerless, and Twilio.

What you need to know

  • Calls originating on the T-Mobile network are 100% STIR/SHAKEN compliant.
  • T-Mobile has implemented STIR/SHAKEN with 15 other carriers.
  • STIR/SHAKEN works with T-Mobile’s Caller ID to make sure the displayed number is accurate.

Scam and spam calls can often come from a number that looks familiar or spoofs another trusted number, so a traditional caller ID may not be effective against these calls. STIR/SHAKEN works to verify that a call is coming from the claimed source.

John Freier, Executive Vice President of T-Mobile Consumer Group, said:

Number Verification, along with Caller ID, and the scam identification and blocking tools in Scam Shield, gives our customers the industry’s most comprehensive free scam and spam protection.

We were first to implement number verification in 2019 and today, all calls originating on the T-Mobile network are 100% STIR/SHAKEN compliant, giving our customers peace of mind that their calls are protected against scammers and spammers.

STIR/SHAKEN (Secure Telephone Identity Revisited and Signature-based Handling of Asserted Information Using toKENs) is a method of verifying that phone calls made over IP are actually coming from the proper origin by having the caller ID signed by the originating carrier. Calls made over IP are routed over an internet protocol and are required by the FCC for STIR/SHAKEN. This method is now being used by every major carrier, including T-Mobile, as it increases its reliance on 5G coverage, which uses IP for calls.

How can my business become STIR/SHAKEN compliant?

That’s simple. Sign up with the pioneers of this new STIR/SHAKEN technology and leading VoIP providers in the world at We also invite you to check out our webinar featuring the guys from TIltx and Matt Florell from the ViciDial Group which goes over how this technology works and how to implement it on your system with “the easy button”. They have really made this process extremely easy and we are always here to help you do it on your system if you need help. Just call us at 844-PC-SATA-2 or 1(725)22-CYBUR

Do you provide STIR/SHAKEN service?

Great question, yes we do. We offer two plans of service, one which covers only your cloud based phone system hosting starting at just $15 USD per user or or all inclusive plan which comes with everything you need to run your business, including the phone system with unlimited STIR/SHAKEN minutes and DID compliant phone numbers, customer relations management, full security module including ransomware protection, timeclocks and human resources modules and so much more with prices starting out as low as %85 USD per user. For more information click here.