diff options
author | Mark Crane <mcrane@pfsense.org> | 2008-10-07 04:11:23 +0000 |
---|---|---|
committer | Mark Crane <mcrane@pfsense.org> | 2008-10-07 04:11:23 +0000 |
commit | a61e72498c5a25386081513b4c6853648190c862 (patch) | |
tree | 684127d977efcc631c9be2e16e38c4083e90ad0c /pkg_config.7.xml | |
parent | f721c5f363ea40fd34ed75366e432968e56c83a6 (diff) | |
download | pfsense-packages-a61e72498c5a25386081513b4c6853648190c862.tar.gz pfsense-packages-a61e72498c5a25386081513b4c6853648190c862.tar.bz2 pfsense-packages-a61e72498c5a25386081513b4c6853648190c862.zip |
freeswitch package goes live
Diffstat (limited to 'pkg_config.7.xml')
-rw-r--r-- | pkg_config.7.xml | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/pkg_config.7.xml b/pkg_config.7.xml index cee10bf5..3dfd26f7 100644 --- a/pkg_config.7.xml +++ b/pkg_config.7.xml @@ -14,6 +14,19 @@ <configurationfile>dashboard.xml</configurationfile> </package> <package> + <name>FreeSWITCH</name> + <website>http://www.freeswitch.org/</website> + <descr>FreeSWITCH is an open source telephony platform designed to facilitate the creation of voice and chat driven products scaling from a soft-phone up to a soft-switch. It can be used as a simple switching engine, a PBX, a media gateway or a media server to host IVR applications using simple scripts or XML to control the callflow. </descr> + <category>Services</category> + <config_file>http://www.pfsense.com/packages/config/freeswitch/freeswitch.xml</config_file> + <depends_on_package_base_url>http://files.pfsense.org/packages/7/All/</depends_on_package_base_url> + <version>0.1</version> + <status>Beta</status> + <required_version>1.2.1</required_version> + <maintainer>markjcrane@gmail.com</maintainer> + <configurationfile>freeswitch.xml</configurationfile> + </package> + <package> <name>snort</name> <descr>Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of other attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more.</descr> <category>Security</category> |