Hello Andrew,
Welcome on board.
I’m not part of the official support team, but I’ll do my best to help you alongside Kaian (Irontec's internal support contact here). Please note that my responses are based on personal experience working with IvozProvider in lab environments, and not official guidance from Factoria/Irontec.
I understand the confusion around the "1/2 IP" comment. What it really means is that IvozProvider requires two public IP addresses:
Trunk IP – used to connect to your PSTN/trunk providers
Client IP – used by your end users to register and make calls
This separation improves security. For example, you can lock down the trunk IP to allow traffic only from specific SIP providers, while still allowing broader access to the client IP for your users.
While the documentation states it’s technically possible to run with a single public IP (by remapping ports, e.g., KamTrunks on 7060/7061 instead of 5060/5061), my own experience has been that it's more fragile and harder to maintain. I strongly recommend using two public IPs — it’s far easier to manage.
Yes — if you installed with a single IP and didn’t update KamTrunks to use alternate ports (e.g., 7060/7061), you will get port conflicts, which can cause services like Asterisk to fail at startup.
To confirm what's going wrong:
Also check whether Kamailio and Asterisk are fighting for port 5060. Again, the cleaner solution is to allocate two IPs — one for KamUsers, the other for KamTrunks — to avoid any port conflict.
You're correct — the documentation doesn't walk through certificate automation. Here's what I use to get Let's Encrypt working with wildcard domains:
Install Certbot:
Generate a wildcard cert using DNS-01 challenge:
If supporting multiple domains:
sudo certbot certonly --manual --preferred-challenges dns -d "*.yourdomain.com" -d "*.yourdomain2.com" (etc)
If adding more domains in future:
Your certificates will be stored in:
1. Apache Configuration
Edit /etc/apache2/sites-available/020-ivozprovider-portal.conf
Under <VirtualHost *:443>, set:
2. Kamailio Proxy Trunks/Users
Rename:
Then update each tls.cfg:
Restart affected services after this:
Hope this helps get you moving forward. Let me know if anything’s unclear — happy to share more of what I’ve learned.
Best regards,
airsay


On 6 May 2025, at 18:27, Andrew Wells <koola...@gmail.com> wrote:
Thanks man, i will re-install, i think it is the best path...regarding the proxmox download, this is for a vm not proxmox itself, as i just did a quick search and i cannot find a special download for debian vm on proxmox...am i missing something here.
--
You received this message because you are subscribed to a topic in the Google Groups "ivozprovider-users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/ivozprovider-users/ak11VpBN7no/unsubscribe.
To unsubscribe from this group and all its topics, send an email to ivozprovider-us...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ivozprovider-users/f9c042f0-a7ec-4595-9e8f-1bb4137391c0n%40googlegroups.com.
On 8 May 2025, at 18:17, Andrew Wells <koola...@gmail.com> wrote:
HI Airsay, i didnt see your offer for help. I have spent hours on this with the help of askleo on brave and even deepseek ai and it never works. I have posted how to do this in proxmox, but i have a feeling that they are going to tell me it is a debian issue, even thought debian on bare metal would have two separate lan cables....i digress...i am completely stuck as i have install proxmox vm ( and some containers) at least 100x but never with two nics
To view this discussion visit https://groups.google.com/d/msgid/ivozprovider-users/1936e283-6ef6-4fb0-8e19-b834d201e2c4n%40googlegroups.com.