Is there an Asterisk exploit that somehow bypasses the ACL for a SIP peer? I put in
220.127.116.11/255.255.255.255 until I know what their real IP address is. I applied it in FreePBX and even restarted the Asterisk service. There’s still a peer from another IP address in one of the extensions.
I rebooted it, no difference.
/etc/asterisk/sip_additional.conf to make sure it was making it to the configuration and it is.