Help w/Voice VLAN on SMB 300-10p

We have purchased serveral new SMB 300 switches to support our VoIP rollout and save cost. I'm use to using the CLI on cisco devices, but now i'm stuck figuring out the GUI that comes with these switches.
I have setup the Voice VLAN to be 100, i have setup the port type as general, and i have added the port to VLAN 4 (data vlan). when i plug the NEC phone into the switchport and the computer into the phone, the computer gets an IP in VLAN 4 but the phone gets an IP from VLAN 1 not VLAN 100.
Like i said i set the Voice VLAN to 100, but when i look at the Macro for the smartport it is saying the voice vlan is 1. Do i have to manually change the macro somehow? can i change the macro somehow?
Sorry i don't have a lot of info in this post. If you need to know how anything else is configured just ask i'll post it up.
Thanks
Karl                  

Hi Karl,
You can use the serial db9 console cable that came with it for a hardwired connection (I use putty):
Also you can enable telnet and/or ssh: Status and Statistics -> System Summary, look for TCP/UDP services status and then hit Edit, enable what you want, hit apply, and remember to save the config. Also, you can go right to Security -> TCP/UDP services to enable:
Best,
David
Please remember to rate helpful posts and identify correct answers.

Similar Messages

  • Configure vlan with SG 300-10P and SA 520

    Hi All,
    Forgive my ignorance but i need some help for basic configuration.
    I bought for a little office  a SA520 Security appliance (for future VPN with another distant office) and a SG 300-10P switch for connect 3 PC and 3 IP PHONE. THe SA 520 is the router. I must configure 2 VLANs on the switch :
    VLAN2 : DATA (for PC)
    VLAN3 : VOICE (for IP PHONE)
    VLAN1 : DEFAULT.
    How can i simply configure all ports ?
    I would like to configure ports 1-4 on VLAN2 and ports 5-8 on VLAN3 and port G10 is reserved for the router SA520.
    I want to divise network DATA/VOICE.
    I think i must create a trunk on G10 for SA520 ...
    Does anyone can help me?

    Hi Julien,
    Ok sounds like you are using the default vlan for management on the network  and vlan 2 for data  and vlan3 for voice.
    I am using a simulator for this, my SA520 is loaned out at the moment.
    Step 1   On the SA520  add vlan 2 and vlan 3  and label them data and voice respectively. 
    Step 2. Lets use switch port 4 on the SA520 as a trunked port to the SG-300.
                (my intention is to use untagged vlan1, tagged vlan 2 and tagged vlan 3 on  the uplink from the switch and the SA500.)
              To do this I have to tell the SA520 that switch port 4 will be in trunking mode and not access mode.
    You will have to tick off the membership of vlan 2 and vlan 3 on switch port 4.
    Step 3.  Now add some IP addresses for VLAN2 and VLAN3
    Step 4.  Create some DHCP scopes if that is what is needed on the SA520
    So by now hopefully we have the SA520 with  IP addresses associated with VLAN1, VLAN2 and VLAN3
    We also have switch port 4 as a trunk interface
    We are propogating untagged vlan1 and tagged vlan2 and tagged  vlan3 to the SG-300 switch.
    We have to do the opposite on the SG-300 switch.
    If you are using G10 as the uplink to the SA520 you will note by default  port 10 should already be in trunk mode.
    switch port G10 should be tagged for vlan 2 and tagged for vlan3.  By default Gi10  it will be untagged for vlan1.
    Make sure you set up the rest of the switch ports appropriately. 
    regards Dave

  • SG-300 28P switches problem with VLAN Data and Voice, working all the time as Voice VLAN

    Hi Everyone,
    Thank you very much for your help in advance. I’m pulling my hair to fix the problem.
    I  just got the new SG-300 28P switches. My Bios ordered for me. I did not  know how it runs until now... not an IOS based. I really do not know  how to configure it.
    I have 2 VLAN are Data and Voice.
    -          Data VLAN ID is 2 IP 192.168.2.X/255.255.255.0
    -          Voice VLAN ID is 200 IP 192.168.22.X/255.255.255.0
    -          I created two vlans, in switch, Data and Voice.
    -          On the port number 28, it is trunk by default, so I add Data vlan ID 2 tagged.
    -          On the port number 26, it is trunk by default, so I add Voice vlan ID 200 tagged.
    -          On the port number 27, I add Data vlan ID 2 tagged for Data vlan out.
    -          Port settings No.1
    I set it up as Trunk with Data vlan 2 untagged, and  200  Tagged (voice vlan). I plugged in a phone with a pc attached. But the  PC will get to the vlan 200 to get the DHCP address, but no from vlan 2.  The Phone works with correct vlan ip.
    -          Port settings No.2
    Trunk with vlan 1UP, 2T, and 200T. The phone is even worse. Would never pick up any IP from DHCP.
    -          Port settings No.3
    Access  with 200U...of course the phone will work... and the PC could not get  to its own vlan. Instead, the PC got an ip from the voice vlan. Not from  VLAN 2.
    I have Linksys phone I’m not sure if this help.
    For more information I setup in switch,
                - enable voice vlan
    - set the port on auto voice vlan
    - enable LLDP-MED globally
    - create a network policy to assign VLAN 200
    - assign this network policy to the port the phone is connected to.
    I  hope this information help to help me to setup Data and Voice vlans, to  plug the phone to work with vlan Voice 200 (IP rang 192.168.22.X), from  phone to Pc and pc work as Data vlan 2 (IP rang 192.168.2.X).

    I just got done setting up voice VLANs on an SF 300-24P and verified working.  This was working with Cisco 7900 series phones connected to a Cisco UC setup.
    Here's my sample config.
    Note that I edited this by hand before posting, so doing a flat out tftp restore probably won't work.  However, this should give you a clue.  Also, don't take this as 100% accurate or correct.  I've only been working with these things for about a week, though I've worked with the older Linksys SRW switches for a couple of years.  I'm a CCNP/CCDP.
    VLAN 199 is my management VLAN and is the native VLAN on 802.1q trunks.
    VLAN 149 is the data/computer VLAN here.
    VLAN 111 is the voice/phone VLAN here.
    VLAN 107 does nothing.
    interface range ethernet e(1-24)
    port storm-control broadcast enable
    exit
    interface ethernet e1
    port storm-control include-multicast
    exit
    interface ethernet e2
    port storm-control include-multicast
    exit
    interface ethernet e3
    port storm-control include-multicast
    exit
    interface ethernet e4
    port storm-control include-multicast
    exit
    interface ethernet e5
    port storm-control include-multicast
    exit
    interface ethernet e6
    port storm-control include-multicast
    exit
    interface ethernet e7
    port storm-control include-multicast
    exit
    interface ethernet e8
    port storm-control include-multicast
    exit
    interface ethernet e9
    port storm-control include-multicast
    exit
    interface ethernet e10
    port storm-control include-multicast
    exit
    interface ethernet e11
    port storm-control include-multicast
    exit
    interface ethernet e12
    port storm-control include-multicast
    exit
    interface ethernet e13
    port storm-control include-multicast
    exit
    interface ethernet e14
    port storm-control include-multicast
    exit
    interface ethernet e15
    port storm-control include-multicast
    exit
    interface ethernet e16
    port storm-control include-multicast
    exit
    interface ethernet e17
    port storm-control include-multicast
    exit
    interface ethernet e18
    port storm-control include-multicast
    exit
    interface ethernet e19
    port storm-control include-multicast
    exit
    interface ethernet e20
    port storm-control include-multicast
    exit
    interface ethernet e21
    port storm-control include-multicast
    exit
    interface ethernet e22
    port storm-control include-multicast
    exit
    interface ethernet e23
    port storm-control include-multicast
    exit
    interface ethernet e24
    port storm-control include-multicast
    exit
    interface range ethernet g(1-4)
    description "Uplink trunk"
    exit
    interface range ethernet g(1-4)
    switchport default-vlan tagged
    exit
    interface range ethernet e(21-24)
    switchport mode access
    exit
    vlan database
    vlan 107,111,149,199
    exit
    interface range ethernet g(1-4)
    switchport trunk allowed vlan add 107
    exit
    interface range ethernet e(21-24)
    switchport access vlan 111
    exit
    interface range ethernet g(1-4)
    switchport trunk allowed vlan add 111
    exit
    interface range ethernet e(1-20)
    switchport trunk native vlan 149
    exit
    interface range ethernet g(1-4)
    switchport trunk allowed vlan add 149
    exit
    interface range ethernet g(1-4)
    switchport trunk native vlan 199
    exit
    voice vlan aging-timeout 5
    voice vlan oui-table add 0001e3 Siemens_AG_phone________
    voice vlan oui-table add 00036b Cisco_phone_____________
    voice vlan oui-table add 00096e Avaya___________________
    voice vlan oui-table add 000fe2 H3C_Aolynk______________
    voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
    voice vlan oui-table add 00d01e Pingtel_phone___________
    voice vlan oui-table add 00e075 Polycom/Veritel_phone___
    voice vlan oui-table add 00e0bb 3Com_phone______________
    voice vlan oui-table add 108ccf MyCiscoIPPhones1
    voice vlan oui-table add 40f4ec MyCiscoIPPhones2
    voice vlan oui-table add 8cb64f MyCiscoIPPhones3
    voice vlan id 111
    voice vlan cos 6 remark
    interface ethernet e1
    voice vlan enable
    exit
    interface ethernet e1
    voice vlan cos mode all
    exit
    interface ethernet e2
    voice vlan enable
    exit
    interface ethernet e2
    voice vlan cos mode all
    exit
    interface ethernet e3
    voice vlan enable
    exit
    interface ethernet e3
    voice vlan cos mode all
    exit
    interface ethernet e4
    voice vlan enable
    exit
    interface ethernet e4
    voice vlan cos mode all
    exit
    interface ethernet e5
    voice vlan enable
    exit
    interface ethernet e5
    voice vlan cos mode all
    exit
    interface ethernet e6
    voice vlan enable
    exit
    interface ethernet e6
    voice vlan cos mode all
    exit
    interface ethernet e7
    voice vlan enable
    exit
    interface ethernet e7
    voice vlan cos mode all
    exit
    interface ethernet e8
    voice vlan enable
    exit
    interface ethernet e8
    voice vlan cos mode all
    exit
    interface ethernet e9
    voice vlan enable
    exit
    interface ethernet e9
    voice vlan cos mode all
    exit
    interface ethernet e10
    voice vlan enable
    exit
    interface ethernet e10
    voice vlan cos mode all
    exit
    interface ethernet e11
    voice vlan enable
    exit
    interface ethernet e11
    voice vlan cos mode all
    exit
    interface ethernet e12
    voice vlan enable
    exit
    interface ethernet e12
    voice vlan cos mode all
    exit
    interface ethernet e13
    voice vlan enable
    exit
    interface ethernet e13
    voice vlan cos mode all
    exit
    interface ethernet e14
    voice vlan enable
    exit
    interface ethernet e14
    voice vlan cos mode all
    exit
    interface ethernet e15
    voice vlan enable
    exit
    interface ethernet e15
    voice vlan cos mode all
    exit
    interface ethernet e16
    voice vlan enable
    exit
    interface ethernet e16
    voice vlan cos mode all
    exit
    interface ethernet e17
    voice vlan enable
    exit
    interface ethernet e17
    voice vlan cos mode all
    exit
    interface ethernet e18
    voice vlan enable
    exit
    interface ethernet e18
    voice vlan cos mode all
    exit
    interface ethernet e19
    voice vlan enable
    exit
    interface ethernet e19
    voice vlan cos mode all
    exit
    interface ethernet e20
    voice vlan enable
    exit
    interface ethernet e20
    voice vlan cos mode all
    exit
    interface ethernet e1
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e2
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e3
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e4
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e5
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e6
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e7
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e8
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e9
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e10
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e11
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e12
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e13
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e14
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e15
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e16
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e17
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e18
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e19
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e20
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e21
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e22
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e23
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e24
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet g1
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet g2
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet g3
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet g4
    lldp optional-tlv port-desc sys-name sys-desc sys-cap 802.3-mac-phy 802.3-lag 802.3-max-frame-size
    exit
    interface ethernet e1
    lldp med notifications topology-change enable
    exit
    interface ethernet e2
    lldp med notifications topology-change enable
    exit
    interface ethernet e3
    lldp med notifications topology-change enable
    exit
    interface ethernet e4
    lldp med notifications topology-change enable
    exit
    interface ethernet e5
    lldp med notifications topology-change enable
    exit
    interface ethernet e6
    lldp med notifications topology-change enable
    exit
    interface ethernet e7
    lldp med notifications topology-change enable
    exit
    interface ethernet e8
    lldp med notifications topology-change enable
    exit
    interface ethernet e9
    lldp med notifications topology-change enable
    exit
    interface ethernet e10
    lldp med notifications topology-change enable
    exit
    interface ethernet e11
    lldp med notifications topology-change enable
    exit
    interface ethernet e12
    lldp med notifications topology-change enable
    exit
    interface ethernet e13
    lldp med notifications topology-change enable
    exit
    interface ethernet e14
    lldp med notifications topology-change enable
    exit
    interface ethernet e15
    lldp med notifications topology-change enable
    exit
    interface ethernet e16
    lldp med notifications topology-change enable
    exit
    interface ethernet e17
    lldp med notifications topology-change enable
    exit
    interface ethernet e18
    lldp med notifications topology-change enable
    exit
    interface ethernet e19
    lldp med notifications topology-change enable
    exit
    interface ethernet e20
    lldp med notifications topology-change enable
    exit
    interface ethernet e21
    lldp med notifications topology-change enable
    exit
    interface ethernet e22
    lldp med notifications topology-change enable
    exit
    interface ethernet e1
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e2
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e3
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e4
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e5
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e6
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e7
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e8
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e9
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e10
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e11
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e12
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e13
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e14
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e15
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e16
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e17
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e18
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e19
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e20
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e21
    lldp med enable network-policy poe-pse
    exit
    interface ethernet e22
    lldp med enable network-policy poe-pse
    exit
    lldp med network-policy 1 voice vlan 111 vlan-type tagged
    interface range ethernet e(1-22)
    lldp med network-policy add 1
    exit
    interface vlan 199
    ip address 199.16.30.77 255.255.255.0
    exit
    ip default-gateway 199.16.30.3
    interface vlan 1
    no ip address dhcp
    exit
    no bonjour enable
    bonjour service enable csco-sb
    bonjour service enable http  
    bonjour service enable https 
    bonjour service enable ssh   
    bonjour service enable telnet
    hostname psw1
    line console
    exec-timeout 30
    exit
    line ssh
    exec-timeout 30
    exit
    line telnet
    exec-timeout 30
    exit
    management access-list Management1
    permit ip-source 10.22.5.5 mask 255.255.255.0
    exit
    logging 199.16.31.33 severity debugging description mysysloghost
    aaa authentication enable Console local
    aaa authentication enable SSH tacacs local
    aaa authentication enable Telnet local
    ip http authentication tacacs local
    ip https authentication tacacs local
    aaa authentication login Console local
    aaa authentication login SSH tacacs local
    aaa authentication login Telnet local
    line telnet
    login authentication Telnet
    enable authentication Telnet
    password admin
    exit
    line ssh
    login authentication SSH
    enable authentication SSH
    password admin
    exit
    line console
    login authentication Console
    enable authentication Console
    password admin
    exit
    username admin password admin level 15
    power inline usage-threshold 90
    power inline traps enable
    ip ssh server
    snmp-server location in-the-closet
    snmp-server contact [email protected]
    ip http exec-timeout 30
    ip https server
    ip https exec-timeout 30
    tacacs-server host 1.2.3.4 key spaceballz  timeout 3  priority 10
    clock timezone -7
    clock source sntp
    sntp unicast client enable
    sntp unicast client poll
    sntp server 199.16.30.1
    sntp server 199.16.30.2
    ip domain-name mydomain.com
    ip name-server  199.16.5.12 199.16.5.13
    ip telnet server

  • Inter-VLAN routing, Auto-Voice VLAN and IP Address-Helper

    Hope that somebody can help me with the setup in the screenshot. 
    Planning to use Auto-Voice VLAN and Smartports to configure VOIP
    LLDP-MED will be enabled on the switch to detect the IP phones so they will be moved to the Voice VLAN (If not the first 6 signs will be added to the OID table). The Voice VLAN ID will be 2 >> Voice VLAN will be automatically enabled once a device is recognized as a IP phone right? 
    Workstations will be connected to the Cisco switch, VLAN data will be untagged and will remain on the native VLAN.
    Smartports will be used to configure the ports (Macro's) >> Should configure the ports as trunks as assigns the correct VLANs right?
    But how do i configure the IP Helper-Address? Do i have to create the Voice VLAN on both switches and then run the command "IP Helper Address" to specify a DHCP server? From what i've been reading it's required, when using Inter-VLAN routing, to configure the VLAN interface with an IP address. But it's going to give problems when both switches are connected to eachother and both have the same VLAN configured including the same IP address assigned to their VLAN interface?
    Normal data should pass  the ASA firewall, VOIP traffic should go through the Vigor modem to a hosted VOIP provider. The best way, i assume, is to configure 2 separate scopes on the DHCP server?
    Still confused on how to set it up, hope that someone can point me in the right direction

    If you're sending voice to only the Vigor modem then there is no need for a trunk between the SF-300 and the Vigor modem. You can just set that to an untag packet for the VLAN 2 between that switch and the Vigor modem.
    On the 'edge' SF300 where the IP phone/PC is it is obviously going to interoute there and of course the phone port is tagged and PC port is untagged.
    For the IP helper, it uses UDP-RELAY and it should be enabled on the port itself and enabled on the global configuration. You may also need option 82. Also keep in mind, depending how your DHCP server works, it may need option 82 configured as well or at least a route to understand the subnets in the layer 3 environment to get traffic across the VLANS.

  • Voice VLAN Help Please

    My customer has 2 SG300-52P and 5 SG300-28P. We installed a VoIP phone system earlier this year. At the time of install we placed the phone system on the native VLAN 1. Now they want to move the phone system to a new VLAN because their class C subnet is running out of addresses. DHCP is handled by their Active Directory and their router/firewall is an Untangle Box. The SG300 switches have a basic configuration only.
    To move the phone system to a new VLAN I created VLAN 20 on every switch. I then turned Auto Voice VLAN on. I have every port on every switch set to trunk. Computers are plugged into back of phones. I then created a virtual interface on the Untangle Box for VLAN 20. The Untangle Box is also handling DHCP for the new VLAN. Active Directory is still handling DHCP for native VLAN.
    From each switch I can ping the gateway of the new VLAN. From each computer I can ping the gateway and the phone system on the new VLAN. However, the phones will not grab an address on the VLAN and when they are set to static, they cannot communicate with other devices on the VLAN.
    Any help would be highly appreciated. I am not sure what I am overlooking.

    Here is an example of part of a working switch config with Zultys phones where voice VLAN is 100 and data VLAN is 10:
    vlan database
    vlan 10,20,100 
    exit
    voice vlan id 100 
    interface fastethernet1
     description "RCP and Voice"
     switchport trunk allowed vlan add 100 
     switchport trunk native vlan 10 
    interface fastethernet2
     description "RCP and Voice"
     switchport trunk allowed vlan add 100 
     switchport trunk native vlan 10 
    In your case you need a trunk port with VLAN 20 tagged on your firewall (or an access port to a separate physical port on VLAN 20.  The default gateway served to the phone (or put there statically) should be the interface on the IP.  Then you may also want to allow inter-vlan routing for admin access or MXIE if you are using it.
    One thing to note on Zultys is by default I think the device profile disables LLDP, but on the phones it is enabled out of the box.  So the first time a phone downloads its config from the Zultys it may turn of LLDP unless you checked the box to keep it on.

  • 51 APs on voice vlan with 110 802.11 Handsets and 300 VoIP handsets?

    There are 51 APs with 110 Symbol 802.11 voip handsets, along with 400+ Mitel VoIP Handsets on one vlan..using mask 255.255.240.0 should I be asking if this is excessive multicast traffic ?
    Anyone used the IAPP with Aeronet? Any drawbacks, feedback? Should the APs/802.11 VoIP Phones be on their own vlan rather than the voice vlan?

    Jason,
    Let me answer your question with another question - RTP streams from your phones would be unicast, unless you were using applications like multicast paging or multicast MOH. Are there any of these applications present?
    For seamless roaming, you will want the APs to be located on the same VLAN and use the same SSIDs and addressing scheme across your wireless infrastructure. You could separate it from your voice VLAN for segmentation purposes, so long as DHCP services and QoS is present on your APs and distribution switches on the wireless VLAN.
    A quick estimation of the traffic involved is 7.04Mb/s if every phone was being used simultaneously with a G.711 codec. Bandwidth would generally not be an issue, but latency and jitter are your priorities. Depending on how your wireless network is laid out, you shouldn't have more then 8-12 phones associated to a single AP or jitter, latency and retransmissions will become an issue.
    Hope this helps.
    Pat

  • Voice VLAN with SRW224G4P

    Hi all,
    I have been trying to config a voice vlan into this switchs for the last 3 hours and for me this is impossible... I know how to do in a IOS switch but with this switchs is a nightmare...
    I have this topology,
    PC ---- IP phone ----- SW1 SRW224G4P -------- SWCORE SRW2024 --------- Router 2921 CME
    I have this config in my router,
    interface GigabitEthernet0/0
    no ip address
    duplex auto
    speed auto
    interface GigabitEthernet0/0.1
    description LAN
    encapsulation dot1Q 1 native
    ip address 192.168.5.95 255.255.255.0
    ip virtual-reassembly in
    interface GigabitEthernet0/0.100
    description Voice VLAN
    encapsulation dot1Q 100
    ip address 192.168.251.1 255.255.255.0
    ip virtual-reassembly in
    SW1 has created the VLAN 100 and enabled as VOICE VLAN
    The first 3 octes of the mac of my phone is inserted into Telephony OUI Table
    The Auto Voice VLAN Membership is enabled in the port where phone is attached.
    The port that is conected to SWCORE has the vlan 100 configured as tagged.
    SWCORE has created the VLAN 100 and enabled as VOICE VLAN
    The port that is conected to SW1 has the vlan 100 configured as tagged.
    The port that is conected to router CME has the vlan 100 configured as tagged.
    If I config other port into SWCORE with VLAN 100 tagged I can ping from CME to that host.
    Could be the problem a vlan propagation error?
    Somebody could help me? I am desperate...
    Thank you in advance.

    Hi David,
    Thank you for the purchase of the switch.
    .Like anything,  even riding a bike,  the switch is actually very easy to configure, if you have a little bit of practice on it.. 
    You mentioned you are using the " Telephony OUI Table" i guess you have a SF300-24P or ordering p/n SRW224G4P-K9-NA.  Please be specific with the switch models you are using. 
    Are you using the older SRW series or the refreshed SRWxxx-K9 (300 series) switch in the core?
    Firstly, make sure you are using version 1.1.0.73 of the switch firmware. Do that change now or verify that 1.1.0.73 is the active image on the switch.
    The switch has two areas for storing firmware images.  It stores the new firmware in the unused image area.  Check the administration guide for how to upgrade firmware and select new firmware for the next reboot.
    CDP is enabled on the switch when you use the new software, it was not there with older firmware, hence my insistance at upgrading firmware.
    ( Personally  i would prefer you to have a catalyst switch for your ISRG2 CME application, for tech support purposes. But this is the land of the free..)
    I found the following when I added my SG300-28P  to a VLAN aware UC500.
    The UC500  was advertising vlan100 as a voice vlan, configured that by Cisco Configuration Assistant, you might try CCP on your ISR.
    I had a IP phone plugged into switch port G7 and a uplink to my UC500 via port Gig27. 
    The following in blue is a screen copy from my 300 series switch CLI interface.
    You will note the switch automatically populated both VLAN and port information, the only command I added was "no passwords complexity enable," and some usernames,  which  removed from the screen capture below.
    the switch basically configured itself.
    ------------------ show system ------------------
    System Description:                       28-port Gigabit PoE Managed Switch
    System Up Time (days,hour:min:sec):       00,00:12:04
    System Contact:                          
    System Name:                              switch4cf17c
    System Location:                         
    System MAC Address:                       d0:d0:fd:4c:f1:7c
    System Object ID:                         1.3.6.1.4.1.9.6.1.83.28.2
    Fans Status:                              OK
    ------------------ show version ------------------
    SW version   1.1.0.73 ( date  19-Jun-2011 time  18:10:49 )
    Boot version  1.0.0.4 ( date  08-Apr-2010 time  16:37:57 )
    HW version    V01
      Gateway IP Address        Activity status       Type  
    192.168.10.1            Active                  dhcp    
        IP Address         I/F       Type       Status   
    192.168.10.17/24    vlan 1    DHCP        Valid      
    ------------------ show ipv6 interface ------------------
    IPv6 is disabled on all interfaces
    ------------------ show running-config ------------------
    interface gigabitethernet7
    storm-control broadcast level 10
    exit
    interface gigabitethernet7
    storm-control include-multicast
    exit
    interface  gi27
    spanning-tree link-type point-to-point
    exit
    vlan database
    vlan 100
    exit
    voice vlan oui-table add 0001e3 Siemens_AG_phone________
    voice vlan oui-table add 00036b Cisco_phone_____________
    voice vlan oui-table add 00096e Avaya___________________
    voice vlan oui-table add 000fe2 H3C_Aolynk______________
    voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
    voice vlan oui-table add 00d01e Pingtel_phone___________
    voice vlan oui-table add 00e075 Polycom/Veritel_phone___
    voice vlan oui-table add 00e0bb 3Com_phone______________
    hostname switch4cf17c
    no passwords complexity enable
    no snmp-server server
    interface gigabitethernet7
    macro description ip_phone_desktop
    exit
    interface gigabitethernet27
    macro description "switch | no_switch | switch"
    exit
    interface gigabitethernet7
    !next command is internal.
    macro auto smartport dynamic_type ip_phone_desktop
    switchport trunk allowed vlan add 100
    exit
    interface gigabitethernet27
    !next command is internal.
    macro auto smartport dynamic_type switch
    switchport trunk allowed vlan add 100
    exit
    switch4cf17c#sh cdp nei
    Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
                      S - Switch, H - Host, I - IGMP, r - Repeater, P - VoIP Phone
                      M - Remotely-Managed Device, C - CAST Phone Port,
                      W - Two-Port MAC Relay
      Device ID        Local      Adv  Time To Capability   Platform     Port ID
                       Interface  Ver. Live
    SEP503De50F133A      gi7      2     158      H P     CISCO IP        eth0
                                                         Phone
                                                         SPA525G2
    68bdab0fdcfd        gi27      2     169      S I     Cisco SG         gi9
                                                         300-10P
                                                                                               (PID:SRW2008P-K9)-VSD
    switch4cf17c#sh vlan
    Vlan       Name                   Ports                Type     Authorization
    1           1                gi1-28,Po1-8           Default      Required
    100         100                 gi7,gi27            permanent    Required
    Switch automatically figures which ports should be tagged into VLAN 100.
    I did not tell the switch it was connected to VLAN100. I did not add vlan100 to the VLAN database.
    So get the ISR router to advertise VLAN100 as a voice vlan.
    regards Dave

  • 802.1x, voice vlan and IP phone

    Hi, I reviewed many posts here, and I still need the clarification how 802.1x on the switch works with non-Cisco IP phone (not supporting CDP) and PC connected to the PC port. If I configure 802.1x on a switch port, along with access and voice vlan, next I configure the static voice vlan on the non-Cisco phone, will it be possible to authenticate the user on the PC and bypass authentication for IP phone? Is CDP required in such scenario - (non-Cisco IP phone doesn't support it)?
    Regards,
    Krzysztof

    You need CDP for touchless interop. CDP can of course be spoofed though, so proceed with caustion anyway.
    You need multi-domain authentication to appropriately deal with non-Cisco phones and port-based access-control. See here to get started:
    <http://www.cisco.com/en/US/products/ps7077/products_configuration_guide_chapter09186a008077a284.html#wp1231964>
    Hope this helps,

  • Cisco Layer 3, Voice, & VLAN

    I have a vSphere 5.5 install and I'm in the process of a network upgrade in preparation for a VOIP implementation.  The Switch hardware I'm using is a stack of Cisco 3850 Layer 3 switches and I've been going in circles on getting vlan traffic to work correctly.  Hopefully someone can point me in the right direction.
    I have one NIC connected to the switch (10GB fiber) that will handle all traffic for the esxi host (except for management).  VLAN ID is set to None (0) and load balancing is set to Route based on originating virtual port.
    I have 2 subnets, 10.1.0.0/16 (data & management, VLAN 1) and 10.10.1.0/24 (Voice, VLAN 10)
    On the host I have a Win 2012 R2 server that will be a VOIP PBX host.  It must be able to communicate with the IP phones (VLAN 10) and other servers (VLAN 1).
    The switches will do the intervlan routing.
    Finally my question - Can anyone give me some hints on how to set up the interface on the Cisco for the 10GB fiber connection from my host?  Actual port settings would be extremely helpful.  Anything I'm doing at the vmware end that I should be doing differently?

    In case anyone comes across this in a search, here's what I ended up with, 1st the Cisco switch:
    switchport trunk allowed vlan 1,10
    switchport mode trunk
    switchport nonegotiate
    switchport voice vlan 10
    macro description cisco-switch
    spanning-tree portfast
    spanning-tree link-type point-to-point
    The virtual switch I set to all vlan IDs and Route based on originating virtual port.

  • Video conferencing, voice, VLAN and Catalyst 2950, 3500 and 6500 switches

    We have a Cat6500 with MSFC in the COre/Distribution, mix of 2950 and 3524XL in the closets in the HQ. Every closet will be on one VLAN. There are 5 remote sites on a Frame with 768 CIR. There will be one Polycom VC station in the HQ per closet, one Polycom per remote site. Additionally, every PC everywhere will be using desktop NetMeeting for VC. CallManager and IP Phones will be everywhere. My questions are:
    1. should I put the Polycom on the same VLAN as the PC's with COS set to 4 at layer 2 and IP Precedence set to 4 at layer3? IP Phones are already on a seperate voice VLAN .
    2. Should I put Polycom on it's own VLAN and seperate from the PC VLANs? If I do it this way should I set COS and IP precedence for the PC's with NetMeeting?
    3. any sample config. for the Catalyst switches?
    Thanks!
    Chris

    Chris,
    Check out this IP telephony design guide. Hope it is of some help to you:
    http://www.cisco.com/univercd/cc/td/doc/product/voice/ip_tele/network/

  • PC Voice VLAN Access

    Hi all,
    I've just been testing using Cisco IP Phones with the Linksys SRW224P switch (which do not support CDP and automatic voice VLAN assignment). It's all pretty straightforward, however, I found I needed to enable the "PC Voice VLAN Access" setting for the IP phone to get the PC (attached to the phone) communicating on the network. With this setting disabled, the PC cannot communicate on the network, even if the correct data VLAN ID is configured in the "PC VLAN" setting on the phone. This same issue is also replicated if I disable CDP on a Cisco switch and manually configure the voice VLAN ID on the phone.
    Any ideas as to why this is the case? My understanding of the PC Voice VLAN Access setting is that it enables an attached PC to access the voice VLAN (i.e. tag frames with the voice VLAN ID and send on the voice VLAN, and receive frames on the voice VLAN). The traditional port mirroring issues associated with this setting aren't an issue nowadays, as you now have the additional "Span to PC Port" setting to control this.

    Hi Eric,
    Please make sure you are sniffing the correct interface. For example, if you have more than one interface (such as Wireless Ip address or VPN
    connection) select the one you want to sniff. Please check the following link, it shows you how to set up a sniffer capture using wireshark:
    http://wiki.wireshark.org/CaptureSetup
    Regards,
    Teresa.
    If you find this post helpful, please rate! :)

  • Voice-vlan problem in DID

    Dear sir
    i wanted to know that how can i hear voice in my voice vlan. as i m using 2801 voice gateway with PRI (only PSTN connectivity) ,and 3560 switch for voice and data vlan.
    My voice gateway IP is 192.168.1.221 and is data Vlan on port 7 as mentioned in attched file.
    similarly call manager is also on data vlan and on port 24. and my call manager ip is 192.168.1.54.
    my ip phones are in port 3 and port 4 and using static ip address no DHCP server.
    Ip phone address are 192.168.2.113 and 192.168.2.118 9 both are in voice vlan)
    My problem is when external caller calls on my DID numbers call rings and any external user can easily hear voice, but my internal user is unable to hear any voice of external caller.
    this behavior works fine without any data/voice vlan configuration.
    i am confuse this shows me a problem with vlan only.
    kindly correct me your assistance will be higly appreciated.
    thanks

    Zeeshan,
    Thanks for posting the gateway configuration. You've stated that the problem is that when a call comes in from the PSTN, the internal user is unable to hear the audio of the external caller, while the external caller can hear the internal caller.
    The reason is because the gateway does not have a route to the subnet that the internal phones are in. To fix he problem, add the following route in the gateway so that the audio of the external caller may be routed correctly to the phone subnet:
    ip route 192.168.2.0 255.255.255.0 192.168.1.1
    Test after making the change and let us know if you still have the issue.
    Hope this helps.
    Michael.

  • Window DHCP Server is not allocting IP to Voice Vlan

    Hi,
    I HAVE 3560 Switch, Over that two vlan configure Data & Voice respectively. Voice id Vlan 1 and Data Id Vlan 2.Routing is done on this switch and work as L3
    DHCP Server is member of Data Vlan which is connected to another 3560 Switch L2. DHCP Server is reachable.On that both vlan configured.
    Switch Port configure fr both Vlan ( Switchport access vlan 2 , Switchport voice vlan 1, Switchport mode access)
    WHILE Connect any pc to port DHCP server assign ip frm Data Pool while Cisco Ip phones are not getting IP. OPTION 150 is configured in DHCP.
    Over both interface IP Helper is configured and pointing to DHCP Server.
    For testing point configure DHCP service on switch with voice pool range ;at that moment Cisco IP phone got the IP fron switch DHCP.
    Now not able to understand why window dhcp server not assigning ip for Voice.
    Both Vlan are in different subnet and having / 24.
    Please guide

    Hi,
    Checked all configuration in network,apply packet tracer and found DHCP not responding on DHCP Req.
    Replace DHCP server and now working fine.   :)

  • LLDP Voice VLAN

    I'm setting up a Switchvox PBX with Digium D40 phones and Cisco SG200 switches.  The PBX doesn't do any CDP or LLDP advertizing so I do not expect the switch to automatically determine the voice VLAN ID and I need to manually set it.  How can I configure the switch manually to publis the voice VLAN via LLDP-MED?  I've been tinkering for hours and can't make it include the voice TLV in the packets.  Any able to help?
    Thanks in advance,
    Paul

    I'm using SG200's, not SG300's so that won't work for this.  I'll make a note of it though for the future.
    Circling back though, I believe your "illogical" comment was in reguard to a port providing both tagged and untagged access to the same VLAN.  I get that and am not suggesting that.  I have a internal LAN using VLAN 100 and another WiFi network using 101.  I am using VLAN ID 1 for my "default" VLAN for the management interface on the switches and WAPs as well as unused switch ports.  I have the "used" switch ports configured for untagged access to one or the other VLAN.  One switch port for on each VLAN is connected to the corrsponding interface in the router.  I have the PBX on an untagged VLAN 1 switch port.  I have added VLAN 1 tagged to switch ports for phones; the ports are also set for untagged access to VLAN 100.  I can manually configure the phones to use VLAN 1 for voice.  All this works and will be the way I deploy it unless I can figure out this LLDP.
    I had hoped for two (new for me) features:
    automatic addition of the tagged voice vlan to switch ports where phones were detected
    automatic vlan configuration on the phones
    I have yet to see a single LLDP packet from these Digium phones so I believe the first item above is a non-started.  I'm exploring the second in order to simplify the process of deploying the phones but there are only 40 of them to start with so it shouldn't be that big a deal.
    Once again, thank much for the time.
    P

  • 302-08MP Voice Vlan issue

    Hi,
    I have a 302-08Mp attached to my network, it is plugged directly into a C3560G, however when i plug a phone into this switch i get a 'configuring ip' message up on the phone. The voice vlan is set identical to the 3560 but in the logs i get an error message stating
    %CDP-W-VOICE_VLAN_MISMATCH: voice VLAN mismatch detected on interface gi1.
    Can anyone help me solve this issue?
    Thanks in advance

    Tom,
    Sorry for teh delay i needed to get someone at the remote location i could trust to reboot the unit. The voice vlan is 20 and the rest run on vlan 1
    the 302  is set as
    interface gigabitethernet1
    macro description "switch | no_switch | switch | no_switch | switch | no_switch
    | switch | no_switch | switch | no_switch | switch | no_switch"
    exit
    macro auto disabled
    macro auto processing type host enabled
    macro auto built-in parameters ip_phone_desktop $max_hosts 10 $native_vlan 1
    and runs sw version 1.1.2.0
    the 3560 is set
    interface GigabitEthernet0/3
    description Link to SW3
    power inline never
    switchport trunk encapsulation dot1q
    switchport mode trunk
    switchport voice vlan 20
    srr-queue bandwidth share 10 10 60 20
    srr-queue bandwidth shape  10  0  0  0
    queue-set 2
    mls qos trust cos
    auto qos voip trust interface GigabitEthernet0/3
    description Link to SW3
    power inline never
    switchport trunk encapsulation dot1q
    switchport mode trunk
    switchport voice vlan 20
    srr-queue bandwidth share 10 10 60 20
    srr-queue bandwidth shape  10  0  0  0
    queue-set 2
    mls qos trust cos
    auto qos voip trust
    Thanks

Maybe you are looking for