i know this is quite possible but i am unsure if the switches i will be using can do this alone.
ive got IP endpoints that will be piggy backed to PC's at the desks. they will both be on seperate VLAN's. i am curious if they can pull addresses from two different DHCP scopes.
i can code the VLAN tag into the phone and am wondering if that will be sufficient to pull the address from the second scope, and if the PC's without the tag will pull from the first. thanks in advance.
er, i'm sorry it's too early to think. the phones aren't cisco end points, they're inter-tel's. but they support almost every VLAN feature an end point can, so i don't think that'll be an issue.. once again i'll test it out soon and use the good advice given. ;)
Your switch should support two vlans per interface onc being a data VLAN and the other tagged as VOICE VLAN#. We have done this in quite a few places. The one thing I can't help out with is the non-Cisco phone site. Like the other poster stated Cisco Switches do support this.
Hello, if the phone supports that you choose an VLAN for the phone and another VLAN for the PC switchport on the IPT, it should logical make that PC-port an untagged port and then the phone itself would tag the packet with the VLAN tag of our choice. And then you have a trunk connecting the phone to the swtich. Then you are back to assigning the DHCP scope on the switch or using an IP-helper on the router to point at an microsoft/other brand server.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...