Hi, I always use the first configuration mode. I think with the first one you are only able to handle 2 vlans (voice and data) and it can be configured as a secure port.
The second one (as a trunk) allows you to handle multiple vlans and the port cannot be configured as a secure port, also if the vlan access are no limited, the PC could have access to all vlans on the switch.
The primary concern with any trunk interface is broadcast supression. For example, VLANs enable you to segment you network, however if you don't prune or clear vlans of trunk ports, then those ports will listen to broadcasts.
Switchports configured as trunks ports for IP PHones are no exception, therefore it is best practice to configure these ports as per the first example.
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...