We got a really strange problem here. We've got one cisco ESW 520 switch and one HP. Whoever's connected on the ESW switch cannot connect to pop.gmail.com port 995. Everything else is OK! Internet, pings, whatever. ONLY cannot access pop.gmail.com port 995. Even gmail.com comes up fine. When we move the computers to the HP switch pop.gmail.com comes up fine.
We've looked and looked and cannot find any solution. We're thinking this is a new issue, because one of our friends who works at another company is experiencing the same issue. Anyone connected to their ESW switch cannot access pop.gmail.com:995.
I just wanted to say, this was an issue I had been having with Gmail IMAP and SMTP going through ports on this switch to a UC520 thanks for posting this resolution! I couldn't freagin understand how every other computer in the office was working through another switch to the UC but these handfull going through this ESW were incimunnicado only on 993 and 587 over TLS. I was scouring the place looking for any similarities to my system...
Now if I can just get the damn SG200-08P to talk tot he network I'll be in good shape... but thats for anothr thread
Does it cause any problems to voice calls, I had the same problem and I followed the same procedure. The policy map was voice-map earlier and I have deleted now. I have cisco ip phones connected to switch and computers to the switch port of IP phones. Does changing policy bindinng affect voice phone calls?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...