We are just in the process of rolling out Nortel IP phones but are a little confused on the VLAN apsect and Nortel aren't helping much.
Basically the IP phone needs to go into vlan 2 but the switchport is already in vlan 10 for data, how do I configure the switchport to allow both VLAN's and I assume that the Nortel phone will automatically put the PC into the non Phone VLAN and not the native VLAN 1?
I agree using a trunk but the voice vlan will be used once the phone gets the parameters from the data vlan initially (eg option 176 in avaya)
However i agree that the recent nortel phones need not require trunk configurations and option one would work. I tested it just now but i have some old phone models which do not unless trunk is configured
Thanks everyone, our Nortel phones require a trunk as I've tried it with a voice vlan and and configuring the native VLAN for data works great. I was just missing the native VLAN and how to configure it.
I have a very similar issue in trying to get Nortel IP phones to work correctly with a C3560 switch. Can you send me a quick excerpt of your IOS config for the VLAn section? You mention it works by configuring the native vlan, so i'd be curious to see how configured.
Originally we changed the native VLAN on each switch port but had to look for a different solution as Windows DHCP and XP clients wouldn't work properly with this solution, what we ended up with is below which works great.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...