RE: Native vlan - port security

From: Joseph Brunner (joe@affirmedsystems.com)
Date: Sun Jul 27 2008 - 08:42:20 ART


>Now IP packets from the pc will reach the configured native vlan right ....
Yes.

>while the voip pakets will remain in the ports vlan.

I think you mean the "voice vlan"? Depends on which of the commands you used
to configure the port.

Switchport voice vlan XXX = Carry Voice Traffic in 802.1Q Frames; carried to
the phone via cdp.

Switchport voice vlan dot1p = Carry Voice Traffic in 802.1P Priority-Tagged
Frames, using the default native vlan (0)

Switchport voice vlan none = Allow the IP phone to use its own configuration
to send untagged voice traffic.

Switchport voice vlan untagged = Configure the phone to send untagged voice
traffic. (So here the phone and pc would be using the same vlan to send
data)

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Vibeesh S
Sent: Sunday, July 27, 2008 7:15 AM
To: ccielab@groupstudy.com
Subject: Native vlan - port security

Hi Group,

I have a doubt with regard to the port security when we configure native
vlan.

Switch ------------ IPphone ------- Pc
           TRUNK

If I configure a port on my switch as an Trunk port that goes to an
employees desk which connects an IP phone to which a Pc is connected.
Now IP packets from the pc will reach the configured native vlan right ....
while the voip pakets will remain in the ports vlan.
In case an employee plugs in a switch in that port, in "dynamic auto" mode
will he have all access just like the other switches. If not how do we
secure it.

I just want to know what will happen as I have not deployed such scenarios.

Thanks,
Vibs



This archive was generated by hypermail 2.1.4 : Mon Aug 04 2008 - 06:11:57 ART