From: Joseph Brunner (joe@affirmedsystems.com)
Date: Sun Jul 27 2008 - 08:42:20 ART
>Now IP packets from the pc will reach the configured native vlan right ....
Yes.
>while the voip pakets will remain in the ports vlan.
I think you mean the "voice vlan"? Depends on which of the commands you used
to configure the port.
Switchport voice vlan XXX = Carry Voice Traffic in 802.1Q Frames; carried to
the phone via cdp.
Switchport voice vlan dot1p = Carry Voice Traffic in 802.1P Priority-Tagged
Frames, using the default native vlan (0)
Switchport voice vlan none = Allow the IP phone to use its own configuration
to send untagged voice traffic.
Switchport voice vlan untagged = Configure the phone to send untagged voice
traffic. (So here the phone and pc would be using the same vlan to send
data)
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Vibeesh S
Sent: Sunday, July 27, 2008 7:15 AM
To: ccielab@groupstudy.com
Subject: Native vlan - port security
Hi Group,
I have a doubt with regard to the port security when we configure native
vlan.
Switch ------------ IPphone ------- Pc
TRUNK
If I configure a port on my switch as an Trunk port that goes to an
employees desk which connects an IP phone to which a Pc is connected.
Now IP packets from the pc will reach the configured native vlan right ....
while the voip pakets will remain in the ports vlan.
In case an employee plugs in a switch in that port, in "dynamic auto" mode
will he have all access just like the other switches. If not how do we
secure it.
I just want to know what will happen as I have not deployed such scenarios.
Thanks,
Vibs
This archive was generated by hypermail 2.1.4 : Mon Aug 04 2008 - 06:11:57 ART