Solved

I need to setup a VLAN and route the traffic across my P2P T1 for voice traffic

Posted on 2007-11-20
3
362 Views
Last Modified: 2008-02-01
I have two locations connected by a P2P T1 with two Cisco 1841 routers.  My telco company has informed me that I need to create a VLAN for them to send voice accross the P2P between the locations.  How to go about creating the VLANs on the routers, and how to I bridge them across the WAN connection?
0
Comment
Question by:TimDunlap
  • 2
3 Comments
 
LVL 12

Expert Comment

by:bhnmi
Comment Utility
Your VLAN cannot traverse the p2p. You need to traffic shape the p2p connection to give you VoIP traffic Priority. To have connectivity on the p2p you need to configure the serial connections on each router.

Router a

interface Serial0/0
 description Point to Point T1
 ip address 10.0.0.1 255.255.255.252
 encapsulation ppp
 no cdp enable

Router b

interface Serial0/0
 description Point to Point T1
 ip address 10.0.0.2 255.255.255.252
 encapsulation ppp
 no cdp enable

Also may need to configure your line encoding on the controller


controller T1 0/1
 framing esf
 clock source internal
 linecode b8zs
 channel-group 0 timeslots 1-24

Need to set the clock source to internal also.
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 500 total points
Comment Utility
Something is not quite right here. VLAN's are a LAN feature (Virtual LAN). You can't have a VLAN on a T-1 line.

I'd ask for some clarification.
0
 
LVL 12

Expert Comment

by:bhnmi
Comment Utility
I told him above that he cannot have a  VLAN traverse the p2p.
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now