?
Solved

Voip switchport security regarding port-security

Posted on 2008-06-18
4
Medium Priority
?
1,143 Views
Last Modified: 2010-05-18
We are getting ready to roll out VoIP using all Cisco equipment. Some office only have 1 data run. We currently use Port-Security to prevent unauthorized devices. Since we will have seperate voice and data vlans, we would have to trunk on that port. Port security is not applicable for trunk ports. We are not ready to roll out 802.1x port authentication. are there any options on the phones to restrict what PCs can be plugged into it's switchports?

Thanks!
0
Comment
Question by:applesmash
  • 2
  • 2
4 Comments
 
LVL 22

Expert Comment

by:Reid Palmeira
ID: 21819684
depends on the phones and firmware you're running on them. The vast majority will not though. the 802.1x authentication is your best bet. what equipment are you using? switches and phones.
0
 
LVL 1

Author Comment

by:applesmash
ID: 21820505
3750 PoE and 7940s, nothing fancy on the phones.

I did find this on cisco's site and it mentions port security over trunk ports. Didn't know I could do that...

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/25sg/configuration/guide/port_sec.pdf

I realize that doc is for a 4500. It should work for 3750s with latest IOS also?
0
 
LVL 22

Accepted Solution

by:
Reid Palmeira earned 1400 total points
ID: 21827119
you should be okay with the 3750 switches. don't worry about the phones controlling it at that point, do it on the switch. Setup the trunk port, voice vlan, etc. then the port security and violation setup.

see: http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_35_se/configuration/guide/swtrafc.html

0
 
LVL 1

Author Closing Comment

by:applesmash
ID: 31468425
That about covers it. Thanks for your help!
0

Featured Post

Enhanced Intelligibility Without Cable Clutter

Challenge: The ESA office in Brussels wanted a reliable audio conference system for video conferences. Their requirement - No participant must be left out from the conference and the audio quality must not be compromised.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

755 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question