Solved

Voip switchport security regarding port-security

Posted on 2008-06-18
4
1,120 Views
Last Modified: 2010-05-18
We are getting ready to roll out VoIP using all Cisco equipment. Some office only have 1 data run. We currently use Port-Security to prevent unauthorized devices. Since we will have seperate voice and data vlans, we would have to trunk on that port. Port security is not applicable for trunk ports. We are not ready to roll out 802.1x port authentication. are there any options on the phones to restrict what PCs can be plugged into it's switchports?

Thanks!
0
Comment
Question by:applesmash
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 22

Expert Comment

by:Reid Palmeira
ID: 21819684
depends on the phones and firmware you're running on them. The vast majority will not though. the 802.1x authentication is your best bet. what equipment are you using? switches and phones.
0
 
LVL 1

Author Comment

by:applesmash
ID: 21820505
3750 PoE and 7940s, nothing fancy on the phones.

I did find this on cisco's site and it mentions port security over trunk ports. Didn't know I could do that...

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/25sg/configuration/guide/port_sec.pdf

I realize that doc is for a 4500. It should work for 3750s with latest IOS also?
0
 
LVL 22

Accepted Solution

by:
Reid Palmeira earned 350 total points
ID: 21827119
you should be okay with the 3750 switches. don't worry about the phones controlling it at that point, do it on the switch. Setup the trunk port, voice vlan, etc. then the port security and violation setup.

see: http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_35_se/configuration/guide/swtrafc.html

0
 
LVL 1

Author Closing Comment

by:applesmash
ID: 31468425
That about covers it. Thanks for your help!
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

736 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question