Solved

Why Cisco VOIP's link lights solid amber when connected, compared to computers blinking green?

Posted on 2008-06-18
2
1,000 Views
Last Modified: 2008-07-22
We have several Cisco VOIP's ranging from 7940's-7971's. When we connect them to our switches, which range from Cisco 2950-3750,  the phone's link lights solid amber and the computers blink green. Is there any reason as to why the VOIP phones are able to work but the ports show up as amber. Also checked out the port configuration, they are all running Fast Ethernet, 100mbps, etc. We have a flat network here where every switch is daisy chained to each other. I was wondering if they show up amber because of how slow the network is going, QOS, or something else. Has anyone else seen this issue? Thanks.
0
Comment
Question by:Majestica
  • 2
2 Comments
 
LVL 32

Accepted Solution

by:
harbor235 earned 500 total points
Comment Utility

When you first attached a device to a switch port spanning tree will take the port through all the spanning tree states to intergrate that port with a vlan. If you want to reduce the time it takes to become active you can use the port-fast feature with identifies this port as a host port not requiring the full spanning tree state transitions.

Amber means the spanning tree is evaluating the port running through the five states for vlan intergration, essentially it ensures that a loop is not being introduced into the spanning tree topology.

spanning tree five states;
blocking
listening
learning
forwarding
disabled


harbor235 ;}

0
 
LVL 32

Assisted Solution

by:harbor235
harbor235 earned 500 total points
Comment Utility

You should have your switches configured like this with minimal daisy chaining

                                           sw1
                                        /    |     \
                                   sw2    |   sw3
                                             |
                                          sw4

You should follow this architecture where possible, you do not want to many layer 2 hops in your network.

harbor235 ;}
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

How To Create Custom / Distinctive Ring Tones on Polycom Phones Purpose and Overview When creating a custom ring tone, you have simple aspirations: to make your phone cooler than everyone else's. Perhaps you need a louder ringer. Perhaps you w…
I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now