Solved

Cisco Smart Port Roles and non cisco devices

Posted on 2009-05-09
5
2,291 Views
Last Modified: 2012-05-06
I have a question regarding applying smart port roles and connecting non cisco equipment to it.  What exactly does the smart port roles do? And I am plugging in a non cisco switch/access point should i set the role up accordingly?  Also If i have a internet webcam what role should i use for that?

Sorry for the newbie question i just dont want to set it up wrong and get port error disabled or get lower performance.
0
Comment
Question by:v46n
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 50

Accepted Solution

by:
Don Johnston earned 500 total points
ID: 24344703
Smartport is simply a macro that applies common configuration parameters to an interface for a particular function.

For example, there is a smartport macro for desktop devices, phones and switches and routers. The "switch marco turns on trunking and sets the spanning-tree link type to point-to-point among other things.

A webcam would fall under the "desktop" category.


0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 24344707
0
 
LVL 2

Author Comment

by:v46n
ID: 24344737
perfect thats exactly what i was looking for.
One last thing. i have a fibre media convert to a switch that connects to another switch, is the media converts transparent? Should i apply the role as a switch?
0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 24344954
Yes. The converter is transparent.
0
 
LVL 2

Author Comment

by:v46n
ID: 24345046
Ok. Same as a point to point wireless bridge to I assume?
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question