?
Solved

Adtran-Trunking and Voice Signalling

Posted on 2011-03-04
2
Medium Priority
?
761 Views
Last Modified: 2012-10-18

I was wondering if I have a port in trunk mode and I add voice and voice signalling to that port. If the switch will handle it like it does on a non-trunk port or if it ignores it since it is in trunk port mode.

interface gigabit-switchport 0/4
  spanning-tree edgeport
  no shutdown
  switchport mode trunk
  switchport voice vlan 200
  switchport voice-signaling vlan 200
!
0
Comment
Question by:XFERCOM
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Expert Comment

by:Matthew Sabin
ID: 36910979
At the switch level, voice is just data.

The switch will accept tagged and untagged traffic and pass it along (as trunk ports do) assuming you're not specifically controlling traffic via ACL.

--Matthew
0
 
LVL 22

Accepted Solution

by:
Reid Palmeira earned 2000 total points
ID: 38370665
There's some additional detail here https://supportforums.adtran.com/message/1865#1865

The difference using the voice VLAN command sort of depends on what tagged traffic you have passing through. If the phone is setup to tag traffic and recognizes LLDP it would allow that through.

In your case there's no access vlan command so untagged traffic doesn't get tagged at the switchport
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Is your computer hacked? learn how to detect and delete malware in your PC
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question