Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1421
  • Last Modified:

Separate Voice and Data Subnets on Single LAN

I have a client with a Trixbox (free) PBX running all their phones on the same LAN as their data. They have a Sonicwall NSA 240 at the gateway. The PBX is connected to the outside world via PCI card connected to a PRI; voice traffic, therefore, traverse the LAN (for our purposes, 192.168.1.0/24) and goes out the PRI without ever really running through the Sonicwall (other than for routing purposes). Their current switching configuration is Layer 2 but their switches are capable of Layer 3 (VLAN, etc....) switching (to be clear, I'm no expert on VLAN configuration).

The client wants to set up a subnet (192.168.2.0/24) such that the voice traffic is on this subnet and the data continues to ride on 192.168.1.0/24. Their proposal was to set up an interface on the Sonicwall to be configured with the gateway address of this subnet (e.g., X0>192.168.1.1, X3>192.168.2.1) and set static routes in the Sonicwall such that the phones would communicate with the PBX (192.168.2.2) but not with any of the data devices, including getting their DHCP IP address and config from the PBX.

My intial reaction is that this can't be done, but again, I'm not an expert on advanced networking concepts and am unsure if there is something that can be done to make this happen. That said, having a gateway interface on the Sonicwall (or any router/firewall) doesn't seem to make sense to me as the Sonicwall is not actually acting as the gateway (voice traffic goes out the PBX via PRI). I think it would be possible to static each phone and point it to the PBX manually and have it communicate with the PBX in this way but that's a bunch of work and really accomplishes very little of value.

I think the best option is to configure a VLAN on their switches and have all voice traffic on this VLAN. I need to have more information, however, in order to go back to the client and convince them that what they are trying to do is not feasible. Any insight anyone here can provide would be greatly appreciated!
0
wjb313
Asked:
wjb313
3 Solutions
 
bitsmakebytzesrunCommented:
you will want to setup two separate VLANs, one for the data and one for the voice networks (assuming workstations are not connected to the VoIP phones).  One port on each VLAN could then be connected to the sonicwall and addressed/rules/NATing setup.  The sonicwall will only need a default route out to their ISP, all locally connected networks should be routable.  this way they VoIP net can get outside data access if need (updates,etc) but are seperate from the workstations.  Soudns like all calls should go out the PRI interface of the PBX.  If the phones/PBX don't need data access, just put them on a separate VLAN and don't even connect the sonicwall to this vlan.
0
 
shbasmCommented:
ok  set two vlans one for voice one for data in switches
if you dont use telephony service provider (dont forward calls to internet ) and you dont like
route between voice vlan and data vlan then you dont need to connect to Sonicwall
for more details post your switches and ip phones types
0
 
pridemarketingCommented:
what they are asking to do can be done i do the same thing with a Cisco ASA. Just make sure the post on the Sonic is a gig port or this will be your bottle neck.

but i would have to agree a VLAN is the best option let your switch send the traffic and also make sure you have QOS setup for the phones.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now