Solved

Using a Polycom SIP Phone on Cisco UCM 7 cluster?

Posted on 2013-01-25
2
569 Views
Last Modified: 2013-01-25
I have Cisco 7945G phones on a UCM 7.  They use SCCP for control.  I have a few Polycom IP650 phones.  What would I need to configure to be able to use one of them on the cluster?  Or is it feasible at all?  

Thanks.
0
Comment
Question by:amigan_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 20

Accepted Solution

by:
José Méndez earned 500 total points
ID: 38820433
Yes it is. UCM sees them as third party sip phones. Here is a guide about it:

https://supportforums.cisco.com/docs/DOC-13174

Hope that helps, if not let me know.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 38820542
Great - looking forward to trying this out!
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The point of this post is to give you a copy/paste installation solution to setting up Asterisk 1.6 on Ubuntu 9.04 (or similar) server. # Setup the system apt-get install subversion apt-get install make apt-get install linux-source kernel-p…
So you think no one can listen in on your VOIP conversations, eh? Well... if you haven't setup Secure Real Time Transport (SRTP), your voice communications can be hacked into by just about anyone! First, let's talk about the intended audience for…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question