Solved

Voip commands verification

Posted on 2014-01-13
3
275 Views
Last Modified: 2014-01-19
Hi Experts,

I have a 6500 switch with PPOE ports and one of the cisco phones of one of the big bosses went down and the line is dead. These phones have a dedicated port, I run commands to check for errdisable and run the sh log but I have like around 100 cisco phones so it is not easy to find the port.
Is there any command to strictly find the phones that went down? so I can find the port that is connected to.

Please advise
0
Comment
Question by:chenzovicc
  • 2
3 Comments
 
LVL 22

Accepted Solution

by:
eeRoot earned 500 total points
ID: 39779985
get the mac address of the phone and then use the sh chp neighbor command to find it.  Or use the sh mav addr command if cdp is disabled
0
 
LVL 22

Expert Comment

by:eeRoot
ID: 39780001
* that should say "sh mac addr"
0
 

Author Closing Comment

by:chenzovicc
ID: 39793193
Thanks
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In my office we had 10 Cisco 7940G IP phones that were useless as they were showing PROTOCOL APPLICATION INVALID when started. I searched through Google and worked for a week continuously on those phones, and finally got them working. This is a di…
I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question