Solved

separate phone and data network on same Cisco 2960x switches

Posted on 2014-12-18
4
264 Views
Last Modified: 2016-11-23
Hi,

I have a Mitel VOIP phone system and would like to take advantage of the extra network port on the phones by plugging the computers into the phones, and the phones into the wall ports.  This will free up ports in our switch stack (2960x for access layer, 3750 for the core and routing) for more devices.  Currently, our phones are on a separate Dell switch that we would like to retire.  So, how can I best build this?  The 2960x switches are in a stack and uplink to a 3750 for vlan routing.  Do I need to create the new phone VLAN in both the 2960x and the 3750 switches, or can I just leave everything on VLAN1 (data vlan) on the 2960x stack, trunk the port to the 3750, and ip both the VLAN1 (data) and VLAN2 (phones) on the 3750, and configure QoS on the 2960x stack.  Does that make sense?  Thanks!

Mark
0
Comment
Question by:cansib
  • 2
  • 2
4 Comments
 
LVL 13

Accepted Solution

by:
Norm Dickinson earned 500 total points
ID: 40509149
0
 

Author Comment

by:cansib
ID: 40509716
Please see the attachment and this is currently how I have all of the phone ports configured.  Please advise.  Do I need to do something else?  Again, these are non-cisco IP phones, so I know there are features that you can't take advantage of that you could with Cisco IP phones.  Thanks!

markData and Phone network diagram
0
 
LVL 13

Expert Comment

by:Norm Dickinson
ID: 40510212
Yes, that appears to be the basic setup you will need.
0
 

Author Closing Comment

by:cansib
ID: 40515320
I changed it up a little bit based on the articles and it's performing very well.  Thank you!

Mark
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question