Solved

VOIP Phone -- Daisy Chaining Fails ?

Posted on 2015-02-24
3
483 Views
Last Modified: 2015-03-10
Any ideas on how to fix below "Test #1" ?
----------------------------------------------
Details
  ** phone and computer both get
     assigned 192.168.28.x IPs
  ** using my Cisco Catalyst 2550
     managed switch works fine for all
     3 of the below tests for 10+ days
  ** using my Cisco Catalyst 3560G
     managed switch makes below
     "Test #1" fail, even when it looks
     like PORT is programmed for "AUTO"
     everything and not on a weird VLAN
  ** factory resetting the phone, using
     a different phone, using external
     power supply, changing computer and
     phone to a static IP, etc do nothing
     to solve the issue
----------------------------------------------
Test #1 = phone works, computer fails
 1. from Cisco switch port
 2. to Yealink DHCP-based IP phone
 3. to Desktop DHCP-based IP computer
----------------------------------------------
Test #2 = phone works
 1. from Cisco switch port
 2. to Yealink DHCP-based IP phone
----------------------------------------------
Test #3 = computer works
 1. from Cisco switch port
 2. to Desktop DHCP-based IP computer
0
Comment
Question by:finance_teacher
  • 2
3 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
Comment Utility
Which Yealink phone type is it exactly? Check PC port config of the phone. Have either VLAN functions off, or if you see anything about port mode, set it to Bridge
0
 

Author Comment

by:finance_teacher
Comment Utility
Yealink T28P, already set to Bridge mode, phone works fine with COMPUTER if I plug it into Cisco Catalyst 2550, but only works as STAND-ALONE when plugged into Cisco Catalyst 3560G, both Cisco's seem to have NO weird VLAN settings.

Any ideas like "Cisco Catalyst 3560G" has something build-in for security that says "Allow Daisy Chain = NO" ?
0
 
LVL 35

Assisted Solution

by:Kimputer
Kimputer earned 500 total points
Comment Utility
Oh I see now you have 2 Cisco switches of which only one works as expected. I missed that point. There should be no built-in security like this behavior as far as I know. But having more experienced Cisco experts look at this is better. Therefore I suggest you change the subject or tags to include Cisco.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Hey there Heard about jingle, the add on for XMPP that enables point to point audio between two XMPP clients. No server config necessary. Actually quite a cool feature. However, how good is it if you can not use those voice capabilities to do a P…
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now