我遵循这里列出的指示-> https://community.polycom.com/t5/VoIP-SIP-Phones/FAQ-Utilizing-VLAN-s-with-Polycom-phones/td-p/38100。但却短了下来。
所以我有计算机(VLAN 1),这些补丁进入Polycom手机的底部,我希望将它们分离到VLAN 11中。
我在思科SG300-28PP交换机上禁用了CDP和LLDP。我定义了VLAN 11,并将它添加到思科SG300-28PP交换机的所有接口中。我还在Polycom上禁用了这两个协议。我在Polycom上启用了选项128的固定发现。我为VLAN=11添加了选项128;在DHCP服务器上(在本例中是一个Windows2012 R2框)。虽然这些计算机通过VLAN 1很好地联网,但作为VLAN 11网络的一部分,这些电话不会获取DHCP地址。
这两个网络来自Cisco so 300-28 to,变成Cisco ASA 5505,一个接口用于VLAN 1,另一个接口用于VLAN 11。我在Cisco ASA 5505上设置了DHCP中继,以便VLAN 11 (10.4.4.0/24)的请求被转发到VLAN 1上的10.0.4.5 (10.0.4.0/24)。
下面是开关配置。还有ASA配置中的一个片段,以及定义的DHCP作用域的屏幕截图。知道我可能错过了什么吗?
开关:
config-file-header
switchae111f
v1.3.5.58 / R750_NIK_1_35_647_358
CLI v1.0
set system mode switch
file SSD indicator plaintext
@
no cdp run
vlan database
vlan 11
exit
voice vlan id 11
voice vlan state disabled
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
no lldp run
hostname switchae111f
management access-list All
permit
exit
management access-list SSH
permit service ssh
exit
management access-class All
username cisco password encrypted ------ privilege 15
ip ssh server
ip ssh password-auth
ip ssh-client server authentication
clock timezone " " -5
clock summer-time web recurring usa
clock source sntp
clock source browser
sntp unicast client enable
sntp unicast client poll
sntp server 10.0.4.5
clock dhcp timezone
!
interface vlan 11
name voip
!
interface gigabitethernet1
switchport trunk allowed vlan add 11
!
interface gigabitethernet2
switchport trunk allowed vlan add 11
!
interface gigabitethernet3
switchport trunk allowed vlan add 11
!
interface gigabitethernet4
switchport trunk allowed vlan add 11
!
interface gigabitethernet5
switchport trunk allowed vlan add 11
!
interface gigabitethernet6
switchport trunk allowed vlan add 11
!
interface gigabitethernet7
switchport trunk allowed vlan add 11
!
interface gigabitethernet8
switchport trunk allowed vlan add 11
!
interface gigabitethernet9
switchport trunk allowed vlan add 11
!
interface gigabitethernet10
switchport trunk allowed vlan add 11
!
interface gigabitethernet11
switchport trunk allowed vlan add 11
!
interface gigabitethernet12
switchport trunk allowed vlan add 11
!
interface gigabitethernet13
switchport trunk allowed vlan add 11
!
interface gigabitethernet14
switchport trunk allowed vlan add 11
!
interface gigabitethernet15
switchport trunk allowed vlan add 11
!
interface gigabitethernet16
switchport trunk allowed vlan add 11
!
interface gigabitethernet17
switchport trunk allowed vlan add 11
!
interface gigabitethernet18
switchport trunk allowed vlan add 11
!
interface gigabitethernet19
switchport trunk allowed vlan add 11
!
interface gigabitethernet20
switchport trunk allowed vlan add 11
!
interface gigabitethernet21
switchport trunk allowed vlan add 11
!
interface gigabitethernet22
switchport trunk allowed vlan add 11
!
interface gigabitethernet23
switchport trunk allowed vlan add 11
!
interface gigabitethernet24
switchport trunk allowed vlan add 11
!
interface gigabitethernet25
switchport trunk allowed vlan add 11
!
interface gigabitethernet26
switchport trunk allowed vlan add 11
!
interface gigabitethernet27
switchport trunk allowed vlan add 11
!
interface gigabitethernet28
switchport trunk allowed vlan add 11
!
exit
no macro auto processing cdp
no macro auto processing lldp
ip ssh-client key rsa key-pairASA:
names
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 12
!
interface Ethernet0/3
switchport access vlan 11
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
ip address 10.0.4.1 255.255.255.0
!
interface Vlan2
description time-warner-bc-static
nameif outside
security-level 0
ip address 74.143.200.234 255.255.255.248
!
interface Vlan11
nameif voip
security-level 100
ip address 10.4.4.1 255.255.255.0
!
interface Vlan12
description Cisco RV110W VPN Firewall
nameif wireless
security-level 99
ip address 192.168.100.1 255.255.255.0
!
same-security-traffic permit inter-interface
!
dhcprelay server 10.0.4.5 inside
dhcprelay enable wireless
dhcprelay enable voip
dhcprelay timeout 60发布于 2019-07-30 14:15:09
电话寻找一个自定义选项(128)在DHCP提供消息,以了解他们应该使用哪个VLAN。必须在本机(无标记) VLAN的DHCP作用域上配置此选项。
电话启动过程是:
https://serverfault.com/questions/977181
复制相似问题