09-29-2012 09:10 AM - edited 03-16-2019 01:27 PM
Here's the backstory. We are moving from a Cisco 4006 to a series of 5 stacked 2960 switches. I used the web interface on the 2960's to configure the ports for voice and data.
When I plug the 2960 G0/1 into our router, and then plug a 7960 phone into the switch, the phone configures, and I am able to make voice calls just fine.
When I plug a computer into the back of the phone (like we have set up in our offices), the computer is unable to get a IP from our DHCP server.
Did I miss something??? Why would this be happening?
There is 1 vlan on the router, vlan 274, and the voice is set to use that vlan. I'm not sure how to get the data to go through the phone to the router and beyond.
Anyone have any ideas on what I might have missed??
Solved! Go to Solution.
09-29-2012 12:04 PM
Ok, so the VLAN is fine. What is the ip address of your DHCP server? Which VLAN is your dhcp server? Is it in the same vlan as VLAN 1 or is it in VLAN 274 for the IP phones. If its in a different vlan, you will need to configure ip helper-address on the router interface responsible for routing between these vlans..
Please rate all useful posts
"'Nature is too thin a screen, the glory of the omnipresent God bursts through it everywhere"-Ralph Waldo Emerson
09-29-2012 09:19 AM
Did you verify that dhcp server has still free leases for new devices?
09-29-2012 09:36 AM
Yes, the DHCP is fine, there are more than enough free leases availble.
09-29-2012 09:20 AM
Post the config on the switch...
Did you configure the port for both voice and data vlan?
Please rate all useful posts
"'Nature is too thin a screen, the glory of the omnipresent God bursts through it everywhere"-Ralph Waldo Emerson
09-29-2012 09:28 AM
Ok, here is the config for the switch:
Current configuration : 11781 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Commerce_2960-SW1
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$gNM4$ChOKjcCJihh/SHh1AnSwT1
!
username sgrosz privilege 15 password 7 1407005B0B162B26297B21
no aaa new-model
system mtu routing 1500
ip subnet-zero
!
!
!
--More-- mls qos srr-queue output cos-map queue 1 threshold 3 5
mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 2 4
mls qos srr-queue output cos-map queue 4 threshold 2 1
mls qos srr-queue output cos-map queue 4 threshold 3 0
mls qos
!
crypto pki trustpoint TP-self-signed-128624384
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-128624384
revocation-check none
rsakeypair TP-self-signed-128624384
!
!
crypto pki certificate chain TP-self-signed-128624384
certificate self-signed 01
30820248 308201B1 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31323836 32343338 34301E17 0D393330 33303130 30303130
375A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3132 38363234
33383430 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
B64E92C7 95823927 ED8BD8FC E10789D8 666A2EB9 E9BE8845 FD44B394 268640D3
--More-- 4010DC50 233256F3 E53AAEFF 704D4475 FA1BB0FC 7E592095 25C8CCC8 ECA29655
3F999823 60F50385 4799BEF5 37CC5818 C0B9DC13 A6DAA0EE AEF9AF9F 280FBC07
749D9389 8E582015 AFA53757 B611238C 74F97688 F9781AEA 67C9CAC9 012F0189
02030100 01A37230 70300F06 03551D13 0101FF04 05300301 01FF301D 0603551D
11041630 14821243 6F6D6D65 7263655F 32393630 2D535731 2E301F06 03551D23
04183016 801474F2 FDE0BF1E 4D9B19DE 75D2015D 2E82E688 4B3E301D 0603551D
0E041604 1474F2FD E0BF1E4D 9B19DE75 D2015D2E 82E6884B 3E300D06 092A8648
86F70D01 01040500 03818100 3F8802A4 4C2F3D29 92E6DEE3 046E0751 46A01445
4ED7A556 B0CAF0BE C445F1C6 44704F46 993D0621 CB6D957C 4663B5A0 C9F85AEB
EFD78C73 71C4CBB8 DDB3B548 FC23F864 483AB747 540186DA D817B420 D4105BA2
433704C1 F94D0205 F612D15A CBA69DB2 3C4A316B F3D90256 62947275 5AE9524D
2B424B19 E081A975 FB428ACA
quit
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
--More-- !
interface FastEthernet0/1
switchport mode access
switchport voice vlan 274
switchport priority extend trust
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/2
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
--More-- mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/3
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/4
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
--More-- switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/5
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/6
switchport mode access
--More-- switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/7
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
--More-- !
interface FastEthernet0/8
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/9
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
--More-- macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/10
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/11
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
--More-- switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/12
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/13
switchport mode access
switchport voice vlan 274
--More-- switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/14
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
--More-- interface FastEthernet0/15
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/16
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
--More-- spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/17
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/18
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
--More-- switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/19
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/20
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
--More-- switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/21
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/22
--More-- switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
spanning-tree bpduguard enable
!
interface FastEthernet0/23
switchport mode access
switchport voice vlan 274
switchport port-security maximum 2
switchport port-security
switchport port-security aging time 2
switchport port-security violation restrict
switchport port-security aging type inactivity
mls qos trust cos
macro description cisco-phone
spanning-tree portfast
--More-- spanning-tree bpduguard enable
!
interface FastEthernet0/24
description Trunk to OCIO switch
switchport mode trunk
!
interface GigabitEthernet0/1
description Trunk line to router
switchport mode trunk
!
interface GigabitEthernet0/2
description Trunk to Switch #2
switchport mode trunk
!
interface Vlan1
ip address 164.165.71.47 255.255.255.0
no ip route-cache
!
ip default-gateway 164.165.71.1
ip http server
ip http authentication local
ip http secure-server
!
--More-- control-plane
!
!
line con 0
privilege level 15
line vty 0 4
privilege level 15
no login
line vty 5 15
privilege level 15
no login
!
end
Commerce_2960-SW1#exit
Commerce_2960-SW1 con0 is now available
Press RETURN to get started.
09-29-2012 09:37 AM
Hi steve,
You havent configured the data vlan on this switch ports..
you need to configure the ff:
switch port access vlan X where X is your data vlan
Please rate all useful posts
"'Nature is too thin a screen, the glory of the omnipresent God bursts through it everywhere"-Ralph Waldo Emerson
09-29-2012 09:43 AM
We only have 2 vlans on the router, vlan 1 (default) and vlan 274 (voice)
I had thought about adding a specific entry for the ports for data for vlan 1 but since its default it doens't show up in the switch config.
09-29-2012 09:47 AM
You need to create a new vlan for data. Its not good practice to use the default vlan 1
Please rate all useful posts
"'Nature is too thin a screen, the glory of the omnipresent God bursts through it everywhere"-Ralph Waldo Emerson
09-29-2012 09:57 AM
aokanlawon wrote:
You need to create a new vlan for data. Its not good practice to use the default vlan 1
On the other hand, using VLAN 1 for data doesn't prevent things from working.
09-29-2012 10:02 AM
So what might the problem be??
09-29-2012 10:05 AM
I would start removing all these restrictions and QoS.
In other words, factory config except voice vlan seeting.
Failing that, check routing, etc.
09-29-2012 10:08 AM
When you say restrictions, are you talking about the switchport port-security items??
09-29-2012 10:02 AM
Yes I agree. I just believe you should do things right and since things are not working now, it might be a good time to do it right
Please rate all useful posts
"'Nature is too thin a screen, the glory of the omnipresent God bursts through it everywhere"-Ralph Waldo Emerson
09-29-2012 10:11 AM
Which device is the dhcp server?
is it possible to show us the config for dhcp?
09-29-2012 10:12 AM
DHCP server is actually a Windows server on our network, its not being handled by the router
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide