I am investigating a private vlan solution to accomplish an end goal of host isolation. In the end I'd like to see my endpoints not able to communicate with each other for additional privacy/security.
While experimenting with this I ran into the "switchport protected" option on a per-port basis. It appears to work fine for most of my use cases, except that when another device on the same switch/vlan attempts to call the other over Cisco Jabber the audio is not heard on either side. I also cannot send screen shares or share my video over Jabber. While the use case may be minimal (two users trying to call each other on the same switch stack, which is likely the same floor of the building), I need to ensure that all current uses transfer over during the final change window.
My question is this: Does Cisco Jabber use the data vlan for all traffic, or is there a way to have it tag its traffic outbound as the voice vlan?
I'm investigating an alternative solution here to have the data vlan be an isolated pvlan and the voice vlan be a community pvlan, allowing inter-floor voice vlan traffic to establish as normal. This of course relies on the idea that Cisco Jabber uses the voice vlan, or there is some way to separate out those traffic flows to permit them.
Purpose of the document
This document describes the general recommendations or best practices when designing and deploying the Cisco SD-Access technology. The document assumes that the reader has a general overview of Cisco's SD-Access for Distributed C...
Dear All, When I use the show interface command on the Cisco Router ISR-4331, it will display as below information. The word that I mark red, it refresh every 5 seconds. But, I compare with the old router model like a Cisco 29XX or 28X...
Whether you're attending VMworld 2019 on-site or from afar, read the latest on the key themes to expect. They are also the key themes for IT management today, from software defined everything to cloud and automation to IoT and edgecomputing : http:...