shodown wrote: » This sounds like one of those networks where they want the data and voice separate. I usually will build them completely separated where they provide there own cabling for the PC's.
535irob wrote: » Why on earth would you run 2 network cables to a single desk? The Vlan's keep them separate.. OP - the location of the DHCP doesn't really matter as long as option 150 is given out from the VOICE Vlan DHCP server pointing to the correct and working tftp server. On your switch, make sure cdp is up and running: sh cdp nei and the ports should look something like this: Interface FastEthernet 0/1 Description Phones and Computers Switchport mode access vlan DATA Switchport mode access Switchport Voice vlan VOICE Auto qos voip cisco-phone spanning-tree portfast If your setup is working correctly phones should register with no issues. If the register and people are still having problems plugging in and getting online, a possible few issues come to mind. First was the new DHCP server given a static IP address on the correct DATA vlan? ( assuming that the port the server is plugged into is programmed as above ). Second Can the new DHCP server see the gateway of your network? Can it ping other network servers/computers. Also when a user plugs directly into the wall what IP range are they given?
Agent6376 wrote: » Hello all, I've been having issues lately on some of the UC500 deployments I've done. It it bad practice to leave DHCP on the UC500 for the Voice Vlan, while letting another server take care of the Data Vlan? I ask because during a recent installation, I had DHCP for both subnets on the UC500, and I tested connectivity behind the Cisco phones without issues. However, I took the DHCP config off the UC for the data Vlan and let the sysadmin handle it via a Windows machine, and now I'm getting reports that no one can connect to the network if they are connected behind their phone, but if they bypass the phone and plug straight into the wall - they are able to access the network and internet without issues. In the past I've had this happen, but I simply disabled DHCP on the server and let the UC500 take care of it, but I don't have that option in this scenario. I'll verify when I'm on site that it's not just an issue with the switch being misconfigured, but I'm fairly certain that isn't the case. I'm anticipating that I'll configure a static IP address, and be alright - but we'll see. Any suggestions or past experiences would be greatly appreciated. Thanks!
chmorin wrote: » To Jump back to the OP. I wouldn't consider it 'bad practice' to separate the dishing of DHCP address among different servers. In my company, we have the VoIP DHCP server run on the local gateway, and the Data DHCP server run on a local DC. The configuration should essentially be the same. I'd make sure CDP didn't get disabled for some reason on the switch, confirm your VLAN configuration, and if the data DHCP server is on a different subnet make sure you have helper-addresses where you need them. Let us know what you find out.
! ip dhcp pool Voice_DHCP Description - DHCP Pool for Voice VLAN import all network 10.10.11.32 255.255.255.224 default-router 10.10.11.33 option 150 ip 10.10.11.33 domain-name hermesz.local dns-server 10.10.11.3 4.2.2.2 ! ! interface GigabitEthernet0/1.10 description $FW_INSIDE$ VLAN 10 is teh Management VLAN for all Cisco Devices on the network encapsulation dot1Q 10 native ip address 192.168.254.1 255.255.255.224 no ip redirects no ip unreachables ip nat inside ip virtual-reassembly in ! interface GigabitEthernet0/1.11 description $FW_INSIDE Data Subnet$ DC and all devices/PCs on DATA Subnet encapsulation dot1Q 11 ip address 10.10.11.1 255.255.255.224 ip access-group hdtLANsecure in no ip redirects no ip unreachables ip nat inside ip virtual-reassembly in ! interface GigabitEthernet0/1.12 description $FW_INSIDE Voice Subnet$ encapsulation dot1Q 12 ip address 10.10.11.33 255.255.255.224 no ip redirects no ip unreachables ip nat inside ip virtual-reassembly in !
! interface FastEthernet0/1 description $Connection to Office$ [COLOR=#FF0000]switchport trunk native vlan 11 [/COLOR] switchport trunk allowed vlan 1,11,12,1002-1005 switchport mode trunk switchport voice vlan 12 spanning-tree portfast !
! interface FastEthernet0/5 description $Connection to WAP-1$ [COLOR=#B22222]switchport trunk native vlan 100[/COLOR][COLOR=#800080] [/COLOR] switchport mode trunk ! interface FastEthernet0/6 description $Connection to WAP-2$ [COLOR=#B22222]switchport trunk native vlan 100 [/COLOR] switchport mode trunk ! interface FastEthernet0/7 description $Connection to WAP-3$ [COLOR=#B22222]switchport trunk native vlan 100 [/COLOR] switchport mode trunk !