We have 3 different types of switches in our network.
- All of our IP Phones are running on HP 2520-24 PoE switches.
- Our primary backbone is "supposed to be" running on Netgear GS748T switches.
- Our OLD switches are Dell PowerConnect 2848. These need to be removed.
I've drawn two diagrams (below).
- The first one is what we want, but doesn't seem to work.
- The second one what we have now, it's working but not desireable.
My question is quite basic. What is in the Netgear GS748T switches that would
- Block my SIP phones from getting IP address when the DHCP server is connected directly to it?
- Prevent my PBX from accessing the network?
FYI: If I PING the pbx when it's connected to the DELL server, it responds appropriately, but if I PING it when connected to the Netgear, it times out. The PBX has a static IP set.
All computers (which are on the exact same network) are connected just fine (including receiving IP addresses via DHCP).
Here are some screenshots of the switch config. This is the switch that the VoIP server is connected to.
The Dell switch is set as unmanaged, and the Netgear connected to the DHCP server is also basically unmanaged (other than having a static IP).
NOTE: we have not configured LAG's (yet) and there is only a single line between switches.
NOTE: the VoIP connection is shown as "offline" because when the screenshot was taken, the PBX was connected to the DELL switch. It shows as "online" when the PBX is connected to the Netgear switch.
Inside the settings of the Netgear switch is a section called
Voice VLAN
. It defaults to VLAN2 and isEnabled
by default.Now, even though you're not tagging any ports with VLAN2, the switch is still trying to put all voice devices on VLAN2. This is why it's not getting connectivity on voice devices.
When a computer is connected through the phone, the Voice VLAN is still trying to send the phone to VLAN2 while sending the computer to VLAN1.
Disabling the Voice VLAN solves the issue and allows all traffic to function as expected.
check if on the netgear you don't have some
802.1q tagging
causing packets to go to another vlan. But having a separate VLAN for voip may be a good idea anyway, separating a bit data and voice (think about your VIP's communication sharing the network with every pc/servers in the enterprise...) (you'd need to deploy it across the whole network though...)