0% found this document useful (0 votes)
69 views

Cisco Router SCCP Report

This document provides an installation and configuration report for Cisco phones using a Cisco router. It describes issues encountered with the DHCP server, TFTP service, and phone configuration files. The final results are that phones were able to successfully make calls between extensions with a brief dialing delay.

Uploaded by

nathan fitness
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views

Cisco Router SCCP Report

This document provides an installation and configuration report for Cisco phones using a Cisco router. It describes issues encountered with the DHCP server, TFTP service, and phone configuration files. The final results are that phones were able to successfully make calls between extensions with a brief dialing delay.

Uploaded by

nathan fitness
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Installation and configuration report

with physical Cisco Phones, the Issues,


Problems and Troubleshooting and Final
Results

COMP 6204
VOIP:
Cisco CME Report
(Router based SCCP)

Written by Nathan Fitness 27026688


CONTENTS

Introduction.............................................................................................2

Installation............................................................................................... 3

Cisco Phone firmware.............................................................................3

Cisco Phone Configuring........................................................................3

Router’s final dial peer startup configuration file...................................8


INTRODUCTION

This report is going to document what I have done in attempting top get Taridium ipbx eXpress
installed and configured to work with Cisco phones loaded with sip firmware.

There are putty log files included as well as screenshots

THE HARDWARE USED IS AS FOLLOWS:

Router: Phones: used (tried)

Serial number: FHK1341F3RP IP Phone 7941

PID / VID CISCO2821 V05 Serial number: FCH120797Z0

Mac address #1: Mac address: 001F6C802164

Mac address #2: PID / VID CP-7941GV02

Switch: IP Phone 7941

Serial number: FCH12098FEY

Serial number: CAT1049ZHNH Mac address: 01F9E2525CF

Mac address: 001A6DB18880 PID / VID CP-7941GV02

PID / VID S-C3560-48PS-S V04

IP Phone 7911

Serial number: FCH141192ZJ

Mac address: 081FF3624FC1

PID / VID CP-7911GV08


INSTALLATION

Installation is via CLI

Configuring CME

Configuring was fairly straight forward except for a few parts

The first part was where the DHCP server installable from the web GUI did not work, so one had to be
manually installed, the problem with this was once installed it has to be started manually via the CLI.

Second the TFTP service was not reliable. This meant the phones would fail to find their configuration
files, yet alone any of their firmware files.

And third, the configuration files created by the ipbx GUI did not work for any of my phones, forcing
me to create a template using Cisco’s xml layout.

CISCO PHONE FIRMWARE

First part was copying the phones flash firmware to the routers flash: storage

This was done using the routers “copy tftp://10.0.10.11/ flash:” command

SCCP41.9-4-2SR3-1S loaded on phones (7941)

CISCO PHONE CONFIGURING

Next, we had to configure the phones configuration template.

Success… Phones Work Rung 1001 from 1002, seems to have dialing delay
Switch#sh run subject-name cn=IOS-Self-Signed-Certificate-
1840351360
Building configuration...
revocation-check none

rsakeypair TP-self-signed-1840351360
Current configuration : 5379 bytes
!
!
!
version 12.2
crypto pki certificate chain TP-self-signed-
no service pad 1840351360

service timestamps debug datetime msec certificate self-signed 01

service timestamps log datetime msec 3082023F 308201A8 A0030201 02020101


300D0609 2A864886 F70D0101 04050030
no service password-encryption
31312F30 2D060355 04031326 494F532D
! 53656C66 2D536967 6E65642D 43657274
hostname Switch 69666963 6174652D 31383430 33353133
3630301E 170D3933 30333031 30303031
!
31305A17 0D323030 31303130 30303030
boot-start-marker
305A3031 312F302D 06035504 03132649
boot-end-marker
4F532D53 656C662D 5369676E 65642D43
! 65727469 66696361 74652D31 38343033

! 35313336 3030819F 300D0609 2A864886


F70D0101 01050003 818D0030 81890281
!
8100ACFE DBBF822E 1E18C10E 2D3FBD45
! 8957E987 DE856972 4D94C929 8D4E54B5

no aaa new-model 928118F7 D708931E 037E7C20 C1E806A4


45DD3545 8B099AC1 5989C7AC 669C03FD
system mtu routing 1500
73BFD348 B54C8951 64568302 C457FF39
! 73D91334 48127CC5 07A58EF2 A88F35A7

! 947720C9 CBD5EE93 53EAD8BB FC733C38


12CF0612 12AA4303 DD112A5E BB11EA28
!
CEE70203 010001A3 67306530 0F060355
! 1D130101 FF040530 030101FF 30120603
crypto pki trustpoint TP-self-signed-1840351360 551D1104 0B300982 07537769 7463682E
301F0603 551D2304 18301680 145E9CFA
enrollment selfsigned
6A12291C 1DFCADF7 7AEF1C9F 9BAC19DE
58301D06 03551D0E 04160414 5E9CFA6A
12291C1D FCADF77A EF1C9F9B AC19DE58 !
300D0609 2A864886 F70D0101 04050003
interface FastEthernet0/3
81810015 DC0D5A31 26860444 49CE8508
A8605877 2CCE0EAE 349B6E4B 58F1A7E3 switchport access vlan 10

1475E82D F2BC367B ED662D98 FD9B5794 switchport mode access


63157F88 12B7F94F A533E873 33D9D585
switchport voice vlan 50
A975CD8D 51B075BE CC6A20D9 7182A76F
61881682 85BE38B6 01C7F611 B98B65CA spanning-tree portfast

97C59D01 A81D9FF4 2CAF2E04 BA33BAA0 !


1CA6849B E6B6A3D8 1C9E9600 8476B820
interface FastEthernet0/4
54B691
switchport access vlan 10
quit
switchport mode access
!
switchport voice vlan 50
!
spanning-tree portfast
!
!
spanning-tree mode pvst
interface FastEthernet0/5
spanning-tree extend system-id
switchport access vlan 10
!
switchport mode access
vlan internal allocation policy ascending
switchport voice vlan 50
!
spanning-tree portfast
!
!
!
interface FastEthernet0/6
!
switchport access vlan 10
interface FastEthernet0/1
switchport mode access
switchport access vlan 10
switchport voice vlan 50
switchport mode access
spanning-tree portfast
switchport voice vlan 50
!
spanning-tree portfast
interface FastEthernet0/7
!
switchport access vlan 10
interface FastEthernet0/2
switchport mode access
switchport access vlan 10
switchport voice vlan 50
switchport mode access
spanning-tree portfast
switchport voice vlan 50
!
spanning-tree portfast
interface FastEthernet0/8 switchport access vlan 10

switchport access vlan 10 switchport mode access

switchport mode access switchport voice vlan 50

switchport voice vlan 50 spanning-tree portfast

spanning-tree portfast !

! interface FastEthernet0/14

interface FastEthernet0/9 switchport access vlan 10

switchport access vlan 10 switchport mode access

switchport mode access switchport voice vlan 50

switchport voice vlan 50 spanning-tree portfast

spanning-tree portfast !

! interface FastEthernet0/15

interface FastEthernet0/10 switchport access vlan 10

switchport access vlan 10 switchport mode access

switchport mode access switchport voice vlan 50

switchport voice vlan 50 spanning-tree portfast

spanning-tree portfast !

! interface FastEthernet0/16

interface FastEthernet0/11 switchport trunk encapsulation dot1q

switchport access vlan 10 switchport mode trunk

switchport mode access spanning-tree portfast

switchport voice vlan 50 !

spanning-tree portfast interface FastEthernet0/17

! !

interface FastEthernet0/12 interface FastEthernet0/18

switchport access vlan 10 !

switchport mode access interface FastEthernet0/19

switchport voice vlan 50 !

spanning-tree portfast interface FastEthernet0/20

! !

interface FastEthernet0/13 interface FastEthernet0/21


! interface FastEthernet0/37

interface FastEthernet0/22 !

! interface FastEthernet0/38

interface FastEthernet0/23 !

! interface FastEthernet0/39

interface FastEthernet0/24 !

! interface FastEthernet0/40

interface FastEthernet0/25 !

! interface FastEthernet0/41

interface FastEthernet0/26 !

! interface FastEthernet0/42

interface FastEthernet0/27 !

! interface FastEthernet0/43

interface FastEthernet0/28 !

! interface FastEthernet0/44

interface FastEthernet0/29 !

! interface FastEthernet0/45

interface FastEthernet0/30 !

! interface FastEthernet0/46

interface FastEthernet0/31 !

! interface FastEthernet0/47

interface FastEthernet0/32 !

! interface FastEthernet0/48

interface FastEthernet0/33 !

! interface GigabitEthernet0/1

interface FastEthernet0/34 !

! interface GigabitEthernet0/2

interface FastEthernet0/35 !

! interface GigabitEthernet0/3

interface FastEthernet0/36 !

! interface GigabitEthernet0/4
! !

interface Vlan1 !

ip address dhcp !

! !

interface Vlan10 !

ip address 10.0.10.29 255.255.255.0 line con 0

! line vty 0 4

interface Vlan99 login

no ip address line vty 5 15

! login

ip default-gateway 10.0.10.1 !

ip classless end

ip http server

ip http secure-server Switch#

ROUTER’S FINAL DIAL PEER STARTUP CONFIGURATION FILE

ROUTER#SH RUN !
BUILDING CONFIGURATION... BOOT-START-MARKER
BOOT-END-MARKER
!
CURRENT CONFIGURATION : 2882 ! CARD TYPE COMMAND NEEDED FOR
BYTES SLOT/VWIC-SLOT 0/0
! !
! LAST CONFIGURATION CHANGE AT NO AAA NEW-MODEL
05:30:46 UTC THU OCT 11 2018 !
! !
VERSION 15.0 !
SERVICE TIMESTAMPS DEBUG !
DATETIME MSEC
!
SERVICE TIMESTAMPS LOG DATETIME
MSEC !
NO SERVICE PASSWORD-ENCRYPTION DOT11 SYSLOG
! IP SOURCE-ROUTE
HOSTNAME ROUTER !
!
IP CEF LOG CONFIG
IP DHCP EXCLUDED-ADDRESS 10.0.10.1 HIDEKEYS
10.0.10.10 !
IP DHCP EXCLUDED-ADDRESS 10.0.50.1 REDUNDANCY
10.0.50.10
!
!
!
IP DHCP POOL PHONE
!
DEFAULT-ROUTER 10.0.50.1
!
OPTION 150 IP 10.0.50.1
!
OPTION 66 IP 10.0.50.1
!
!
!
IP DHCP POOL DATA
!
DEFAULT-ROUTER 10.0.10.1
!
OPTION 150 IP 10.0.10.1
!
!
INTERFACE GIGABITETHERNET0/0
!
NO IP ADDRESS
NO IP DOMAIN LOOKUP
DUPLEX AUTO
NO IPV6 CEF
SPEED AUTO
!
!
MULTILINK BUNDLE-NAME
AUTHENTICATED !
! INTERFACE GIGABITETHERNET0/0.10
! ENCAPSULATION DOT1Q 10
! IP ADDRESS 10.0.10.1 255.255.255.0
! !
! INTERFACE GIGABITETHERNET0/0.50
! ENCAPSULATION DOT1Q 50
! IP ADDRESS 10.0.50.1 255.255.255.0
! !
! INTERFACE GIGABITETHERNET0/1
! IP ADDRESS 192.168.100.1
255.255.255.252
VOICE-CARD 0
DUPLEX AUTO
!
SPEED AUTO
!
!
!
!
LICENSE UDI PID CISCO2821 SN
FHK1341F3RP IP FORWARD-PROTOCOL ND
ARCHIVE NO IP HTTP SERVER
NO IP HTTP SECURE-SERVER !
! TELEPHONY-SERVICE
! MAX-EPHONES 5
! MAX-DN 5
! IP SOURCE-ADDRESS 10.0.50.1 PORT
! 2000

! AUTO ASSIGN 4 TO 6

! AUTO ASSIGN 1 TO 5

! MAX-CONFERENCES 8 GAIN -6

TFTP-SERVER FLASH:APPS41.9-4- TRANSFER-SYSTEM FULL-CONSULT


2ES26.SBN CREATE CNF-FILES VERSION-STAMP
TFTP-SERVER FLASH:CNU41.9-4- JAN 01 2002 00:00:00
2ES26.SBN !
TFTP-SERVER FLASH:CVM41SCCP.9-4- !
2ES26.SBN EPHONE-DN 1
TFTP-SERVER FLASH:DSP41.9-4- NUMBER 0001
2ES26.SBN
!
TFTP-SERVER FLASH:JAR41SCCP.9-4-
2ES26.SBN !
TFTP-SERVER FLASH:SCCP41.9-4-2SR3- EPHONE-DN 2
1S.LOADS NUMBER 0002
TFTP-SERVER !
FLASH:TERM41.DEFAULT.LOADS
!
TFTP-SERVER
EPHONE-DN 3
FLASH:TERM61.DEFAULT.LOADS
NUMBER 0003
!
!
CONTROL-PLANE
!
!
EPHONE-DN 4
!
NUMBER 0004
!
!
!
!
!
EPHONE 1
!
DEVICE-SECURITY-MODE NONE
DIAL-PEER VOICE 1 VOIP
!
DESTINATION-PATTERN 000.
!
SESSION TARGET IPV4:192.168.100.2
!
!
EPHONE 2
!
DEVICE-SECURITY-MODE NONE
!
!
!
!
EPHONE 3
DEVICE-SECURITY-MODE NONE
!
!
!
EPHONE 4
DEVICE-SECURITY-MODE NONE
!
!
!
LINE CON 0
LINE AUX 0
LINE VTY 0 4
LOGIN
!
SCHEDULER ALLOCATE 20000 1000
END

ROUTER#

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy