Alcatel-Lucent Enterprise OS6560-P48X4 and cisco

Post Reply
Benstech
Member
Posts: 1
Joined: 26 Aug 2025 12:05

Alcatel-Lucent Enterprise OS6560-P48X4 and cisco

Post by Benstech »

Hello guys i have this issue with my Alcatel-Lucent Enterprise OS6560-P48X4
This my configuration and cicso phones kepps connecting and reconnecting " verify network connections" note the phones get registered for a while and disconnect

! Chassis:
system name "OS6560_1G"

! Configuration:
configuration error-file-limit 2

! Capability Manager:
! Virtual Flow Control:
! LFP:
! Interface:
! Port_Manager:
! Link Aggregate:
! VLAN:
vlan 1 admin-state enable
vlan 1 name "DEFAULT_VLAN"
vlan 30 admin-state enable
vlan 30 name "DATA"
vlan 40 admin-state enable
vlan 40 name "VOICE"
vlan 30 members port 1/1/13 untagged
vlan 30 members port 1/1/32 untagged
vlan 30 members port 1/1/23-24 tagged
vlan 30 members port 1/1/46-52 tagged
vlan 40 members port 1/1/1-50 tagged

! PVLAN:
! Spanning Tree:
spantree mode flat
spantree vlan 1 admin-state enable
spantree vlan 30 admin-state enable
spantree vlan 40 admin-state enable

! DA-UNP:
unp dynamic-vlan-configuration

! Bridging:
! Port Mirroring:
! Port Mapping:
! IP:
ip service telnet admin-state disable
ip interface "dhcp-bootp" vlan 1 ifindex 1
ip interface dhcp-client vlan 30 ifindex 2
ip interface dhcp-client option-60 OmniSwitch-OS6560-P48X4

! IPv6:
! IPSec:
! IPMS:
ip multicast vlan 1 admin-state enable
ip multicast vlan 1 zapping enable
ip multicast vlan 1 version 2
ip multicast vlan 1 proxying enable
ip multicast vlan 1 querier-forwarding enable
ip multicast vlan 30 admin-state enable
ip multicast vlan 30 zapping enable
ip multicast vlan 30 version 2
ip multicast vlan 30 proxying enable
ip multicast vlan 30 querier-forwarding enable
ip multicast vlan 40 admin-state enable
ip multicast vlan 40 zapping enable
ip multicast vlan 40 version 2
ip multicast vlan 40 proxying enable
ip multicast vlan 40 querier-forwarding enable

! AAA:
aaa authentication default "local"
aaa authentication console "local"
aaa authentication http "local"
aaa authentication ssh "local"

aaa tacacs command-authorization disable

! NTP:
! QOS:
qos phones priority 7
qos port 1/1/1 trusted
qos port 1/1/2 trusted
qos port 1/1/3 trusted
qos port 1/1/4 trusted
qos port 1/1/5 trusted
qos port 1/1/6 trusted
qos port 1/1/7 trusted
qos port 1/1/8 trusted
qos port 1/1/9 trusted
qos port 1/1/10 trusted
qos port 1/1/11 trusted
qos port 1/1/12 trusted
qos port 1/1/13 trusted
qos port 1/1/14 trusted
qos port 1/1/15 trusted
qos port 1/1/16 trusted
qos port 1/1/17 trusted
qos port 1/1/18 trusted
qos port 1/1/19 trusted
qos port 1/1/20 trusted
qos port 1/1/21 trusted
qos port 1/1/22 trusted
qos port 1/1/23 trusted
qos port 1/1/24 trusted
qos port 1/1/25 trusted
qos port 1/1/26 trusted
qos port 1/1/27 trusted
qos port 1/1/28 trusted
qos port 1/1/29 trusted
qos port 1/1/30 trusted
qos port 1/1/31 trusted
qos port 1/1/32 trusted
qos port 1/1/33 trusted
qos port 1/1/34 trusted
qos port 1/1/35 trusted
qos port 1/1/36 trusted
qos port 1/1/37 trusted
qos port 1/1/38 trusted
qos port 1/1/39 trusted
qos port 1/1/40 trusted
qos port 1/1/41 trusted
qos port 1/1/42 trusted
qos port 1/1/43 trusted
qos port 1/1/44 trusted
qos port 1/1/45 trusted
qos port 1/1/46 trusted
qos port 1/1/47 trusted
qos port 1/1/48 trusted
qos port 1/1/49 trusted

! Policy Manager:
! VLAN Stacking:
! ERP:
! MVRP:
mvrp enable

! LLDP:
lldp network-policy 1 application voice vlan 40 l2-priority 7 dscp 46
lldp network-policy 10 application voice vlan 40 l2-priority 7 dscp 46
lldp nearest-bridge chassis tlv management port-description enable system-name enable system-description enable
lldp nearest-bridge chassis tlv management management-address enable
lldp nearest-bridge chassis tlv med capability enable network-policy enable
lldp port 1/1/1 med network-policy 1
lldp port 1/1/2 med network-policy 1
lldp port 1/1/3 med network-policy 1
lldp port 1/1/4 med network-policy 1
lldp port 1/1/5 med network-policy 1
lldp port 1/1/6 med network-policy 1
lldp port 1/1/7 med network-policy 1
lldp port 1/1/8 med network-policy 1
lldp port 1/1/9 med network-policy 1
lldp port 1/1/10 med network-policy 1
lldp port 1/1/11 med network-policy 1
lldp port 1/1/12 med network-policy 1
lldp port 1/1/13 med network-policy 1
lldp port 1/1/14 med network-policy 1
lldp port 1/1/15 med network-policy 1
lldp port 1/1/16 med network-policy 1
lldp port 1/1/17 med network-policy 1
lldp port 1/1/18 med network-policy 1
lldp port 1/1/19 med network-policy 1
lldp port 1/1/20 med network-policy 1
lldp port 1/1/21 med network-policy 1
lldp port 1/1/22 med network-policy 1
lldp port 1/1/23 med network-policy 1
lldp port 1/1/24 med network-policy 1
lldp port 1/1/25 med network-policy 1
lldp port 1/1/26 med network-policy 1
lldp port 1/1/27 med network-policy 1
lldp port 1/1/28 med network-policy 1
lldp port 1/1/29 med network-policy 1
lldp port 1/1/30 med network-policy 1
lldp port 1/1/31 med network-policy 1
lldp port 1/1/32 med network-policy 1
lldp port 1/1/33 med network-policy 1
lldp port 1/1/34 med network-policy 1
lldp port 1/1/35 med network-policy 1
lldp port 1/1/36 med network-policy 1
lldp port 1/1/37 med network-policy 1
lldp port 1/1/38 med network-policy 1
lldp port 1/1/39 med network-policy 1
lldp port 1/1/40 med network-policy 1
lldp port 1/1/41 med network-policy 1
lldp port 1/1/42 med network-policy 1
lldp port 1/1/43 med network-policy 1
lldp port 1/1/44 med network-policy 1
lldp port 1/1/45 med network-policy 1
lldp port 1/1/46 med network-policy 1
lldp port 1/1/47 med network-policy 1
lldp port 1/1/48 med network-policy 1
lldp port 1/1/49 med network-policy 1
lldp port 1/1/50 med network-policy 1

! UDLD:
! Server Load Balance:
! High Availability Vlan:
! Session Manager:
! Web:
! Trap Manager:
snmp station 10.190.8.100 162 "AdminSNMP" v3 enable

! Health Monitor:
health threshold memory 90

! System Service:
ip name-server 10.190.8.10

! SNMP:
snmp security no-security
snmp community-map mode enable
snmp community-map hash-key f70ce3e432ad07df47f114f95b6e2876 user "AdminSNMP" enable

! BFD:
! IP Route Manager:
ip static-route 0.0.0.0/0 gateway 10.190.8.1 metric 1

! VRRP:
! UDP Relay:
! RIP:
! OSPF:
! IP Multicast:
! DVMRP:
! IPMR:
! RIPng:
! OSPF3:
! BGP:
! ISIS:
! Module:
! LAN Power:
lanpower slot 1/1 service start

! RDP:
! DHL:
! Ethernet-OAM:
! SAA:
! SPB-ISIS:
! SVCMGR:
! LDP:
! EVB:
! APP-FINGERPRINT:
! FCOE:
! QMR:
! OPENFLOW:
! Dynamic auto-fabric:
auto-fabric admin-state enable

! SIP Snooping:
! DHCP Server:
! DHCPv6 Relay:
! DHCPv6 Snooping:
! DHCPv6 Server:
! DHCP Message Service:
! DHCP Active Lease Service:
! Virtual Chassis Split Protection:
! DHCP Snooping:
! APP-MONITORING:
! Loopback Detection:
! VM-SNOOPING:
! PPPOE-IA:
! Security:
! Zero Configuration:
! MAC Security:
! OVC:
! EFM-OAM:
! ALARM-MANAGER:
! DEVICE-PROFILE:
! PTP:
! IP DHCP RELAY:
! TEST-OAM:
! LOOPBACK TEST:
! UDP6 RELAY:
! MGMT AGENT:
! MRP:
! PKGMGR:


And i have another hp switch that works fine with the configuration bellow:
hostname "HP-2920-24G-PoEP"
module 1 type j9727a
snmp community "public" unrestricted
oobm
ip address dhcp-bootp
exit
vlan 1
name "DEFAULT_VLAN"
no untagged 1-22
untagged 23-24,A1-A2,B1-B2
ip address dhcp-bootp
exit
vlan 30
name "DATA"
untagged 1-22
tagged 23-24
no ip address
exit
vlan 40
name "VOICE"
tagged 1-24
no ip address
qos priority 7
voice
exit


Can someone help fix this issue thanks in advance
Reginaldo
Member
Posts: 11
Joined: 23 Nov 2023 12:50

Re: Alcatel-Lucent Enterprise OS6560-P48X4 and cisco

Post by Reginaldo »

Hi Benstech,


I don't know if I can help you, but on our Alcatel-Lucent Enterprise OS6560-P48X4, we use a different configuration method for data and voice VLANs (hybrid ports). Below is an example of how I use it. It has proven stable and crash-free:

unp profile "data"
unp profile "voice"
unp profile "data" map vlan #Enter data vlan or default vlan#
unp profile "voice" map vlan 200
unp port-template "datadefault" direction both default-profile "data" classification trust-tag ap-mode admin-state enable
unp port 1/1/1-46 port-type bridge #set to only for access ports#
unp port 1/1/1-46 port-template "datadefault" (set to only for access ports)
unp classification lldp med-endpoint ip-phone profile1 "voice"
unp classification-rule "voice"
unp classification-rule "voice" Profile1 "voice"



Best regards.

Reginaldo.
User avatar
Cristek
Member
Posts: 94
Joined: 08 Mar 2024 10:56

Re: Alcatel-Lucent Enterprise OS6560-P48X4 and cisco

Post by Cristek »

I also use UNP for dynamic vlan assignment instead of LLDP. To me, it's simply easier to manage and more obvious for someone else who looks at the config.
Let me add that if you end up trying UNP, you should remove the LLDP config from the switch because they kind of clash with each other since LLDP tells the phone to tag itself but with UNP your devices wont be tagged at all. At least that's how I personally do it, so I dont have to worry about tagged ports in the switch and tagging the phones manually
Post Reply

Return to “OmniSwitch 6560 / 6570M”