Hardware

Hardware

Known Compatible Hardware

The following hardware has been tested and is known to work with the myCloudPBX Auto Provisioning server.

  • Yealink T19
  • Yealink T20P
  • Yealink T22P
  • Yealink T23G
  • Yealink T23P
  • Yealink T27G
  • Yealink T28P
  • Yealink T29G
  • Yealink T41P
  • Yealink T41S
  • Yealink T42G
  • Yealink T42S
  • Yealink T46G
  • Yealink T46S
  • Yealink T48G
  • Yealink T48S
  • Yealink T49G
  • Yealink T52S
  • Yealink T53W
  • Yealink T54S/W
  • Yealink T56
  • Yealink T57W
  • Yealink T58/V
  • Yealink W52P
  • Yealink W60P
  • Yealink CP860 Conference Phone

  • Yealink CP930W Conference Phone

  • Yealink CP960 Conference Phone

Coming Soon!

  • Yealink T73U
  • Yealink T73W
  • Yealink T74U
  • Yealink T74W
  • Yealink T77U
  • Yealink T85W
  • Yealink T87W
  • Yealink T88W

Cisco Hardware

  • Cisco SPA303

  • Cisco SPA502G

  • Cisco SPA504G
  • Cisco SPA508G
  • Cisco SPA509G
  • Cisco SPA525
  • Cisco SPA514G

Linksys Hardware

  • Linksys SPA962

  • Linksys SPA942

  • Linksys SPA922

Polycom Hardware

  • Polycom IP 335

  • Polycom IP 450

  • Polycom IP 650
  • Polycom IP 670

  • Polycom VVX 300

  • Polycom VVX 410
  • Polycom VVX 500
  • Polycom VVX 600
  • Polycom VVX 1500
  • Polycom IP 6000 Conference Phone
  • Polycom IP 7000 Conference Phone
    • Related Articles

    • Troubleshooting Crackling on Yealink W56H Handsets

      If you are experiencing crackling sounds during calls on your Yealink W56H cordless handset, this guide will help you diagnose and resolve the issue. 1. Check the Base Station Location Ensure the base station (W60B or W56 base) is not too far from ...
    • How to Set Up and Configure Firewalls for Better Network Security

      Firewalls are a vital part of protecting your network and devices from unauthorized access and malicious threats. Whether you're setting up a personal firewall on your computer or configuring a more advanced network firewall, this guide will walk you ...
    • How to Secure Your Cloud Accounts with Two-Factor Authentication (2FA)

      If your cloud account is protected by only a password, it may be vulnerable to unauthorized access. Passwords can be compromised through phishing attacks or data breaches. This guide explains how to enable two-factor authentication (2FA) to add an ...
    • How to Configure Firewalls to Protect Your Network

      Firewalls help protect your computer and network from unauthorized access, malware, and other cyber threats. However, many users are unsure how to check or configure their firewall settings. This guide explains how firewalls work and provides ...
    • How to Securely Share Files Online Without Compromising Your Privacy

      Sharing files is part of daily work and life, but doing it without the right precautions can expose your data to hackers, leaks, or unauthorized access. This guide explains how to share files securely using trusted platforms, encryption tools, and ...