Cisco Systems OL-8978-02 manual Verifying the Auxiliary Vlan Configuration, Keyword Action, 55-22

Page 22

Chapter 55 Configuring a VoIP Network

Configuring VoIP on a Switch

The default setting is none. Table 55-6lists the set port auxiliaryvlan command keywords and their descriptions.

Table 55-6

Keyword Descriptions

 

 

 

Keyword

 

Action

 

 

 

dot1p

 

Specify that the phone sends the packets with 802.1p priority 5.

 

 

 

untagged

 

Specify that the phone sends the untagged packets.

 

 

 

none

 

Specify that the switch does not send any auxiliary VLAN information in the

 

 

CDP packets from that port.

 

 

 

Verifying the Auxiliary VLAN Configuration

To verify the auxiliary VLAN configuration status, perform this task in privileged mode:

Task

Command

 

 

Verify the auxiliary VLAN configuration status.

show port auxiliaryvlan {vlan untagged

 

dot1p none}

 

 

This example shows how to verify the auxiliary VLAN configuration status:

Console> show port auxiliaryvlan 123

AuxiliaryVlan AuxVlanStatus Mod/Ports

------------- ------------- -------------------------

222active 1/2,2/1-3

Console>

Disabling the Auxiliary VLANs Until an IP Phone is Detected

With software release 8.3(1) and later releases, this feature provides security for the auxiliary VLANs by ensuring that the auxiliary VLAN is not enabled until an IP phone is detected. As soon the switch detects the presence of an IP phone, the auxiliary VLAN is enabled.

The presence of an IP phone is determined through the CDP packet exchange between the switch and the phone. This detection method is used for both the inline-powered and wall-powered IP phones.

Note If the auxiliary VLAN ID equals the port-VLAN ID or when the auxiliary VLAN ID is configured as none, dot1p, or untagged, this feature cannot be applied to the port. If any command entry results in the auxiliary VLAN ID equaling the port-VLAN ID, the feature is disabled and the following warning message is displayed: “cdpverify feature on port <mod>/<port> is disabled.”

To enable or disable the auxiliary VLAN IP phone detection, perform this task in privileged mode (the default is disabled):

Task

Command

 

 

Enable or disable the auxiliary VLAN IP phone

set port auxiliaryvlan mod[/port] {vlan untagged

detection.

dot1p none} [cdpverify {enable disable}]

 

 

 

Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7

55-22

OL-8978-02

Image 22
Contents A P T E R 55-1Cisco IP Phone 55-255-3 55-4 Analog Station Gateway Access GatewaysCisco CallManager 55-5Digital Trunk Gateway FXS Interface FeaturesAnalog Trunk Gateway 55-6Link Management Digital Signal Processing Per T1/E1 PortConverged Voice Gateway 55-7How a Call Is Made 55-8Switch-to-Phone Connections 55-9Set port inlinepower Set inlinepower defaultallocation Voice-Related CLI CommandsCLI Commands Ethernet Module1 WS-X6608-T1/E12 WS-X6624-FXS3 Show port inlinepowerShow environment power Configuring Per-Port Power Management55-11 Show module mod Task Command55-12 Show version mod Power Management Modes55-13 Phone Class Required Power W Power Requirements55-14 Powering Off the Phone Available PowerWall-Powered Phones Phone RemovalHigh-Availability Support Phone Detection Summary55-16 Set port inlinepower mod/port auto static Setting the Power Mode of a Port or a Group of PortsSetting the Default Power Allocation 55-17Show port inlinepower mod /port detail Set inlinepower notify-threshold percentage55-18 Console show port inlinepower 4/1 detail Displaying the Switch Power Environment for ModulesShow environment power mod Console enable show environment powerUnderstanding the Auxiliary VLANs Configuring the Auxiliary VLANs on Catalyst LAN SwitchesEnter the set port auxiliaryvlan mod/port auxvlanid command 55-20Set port auxiliaryvlan mod /ports vlan Auxiliary Vlan Configuration GuidelinesConfiguring the Auxiliary VLANs Untagged dot1p noneKeyword Action Verifying the Auxiliary Vlan ConfigurationDisabling the Auxiliary VLANs Until an IP Phone is Detected 55-22Configuring a Port Voice Interface Configuring the Access Gateways55-23 Show port voice interface mod /port Displaying a Port Voice Interface ConfigurationDisplaying the FDL Statistics Show port voice fdl mod /portField Description Displaying the Port Configuration for the Individual PortsConsole enable show port voice fdl 7/1-3 Show port mod /port55-26 Port T1/E1 Pstn Interface ModuleConsole show port 55-27 Port FXS Analog Interface Module 55-28All call conference transcode ipaddr Displaying the Active Call InformationShow port voice active mod/port 55-29Console show port voice active 55-30Console show port voice active 3/2 Understanding How QoS Works in the Cisco IP Phone Configuring QoS in the Cisco IP Phone55-31 Set port qos mod/ports...trust-ext trusted Configuring QoS in the Cisco IP PhoneSetting the Phone Access Port Trust Mode UntrustedVerifying the Phone Access Port QoS Configuration Configuring a Trusted Boundary to Ensure Port SecuritySetting the Phone Access Port CoS Value 55-33Supported Cisco IP Phones QoS and Cisco IP Phone ConfigurationQoS, Cisco IP Phone, and PC Configuration 55-34Trusted Boundary Configuration Guidelines 55-35Configuring a Trusted Boundary 55-36Verifying a Port’s Trust-Device State Default ConfigurationSpecifying a Cisco IP Phone as the Trust Device 55-37Understanding SmartPorts Macros 55-38SmartPorts-Cisco Softphone SmartPorts-Cisco IP Phone55-39 SmartPorts Guidelines and Restrictions CLI Interface for SmartPorts Command DescriptionCiscoipphone Command Output 55-41Console enable set port macro 3/1 ciscosoftphone vlan Ciscosoftphone Command OutputConsole enable set port macro 3/1 ciscoipphone vlan Detailed SmartPorts StatementsCiscosoftphone Macro Statement How to Use SmartPorts in Your NetworkCiscoipphone Macro Statement Keyword Port TypeCiscorouter SmartPorts Template SmartPorts Enhancements in Software Release55-44 55-45 Ciscoswitch SmartPorts TemplateCiscodesktop SmartPorts Template Set port macro mod/port ciscodesktop vlan vlan55-46 Ciscoipphone SmartPorts TemplateCiscosoftphone SmartPorts Template Set port macro mod/port ciscosoftphone vlan nativevlanOverview Configuring User-Definable SmartPorts MacrosGlobal SmartPorts Template 55-47Creating User-Defined Macros Using the CLI to Configure User-Definable SmartPorts MacrosConsole enable set macro name videophone 55-48Defining Variables Modifying Existing User-Defined Macros55-49 Applying a User-Defined Macro Using Special Variables55-50 Console enable set port macro 3/7 videophone Console enable set port macro 3/2 videophone55-51 Show macro name nameofmacro show macro all Displaying MacrosDisplaying Macro Variables 55-52Clear macro name nameofmacro clear macro all Clearing Macros and Macro Variables55-53 Show macro map all name nameofmacro port mod/port Displaying Macro Port Mappings55-54 Console enable show macro map port 3/2 Configuring a Macro within a Macro55-55 55-56

OL-8978-02 specifications

Cisco Systems OL-8978-02 is a comprehensive training curriculum designed to enhance the skills and knowledge of network professionals seeking to advance their careers in network management and security. This curriculum offers a significant focus on Cisco networking technologies and concepts, ensuring that learners are well-equipped to handle the intricacies of modern network environments.

One of the primary features of OL-8978-02 is its in-depth coverage of foundational networking concepts, which are crucial for effective network administration. The curriculum includes detailed modules on networking fundamentals, such as OSI and TCP/IP models, LAN and WAN architectures, and network protocols. This solid foundation enables learners to understand how different networking components interact and function together, forming the backbone of corporate and enterprise environments.

In addition to foundational knowledge, OL-8978-02 integrates a strong focus on security technologies and practices. Considering the increasing prevalence of cyber threats, the course emphasizes the importance of implementing robust security measures. Participants will learn about firewalls, intrusion prevention systems, VPNs, and other critical security technologies. This focus ensures that learners are prepared to safeguard networks against evolving security threats, a necessity in today’s digital landscape.

Another distinguishing characteristic of the OL-8978-02 curriculum is its emphasis on hands-on experience. The program often includes practical labs and simulations, allowing participants to apply theoretical knowledge in real-world scenarios. This experiential learning approach is pivotal for solidifying skills and boosting confidence in network management tasks.

Furthermore, OL-8978-02 addresses the latest advancements in networking technology, including software-defined networking (SDN) and cloud computing. By introducing emerging technologies, this curriculum ensures that professionals remain ahead of the curve, ready to adapt to the future demands of networking.

Finally, Cisco Systems OL-8978-02 positions itself not only as an educational tool but also as a career catalyst, providing learners with skills that are highly sought after in the IT job market. Upon completion, participants often find themselves well-prepared for various Cisco certifications, which can enhance their employability and professional growth opportunities in a competitive landscape. Through its thorough approach, OL-8978-02 plays a vital role in shaping the next generation of network professionals.