Chapter 55 Configuring a VoIP Network
Configuring VoIP on a Switch
This example shows how to set the phone access port to the untrusted mode:
Console> (enable) set port qos 3/7 trust-ext untrusted
Port in the phone device connected to port 3/7 is configured to be untrusted.
Console> (enable)
Setting the Phone Access Port CoS Value
To set the phone access port CoS value, perform this task in privileged mode:
Task | Command |
|
|
Set the phone access port CoS value. | set port qos mod/ports |
|
|
This example shows how to set the Layer 2 CoS value that is used by a phone access port in untrusted mode:
Console> (enable) set port qos 2/1
Port 2/1 qos
Console> (enable)
Verifying the Phone Access Port QoS Configuration
To verify the phone access port QoS configuration, perform this task in normal mode:
Task | Command |
|
|
Verify the phone access port QoS configuration. | show port qos [mod[/port]] |
|
|
This example shows how to verify the phone access port QoS configuration:
Console> (enable) show | port qos 3/4 | |
<... | Output Truncated... | > |
Port | ||
3/4 | untrusted | 0 |
<... | Output Truncated... | > |
Configuring a Trusted Boundary to Ensure Port Security
This section describes the trusted boundary that is used to prevent security problems if users disconnect their PCs from the networked Cisco IP Phones and plug them directly into the switch port to take advantage of the QoS
These sections describe the trusted boundary:
•Supported Cisco IP Phones, page
•QoS and Cisco IP Phone Configuration, page
•QoS, Cisco IP Phone, and PC Configuration, page
•Trusted Boundary Configuration Guidelines, page
•Configuring a Trusted Boundary, page
|
| Catalyst 6500 Series Switch Software Configuration |
|
| |
|
|
| |||
|
|
|
|
| |
|
|
|
|