Cisco Systems OL-8978-02 Supported Cisco IP Phones, QoS and Cisco IP Phone Configuration, 55-34

Page 34

Chapter 55 Configuring a VoIP Network

Configuring VoIP on a Switch

Supported Cisco IP Phones

These Cisco IP phones are supported with the trusted boundary feature:

Cisco IP Phone 7910

Cisco IP Phone 7935

Cisco IP Phone 7940

Cisco IP Phone 7960

QoS and Cisco IP Phone Configuration

The Cisco IP Phones are directly attached to the Catalyst 6500 series switch ports. Typically, the traffic that is coming from the phone and entering the switch is marked with a tag using the 802.1Q header. The header contains the VLAN information and the class of service (CoS) 3-bit field. The CoS determines the priority of the packet. For most Cisco IP Phone configurations, the traffic that comes from the phone and enters the switch is trusted to ensure that the voice traffic is properly prioritized over other types of traffic in the network. The port on the switch where the phone is attached is configured to trust-cos, which means that the port trusts the CoS labeling of all packets arriving on that port.

QoS, Cisco IP Phone, and PC Configuration

A PC or workstation can be attached to the Cisco IP Phone. The phone has a built-in hub that mixes the traffic coming from the PC, the phone, and the switch port. To distinguish the traffic that comes from the PC from the traffic that comes from the phone, use the 3-bit CoS labels.

You need to configure the QoS features on the phone for proper labeling to occur. The QoS configuration information is sent to the phone using CDP from the switch. The QoS configuration determines the trust state of the phone and the classification information (Ext-Cos). The phone supports two trust states:

Trusted

Untrusted and marked with a new COS value (Ext-Cos)

If the phone is in trusted mode, all the labels that are produced by the PC are sent directly through the phone toward the switch, untouched. If the phone is in untrusted mode, all traffic coming from the PC is marked with the Ext-Cos value before it is sent to the switch.

For most setups, the PC or workstation that is attached to the phone is unable to tag its packets. In these cases, all the traffic that comes from the PC and enters the switch through the phone, is marked with the “default ext-cos” that is configured on the phone.

In some cases, the PC can tag its own packets. A PC running Windows 2000 can be configured to send the 802.1Q frames of any priority. To solve this problem, the phones should be configured to be untrusted, which marks all the traffic coming from the PC to the appropriate priority.

The trusted boundary prevents the users from taking advantage of the trust-cos setting on the switch by disconnecting their phone from the network and plugging their PC directly into the switch port. It uses CDP to detect the phone’s presence on a port. If the phone leaves the port, the feature automatically configures the port to be untrusted, which solves the security issue.

The trusted boundary is implemented using a configuration command to create a new type of trust. The command allows you to configure the port trust based on the presence of a given device on a port. For the Cisco IP Phones, you configure the trust as trust-device ciscoipphone.”

 

Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7

55-34

OL-8978-02

Image 34
Contents A P T E R 55-1Cisco IP Phone 55-255-3 55-4 Analog Station Gateway Access GatewaysCisco CallManager 55-5Digital Trunk Gateway FXS Interface FeaturesAnalog Trunk Gateway 55-6Link Management Digital Signal Processing Per T1/E1 PortConverged Voice Gateway 55-7How a Call Is Made 55-8Switch-to-Phone Connections 55-9Set port inlinepower Set inlinepower defaultallocation Voice-Related CLI CommandsCLI Commands Ethernet Module1 WS-X6608-T1/E12 WS-X6624-FXS3 Show port inlinepowerShow environment power Configuring Per-Port Power Management55-11 Show module mod Task Command55-12 Show version mod Power Management Modes55-13 Phone Class Required Power W Power Requirements55-14 Powering Off the Phone Available PowerWall-Powered Phones Phone RemovalHigh-Availability Support Phone Detection Summary55-16 Set port inlinepower mod/port auto static Setting the Power Mode of a Port or a Group of PortsSetting the Default Power Allocation 55-17Show port inlinepower mod /port detail Set inlinepower notify-threshold percentage55-18 Console show port inlinepower 4/1 detail Displaying the Switch Power Environment for ModulesShow environment power mod Console enable show environment powerUnderstanding the Auxiliary VLANs Configuring the Auxiliary VLANs on Catalyst LAN SwitchesEnter the set port auxiliaryvlan mod/port auxvlanid command 55-20Set port auxiliaryvlan mod /ports vlan Auxiliary Vlan Configuration GuidelinesConfiguring the Auxiliary VLANs Untagged dot1p noneKeyword Action Verifying the Auxiliary Vlan ConfigurationDisabling the Auxiliary VLANs Until an IP Phone is Detected 55-22Configuring a Port Voice Interface Configuring the Access Gateways55-23 Show port voice interface mod /port Displaying a Port Voice Interface ConfigurationDisplaying the FDL Statistics Show port voice fdl mod /portField Description Displaying the Port Configuration for the Individual PortsConsole enable show port voice fdl 7/1-3 Show port mod /port55-26 Port T1/E1 Pstn Interface ModuleConsole show port 55-27 Port FXS Analog Interface Module 55-28All call conference transcode ipaddr Displaying the Active Call InformationShow port voice active mod/port 55-29Console show port voice active 55-30Console show port voice active 3/2 Understanding How QoS Works in the Cisco IP Phone Configuring QoS in the Cisco IP Phone55-31 Set port qos mod/ports...trust-ext trusted Configuring QoS in the Cisco IP PhoneSetting the Phone Access Port Trust Mode UntrustedVerifying the Phone Access Port QoS Configuration Configuring a Trusted Boundary to Ensure Port SecuritySetting the Phone Access Port CoS Value 55-33Supported Cisco IP Phones QoS and Cisco IP Phone ConfigurationQoS, Cisco IP Phone, and PC Configuration 55-34Trusted Boundary Configuration Guidelines 55-35Configuring a Trusted Boundary 55-36Verifying a Port’s Trust-Device State Default ConfigurationSpecifying a Cisco IP Phone as the Trust Device 55-37Understanding SmartPorts Macros 55-38SmartPorts-Cisco Softphone SmartPorts-Cisco IP Phone55-39 SmartPorts Guidelines and Restrictions CLI Interface for SmartPorts Command DescriptionCiscoipphone Command Output 55-41Console enable set port macro 3/1 ciscosoftphone vlan Ciscosoftphone Command OutputConsole enable set port macro 3/1 ciscoipphone vlan Detailed SmartPorts StatementsCiscosoftphone Macro Statement How to Use SmartPorts in Your NetworkCiscoipphone Macro Statement Keyword Port TypeCiscorouter SmartPorts Template SmartPorts Enhancements in Software Release55-44 55-45 Ciscoswitch SmartPorts TemplateCiscodesktop SmartPorts Template Set port macro mod/port ciscodesktop vlan vlan55-46 Ciscoipphone SmartPorts TemplateCiscosoftphone SmartPorts Template Set port macro mod/port ciscosoftphone vlan nativevlanOverview Configuring User-Definable SmartPorts MacrosGlobal SmartPorts Template 55-47Creating User-Defined Macros Using the CLI to Configure User-Definable SmartPorts MacrosConsole enable set macro name videophone 55-48Defining Variables Modifying Existing User-Defined Macros55-49 Applying a User-Defined Macro Using Special Variables55-50 Console enable set port macro 3/7 videophone Console enable set port macro 3/2 videophone55-51 Show macro name nameofmacro show macro all Displaying MacrosDisplaying Macro Variables 55-52Clear macro name nameofmacro clear macro all Clearing Macros and Macro Variables55-53 Show macro map all name nameofmacro port mod/port Displaying Macro Port Mappings55-54 Console enable show macro map port 3/2 Configuring a Macro within a Macro55-55 55-56

OL-8978-02 specifications

Cisco Systems OL-8978-02 is a comprehensive training curriculum designed to enhance the skills and knowledge of network professionals seeking to advance their careers in network management and security. This curriculum offers a significant focus on Cisco networking technologies and concepts, ensuring that learners are well-equipped to handle the intricacies of modern network environments.

One of the primary features of OL-8978-02 is its in-depth coverage of foundational networking concepts, which are crucial for effective network administration. The curriculum includes detailed modules on networking fundamentals, such as OSI and TCP/IP models, LAN and WAN architectures, and network protocols. This solid foundation enables learners to understand how different networking components interact and function together, forming the backbone of corporate and enterprise environments.

In addition to foundational knowledge, OL-8978-02 integrates a strong focus on security technologies and practices. Considering the increasing prevalence of cyber threats, the course emphasizes the importance of implementing robust security measures. Participants will learn about firewalls, intrusion prevention systems, VPNs, and other critical security technologies. This focus ensures that learners are prepared to safeguard networks against evolving security threats, a necessity in today’s digital landscape.

Another distinguishing characteristic of the OL-8978-02 curriculum is its emphasis on hands-on experience. The program often includes practical labs and simulations, allowing participants to apply theoretical knowledge in real-world scenarios. This experiential learning approach is pivotal for solidifying skills and boosting confidence in network management tasks.

Furthermore, OL-8978-02 addresses the latest advancements in networking technology, including software-defined networking (SDN) and cloud computing. By introducing emerging technologies, this curriculum ensures that professionals remain ahead of the curve, ready to adapt to the future demands of networking.

Finally, Cisco Systems OL-8978-02 positions itself not only as an educational tool but also as a career catalyst, providing learners with skills that are highly sought after in the IT job market. Upon completion, participants often find themselves well-prepared for various Cisco certifications, which can enhance their employability and professional growth opportunities in a competitive landscape. Through its thorough approach, OL-8978-02 plays a vital role in shaping the next generation of network professionals.