Cisco Systems OL-8978-02 manual Configuring a Trusted Boundary, 55-36

Page 36

Chapter 55 Configuring a VoIP Network

Configuring VoIP on a Switch

Figure 55-6 Determining the Final Trust Value of a Port

QoS No Enabled

Port set to default QoS disabled setttings.

COPS

Yes

Port

COPS

Enabled

 

Policy

 

Port set to policy defined by COPS server/role.

No

Local

Trust-Device

Type

None

Port set to QoS parameters as defined per the configuration

ciscoipphone

CDP Enabled on No

Port

Yes

IP Phone Yes

Persent on

Port

No

Port trust state set to untrusted, other QoS parameters set per the configuration.

68899

Configuring a Trusted Boundary

These sections describe how to configure the trusted boundary feature:

Default Configuration, page 55-37

Specifying a Cisco IP Phone as the Trust Device, page 55-37

Verifying a Port’s Trust-Device State, page 55-37

 

Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7

55-36

OL-8978-02

Image 36
Contents A P T E R 55-1Cisco IP Phone 55-255-3 55-4 Access Gateways Cisco CallManagerAnalog Station Gateway 55-5FXS Interface Features Analog Trunk GatewayDigital Trunk Gateway 55-6Digital Signal Processing Per T1/E1 Port Converged Voice GatewayLink Management 55-7How a Call Is Made 55-8Switch-to-Phone Connections 55-9Voice-Related CLI Commands CLI Commands Ethernet Module1 WS-X6608-T1/E12 WS-X6624-FXS3Set port inlinepower Set inlinepower defaultallocation Show port inlinepowerConfiguring Per-Port Power Management Show environment power55-11 Task Command Show module mod55-12 Power Management Modes Show version mod55-13 Power Requirements Phone Class Required Power W55-14 Available Power Wall-Powered PhonesPowering Off the Phone Phone RemovalPhone Detection Summary High-Availability Support55-16 Setting the Power Mode of a Port or a Group of Ports Setting the Default Power AllocationSet port inlinepower mod/port auto static 55-17Set inlinepower notify-threshold percentage Show port inlinepower mod /port detail55-18 Displaying the Switch Power Environment for Modules Show environment power modConsole show port inlinepower 4/1 detail Console enable show environment powerConfiguring the Auxiliary VLANs on Catalyst LAN Switches Enter the set port auxiliaryvlan mod/port auxvlanid commandUnderstanding the Auxiliary VLANs 55-20Auxiliary Vlan Configuration Guidelines Configuring the Auxiliary VLANsSet port auxiliaryvlan mod /ports vlan Untagged dot1p noneVerifying the Auxiliary Vlan Configuration Disabling the Auxiliary VLANs Until an IP Phone is DetectedKeyword Action 55-22Configuring the Access Gateways Configuring a Port Voice Interface55-23 Displaying a Port Voice Interface Configuration Displaying the FDL StatisticsShow port voice interface mod /port Show port voice fdl mod /portDisplaying the Port Configuration for the Individual Ports Console enable show port voice fdl 7/1-3Field Description Show port mod /portPort T1/E1 Pstn Interface Module 55-26Console show port 55-27 Port FXS Analog Interface Module 55-28Displaying the Active Call Information Show port voice active mod/portAll call conference transcode ipaddr 55-2955-30 Console show port voice activeConsole show port voice active 3/2 Configuring QoS in the Cisco IP Phone Understanding How QoS Works in the Cisco IP Phone55-31 Configuring QoS in the Cisco IP Phone Setting the Phone Access Port Trust ModeSet port qos mod/ports...trust-ext trusted UntrustedConfiguring a Trusted Boundary to Ensure Port Security Setting the Phone Access Port CoS ValueVerifying the Phone Access Port QoS Configuration 55-33QoS and Cisco IP Phone Configuration QoS, Cisco IP Phone, and PC ConfigurationSupported Cisco IP Phones 55-34Trusted Boundary Configuration Guidelines 55-35Configuring a Trusted Boundary 55-36Default Configuration Specifying a Cisco IP Phone as the Trust DeviceVerifying a Port’s Trust-Device State 55-37Understanding SmartPorts Macros 55-38SmartPorts-Cisco IP Phone SmartPorts-Cisco Softphone55-39 SmartPorts Guidelines and Restrictions Command Description Ciscoipphone Command OutputCLI Interface for SmartPorts 55-41Ciscosoftphone Command Output Console enable set port macro 3/1 ciscoipphone vlanConsole enable set port macro 3/1 ciscosoftphone vlan Detailed SmartPorts StatementsHow to Use SmartPorts in Your Network Ciscoipphone Macro StatementCiscosoftphone Macro Statement Keyword Port TypeSmartPorts Enhancements in Software Release Ciscorouter SmartPorts Template55-44 Ciscoswitch SmartPorts Template Ciscodesktop SmartPorts Template55-45 Set port macro mod/port ciscodesktop vlan vlanCiscoipphone SmartPorts Template Ciscosoftphone SmartPorts Template55-46 Set port macro mod/port ciscosoftphone vlan nativevlanConfiguring User-Definable SmartPorts Macros Global SmartPorts TemplateOverview 55-47Using the CLI to Configure User-Definable SmartPorts Macros Console enable set macro name videophoneCreating User-Defined Macros 55-48Modifying Existing User-Defined Macros Defining Variables55-49 Using Special Variables Applying a User-Defined Macro55-50 Console enable set port macro 3/2 videophone Console enable set port macro 3/7 videophone55-51 Displaying Macros Displaying Macro VariablesShow macro name nameofmacro show macro all 55-52Clearing Macros and Macro Variables Clear macro name nameofmacro clear macro all55-53 Displaying Macro Port Mappings Show macro map all name nameofmacro port mod/port55-54 Configuring a Macro within a Macro Console enable show macro map port 3/255-55 55-56

OL-8978-02 specifications

Cisco Systems OL-8978-02 is a comprehensive training curriculum designed to enhance the skills and knowledge of network professionals seeking to advance their careers in network management and security. This curriculum offers a significant focus on Cisco networking technologies and concepts, ensuring that learners are well-equipped to handle the intricacies of modern network environments.

One of the primary features of OL-8978-02 is its in-depth coverage of foundational networking concepts, which are crucial for effective network administration. The curriculum includes detailed modules on networking fundamentals, such as OSI and TCP/IP models, LAN and WAN architectures, and network protocols. This solid foundation enables learners to understand how different networking components interact and function together, forming the backbone of corporate and enterprise environments.

In addition to foundational knowledge, OL-8978-02 integrates a strong focus on security technologies and practices. Considering the increasing prevalence of cyber threats, the course emphasizes the importance of implementing robust security measures. Participants will learn about firewalls, intrusion prevention systems, VPNs, and other critical security technologies. This focus ensures that learners are prepared to safeguard networks against evolving security threats, a necessity in today’s digital landscape.

Another distinguishing characteristic of the OL-8978-02 curriculum is its emphasis on hands-on experience. The program often includes practical labs and simulations, allowing participants to apply theoretical knowledge in real-world scenarios. This experiential learning approach is pivotal for solidifying skills and boosting confidence in network management tasks.

Furthermore, OL-8978-02 addresses the latest advancements in networking technology, including software-defined networking (SDN) and cloud computing. By introducing emerging technologies, this curriculum ensures that professionals remain ahead of the curve, ready to adapt to the future demands of networking.

Finally, Cisco Systems OL-8978-02 positions itself not only as an educational tool but also as a career catalyst, providing learners with skills that are highly sought after in the IT job market. Upon completion, participants often find themselves well-prepared for various Cisco certifications, which can enhance their employability and professional growth opportunities in a competitive landscape. Through its thorough approach, OL-8978-02 plays a vital role in shaping the next generation of network professionals.