Cisco Systems OL-8978-02 manual 55-4

Page 4

Chapter 55 Configuring a VoIP Network

Understanding How a VoIP Network Works

Figure 55-2 Connecting the Cisco IP Phone 7960 to the Catalyst 6500 Series Switch

10/100BASE-TX Module

*

(WS-X6348-RJ45V)

 

 

 

10/100BASE-TX Module

*

(WS-X6348-RJ45V)

 

 

 

10/100BASE-TX Module

*

(WS-X6348-RJ45V)

 

 

 

10/100BASE-TX Module

*

(WS-X6348-RJ45V)

 

 

 

Gigabit Ethernet Module with

*

Inline power daughter card

 

(WS-6548-GE-TX + WS-F6K-VPWR)

Catalyst 6500 series switches

IP phone (Example 1)

PC (Example 2)

 

 

 

IP phone

 

PC (Example 3)

 

 

 

IP phone

 

IP phone

 

PC (Example 4)

 

 

* Or any Catalyst 4000, 5000, and 6000

38203

10/100 module using the inline-power

 

patch panel (WS-PWR-PNL)

The examples shown in Figure 55-2are described in detail as follows:

Example 1: Single Cisco IP Phone 7960

Example 1 shows one IP phone that is connected to the 10/100 port on the Catalyst 6500 series switch. The PC-to-phone jack on the phone is not used. The phone can be powered through the 10/100 port or wall powered.

Example 2: Single PC

Example 2 shows one PC that is connected to the 10/100 port on the Catalyst 6500 series switch. The PC is wall powered.

Example 3: One Cisco IP Phone 7960 and One PC

Example 3 shows one IP phone that is connected to the 10/100 port on the Catalyst 6500 series switch and one PC that is connected to the PC-to-phone jack on the phone. The PC behaves as if it is connected directly to the 10/100 port on the Catalyst 6500 series switch. The phone can be powered through the 10/100 port or wall powered. The PC must be wall powered.

Example 4: Two Cisco IP Phone 7960s and One PC

Example 4 shows two IP phones that are connected to the 10/100 port on the Catalyst 6500 series switch and one PC that is connected to the PC-to-phone jack on the phone. The PC behaves as if it is connected directly to the 10/100 port on the Catalyst 6500 series switch. The first phone can be powered through the 10/100 port or wall powered. The second phone and the PC must be wall powered.

Note For more information on configuring the Cisco IP phones and third-party vendor phones, refer to the documentation that shipped with the phone.

Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7

55-4

OL-8978-02

 

 

Image 4
Contents A P T E R 55-1Cisco IP Phone 55-255-3 55-4 Access Gateways Cisco CallManagerAnalog Station Gateway 55-5FXS Interface Features Analog Trunk GatewayDigital Trunk Gateway 55-6Digital Signal Processing Per T1/E1 Port Converged Voice GatewayLink Management 55-7How a Call Is Made 55-8Switch-to-Phone Connections 55-9Voice-Related CLI Commands CLI Commands Ethernet Module1 WS-X6608-T1/E12 WS-X6624-FXS3Set port inlinepower Set inlinepower defaultallocation Show port inlinepowerShow environment power Configuring Per-Port Power Management55-11 Show module mod Task Command55-12 Show version mod Power Management Modes55-13 Phone Class Required Power W Power Requirements55-14 Available Power Wall-Powered PhonesPowering Off the Phone Phone RemovalHigh-Availability Support Phone Detection Summary55-16 Setting the Power Mode of a Port or a Group of Ports Setting the Default Power AllocationSet port inlinepower mod/port auto static 55-17Show port inlinepower mod /port detail Set inlinepower notify-threshold percentage55-18 Displaying the Switch Power Environment for Modules Show environment power modConsole show port inlinepower 4/1 detail Console enable show environment powerConfiguring the Auxiliary VLANs on Catalyst LAN Switches Enter the set port auxiliaryvlan mod/port auxvlanid commandUnderstanding the Auxiliary VLANs 55-20Auxiliary Vlan Configuration Guidelines Configuring the Auxiliary VLANsSet port auxiliaryvlan mod /ports vlan Untagged dot1p noneVerifying the Auxiliary Vlan Configuration Disabling the Auxiliary VLANs Until an IP Phone is DetectedKeyword Action 55-22Configuring a Port Voice Interface Configuring the Access Gateways55-23 Displaying a Port Voice Interface Configuration Displaying the FDL StatisticsShow port voice interface mod /port Show port voice fdl mod /portDisplaying the Port Configuration for the Individual Ports Console enable show port voice fdl 7/1-3Field Description Show port mod /port55-26 Port T1/E1 Pstn Interface ModuleConsole show port 55-27 Port FXS Analog Interface Module 55-28Displaying the Active Call Information Show port voice active mod/portAll call conference transcode ipaddr 55-29Console show port voice active 55-30Console show port voice active 3/2 Understanding How QoS Works in the Cisco IP Phone Configuring QoS in the Cisco IP Phone55-31 Configuring QoS in the Cisco IP Phone Setting the Phone Access Port Trust ModeSet port qos mod/ports...trust-ext trusted UntrustedConfiguring a Trusted Boundary to Ensure Port Security Setting the Phone Access Port CoS ValueVerifying the Phone Access Port QoS Configuration 55-33QoS and Cisco IP Phone Configuration QoS, Cisco IP Phone, and PC ConfigurationSupported Cisco IP Phones 55-34Trusted Boundary Configuration Guidelines 55-35Configuring a Trusted Boundary 55-36Default Configuration Specifying a Cisco IP Phone as the Trust DeviceVerifying a Port’s Trust-Device State 55-37Understanding SmartPorts Macros 55-38SmartPorts-Cisco Softphone SmartPorts-Cisco IP Phone55-39 SmartPorts Guidelines and Restrictions Command Description Ciscoipphone Command OutputCLI Interface for SmartPorts 55-41Ciscosoftphone Command Output Console enable set port macro 3/1 ciscoipphone vlanConsole enable set port macro 3/1 ciscosoftphone vlan Detailed SmartPorts StatementsHow to Use SmartPorts in Your Network Ciscoipphone Macro StatementCiscosoftphone Macro Statement Keyword Port TypeCiscorouter SmartPorts Template SmartPorts Enhancements in Software Release55-44 Ciscoswitch SmartPorts Template Ciscodesktop SmartPorts Template55-45 Set port macro mod/port ciscodesktop vlan vlanCiscoipphone SmartPorts Template Ciscosoftphone SmartPorts Template55-46 Set port macro mod/port ciscosoftphone vlan nativevlanConfiguring User-Definable SmartPorts Macros Global SmartPorts TemplateOverview 55-47Using the CLI to Configure User-Definable SmartPorts Macros Console enable set macro name videophoneCreating User-Defined Macros 55-48Defining Variables Modifying Existing User-Defined Macros55-49 Applying a User-Defined Macro Using Special Variables55-50 Console enable set port macro 3/7 videophone Console enable set port macro 3/2 videophone55-51 Displaying Macros Displaying Macro VariablesShow macro name nameofmacro show macro all 55-52Clear macro name nameofmacro clear macro all Clearing Macros and Macro Variables55-53 Show macro map all name nameofmacro port mod/port Displaying Macro Port Mappings55-54 Console enable show macro map port 3/2 Configuring a Macro within a Macro55-55 55-56

OL-8978-02 specifications

Cisco Systems OL-8978-02 is a comprehensive training curriculum designed to enhance the skills and knowledge of network professionals seeking to advance their careers in network management and security. This curriculum offers a significant focus on Cisco networking technologies and concepts, ensuring that learners are well-equipped to handle the intricacies of modern network environments.

One of the primary features of OL-8978-02 is its in-depth coverage of foundational networking concepts, which are crucial for effective network administration. The curriculum includes detailed modules on networking fundamentals, such as OSI and TCP/IP models, LAN and WAN architectures, and network protocols. This solid foundation enables learners to understand how different networking components interact and function together, forming the backbone of corporate and enterprise environments.

In addition to foundational knowledge, OL-8978-02 integrates a strong focus on security technologies and practices. Considering the increasing prevalence of cyber threats, the course emphasizes the importance of implementing robust security measures. Participants will learn about firewalls, intrusion prevention systems, VPNs, and other critical security technologies. This focus ensures that learners are prepared to safeguard networks against evolving security threats, a necessity in today’s digital landscape.

Another distinguishing characteristic of the OL-8978-02 curriculum is its emphasis on hands-on experience. The program often includes practical labs and simulations, allowing participants to apply theoretical knowledge in real-world scenarios. This experiential learning approach is pivotal for solidifying skills and boosting confidence in network management tasks.

Furthermore, OL-8978-02 addresses the latest advancements in networking technology, including software-defined networking (SDN) and cloud computing. By introducing emerging technologies, this curriculum ensures that professionals remain ahead of the curve, ready to adapt to the future demands of networking.

Finally, Cisco Systems OL-8978-02 positions itself not only as an educational tool but also as a career catalyst, providing learners with skills that are highly sought after in the IT job market. Upon completion, participants often find themselves well-prepared for various Cisco certifications, which can enhance their employability and professional growth opportunities in a competitive landscape. Through its thorough approach, OL-8978-02 plays a vital role in shaping the next generation of network professionals.