Chapter 55 Configuring a VoIP Network

Configuring VoIP on a Switch

Supported Cisco IP Phones

These Cisco IP phones are supported with the trusted boundary feature:

Cisco IP Phone 7910

Cisco IP Phone 7935

Cisco IP Phone 7940

Cisco IP Phone 7960

QoS and Cisco IP Phone Configuration

The Cisco IP Phones are directly attached to the Catalyst 6500 series switch ports. Typically, the traffic that is coming from the phone and entering the switch is marked with a tag using the 802.1Q header. The header contains the VLAN information and the class of service (CoS) 3-bit field. The CoS determines the priority of the packet. For most Cisco IP Phone configurations, the traffic that comes from the phone and enters the switch is trusted to ensure that the voice traffic is properly prioritized over other types of traffic in the network. The port on the switch where the phone is attached is configured to trust-cos, which means that the port trusts the CoS labeling of all packets arriving on that port.

QoS, Cisco IP Phone, and PC Configuration

A PC or workstation can be attached to the Cisco IP Phone. The phone has a built-in hub that mixes the traffic coming from the PC, the phone, and the switch port. To distinguish the traffic that comes from the PC from the traffic that comes from the phone, use the 3-bit CoS labels.

You need to configure the QoS features on the phone for proper labeling to occur. The QoS configuration information is sent to the phone using CDP from the switch. The QoS configuration determines the trust state of the phone and the classification information (Ext-Cos). The phone supports two trust states:

Trusted

Untrusted and marked with a new COS value (Ext-Cos)

If the phone is in trusted mode, all the labels that are produced by the PC are sent directly through the phone toward the switch, untouched. If the phone is in untrusted mode, all traffic coming from the PC is marked with the Ext-Cos value before it is sent to the switch.

For most setups, the PC or workstation that is attached to the phone is unable to tag its packets. In these cases, all the traffic that comes from the PC and enters the switch through the phone, is marked with the “default ext-cos” that is configured on the phone.

In some cases, the PC can tag its own packets. A PC running Windows 2000 can be configured to send the 802.1Q frames of any priority. To solve this problem, the phones should be configured to be untrusted, which marks all the traffic coming from the PC to the appropriate priority.

The trusted boundary prevents the users from taking advantage of the trust-cos setting on the switch by disconnecting their phone from the network and plugging their PC directly into the switch port. It uses CDP to detect the phone’s presence on a port. If the phone leaves the port, the feature automatically configures the port to be untrusted, which solves the security issue.

The trusted boundary is implemented using a configuration command to create a new type of trust. The command allows you to configure the port trust based on the presence of a given device on a port. For the Cisco IP Phones, you configure the trust as trust-device ciscoipphone.”

 

Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7

55-34

OL-8978-02

Page 34
Image 34
Cisco Systems OL-8978-02 manual Supported Cisco IP Phones, QoS and Cisco IP Phone Configuration, 55-34

OL-8978-02 specifications

Cisco Systems OL-8978-02 is a comprehensive training curriculum designed to enhance the skills and knowledge of network professionals seeking to advance their careers in network management and security. This curriculum offers a significant focus on Cisco networking technologies and concepts, ensuring that learners are well-equipped to handle the intricacies of modern network environments.

One of the primary features of OL-8978-02 is its in-depth coverage of foundational networking concepts, which are crucial for effective network administration. The curriculum includes detailed modules on networking fundamentals, such as OSI and TCP/IP models, LAN and WAN architectures, and network protocols. This solid foundation enables learners to understand how different networking components interact and function together, forming the backbone of corporate and enterprise environments.

In addition to foundational knowledge, OL-8978-02 integrates a strong focus on security technologies and practices. Considering the increasing prevalence of cyber threats, the course emphasizes the importance of implementing robust security measures. Participants will learn about firewalls, intrusion prevention systems, VPNs, and other critical security technologies. This focus ensures that learners are prepared to safeguard networks against evolving security threats, a necessity in today’s digital landscape.

Another distinguishing characteristic of the OL-8978-02 curriculum is its emphasis on hands-on experience. The program often includes practical labs and simulations, allowing participants to apply theoretical knowledge in real-world scenarios. This experiential learning approach is pivotal for solidifying skills and boosting confidence in network management tasks.

Furthermore, OL-8978-02 addresses the latest advancements in networking technology, including software-defined networking (SDN) and cloud computing. By introducing emerging technologies, this curriculum ensures that professionals remain ahead of the curve, ready to adapt to the future demands of networking.

Finally, Cisco Systems OL-8978-02 positions itself not only as an educational tool but also as a career catalyst, providing learners with skills that are highly sought after in the IT job market. Upon completion, participants often find themselves well-prepared for various Cisco certifications, which can enhance their employability and professional growth opportunities in a competitive landscape. Through its thorough approach, OL-8978-02 plays a vital role in shaping the next generation of network professionals.