A SERVICE OF

logo

55-33
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-02
Chapter 55 Configuring a VoIP Network
Configuring VoIP on a Switch
This example shows how to set the phone access port to the untrusted mode:
Console> (enable) set port qos 3/7 trust-ext untrusted
Port in the phone device connected to port 3/7 is configured to be untrusted.
Console> (enable)
Setting the Phone Access Port CoS Value
To set the phone access port CoS value, perform this task in privileged mode:
This example shows how to set the Layer 2 CoS value that is used by a phone access port in untrusted
mode:
Console> (enable) set port qos 2/1 cos-ext 3
Port 2/1 qos cos-ext set to 3.
Console> (enable)
Verifying the Phone Access Port QoS Configuration
To verify the phone access port QoS configuration, perform this task in normal mode:
This example shows how to verify the phone access port QoS configuration:
Console> (enable) show port qos 3/4
<...Output Truncated...>
Port Ext-Trust Ext-Cos
----- --------- -------
3/4 untrusted 0
<...Output Truncated...>
Configuring a Trusted Boundary to Ensure Port Security
This section describes the trusted boundary that is used to prevent security problems if users disconnect
their PCs from the networked Cisco IP Phones and plug them directly into the switch port to take advantage
of the QoS trust-cos switch port settings.
These sections describe the trusted boundary:
Supported Cisco IP Phones, page 55-34
QoS and Cisco IP Phone Configuration, page 55-34
QoS, Cisco IP Phone, and PC Configuration, page 55-34
Trusted Boundary Configuration Guidelines, page 55-35
Configuring a Trusted Boundary, page 55-36
Task Command
Set the phone access port CoS value. set port qos mod/ports cos-ext cos_value
Task Command
Verify the phone access port QoS configuration. show port qos [mod[/port]]