EasyManuals Logo
Home>Cisco>Network Router>Catalyst 3550 Series

Cisco Catalyst 3550 Series User Manual

Cisco Catalyst 3550 Series
992 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #618 background imageLoading...
Page #618 background image
29-32
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-09
Chapter 29 Configuring QoS
Configuring Standard QoS
Configuring a Trusted Boundary to Ensure Port Security
In a typical network, you connect a Cisco IP phone to a switch port as shown in Figure 29-9 on
page 29-29. Traffic sent from the telephone to the switch is typically marked with a tag that uses the
802.1Q header. The header contains the VLAN information and the class of service (CoS) 3-bit field,
which determines the priority of the packet. For most Cisco IP phone configurations, the traffic sent from
the telephone to the switch is trusted to ensure that voice traffic is properly prioritized over other types
of traffic in the network. By using the mls qos trust cos interface configuration command, you can
configure the switch port to which the telephone is connected to trust the CoS labels of all traffic received
on that port.
In some situations, you also might connect a PC or workstation to the IP phone. In this case, you can use
the switchport priority extend cos interface configuration command to configure the telephone through
the switch CLI to override the priority of the traffic received from the PC. With this command, you can
prevent a PC from taking advantage of a high-priority data queue.
However, if a user bypasses the telephone and connects the PC directly to the switch, the CoS labels
generated by the PC are trusted by the switch (because of the trusted CoS setting) and can allow misuse
of high-priority queues. The trusted boundary feature solves this problem by using the CDP to detect the
presence of a Cisco IP phone (such as the Cisco IP Phone 7910, 7935, 7940, and 7960) on a switch port.
If the telephone is not detected, the trusted boundary feature disables the trusted setting on the switch
port and prevents misuse of a high-priority queue.
Beginning in privileged EXEC mode, follow these steps to enable trusted boundary on a port:
To disable the trusted boundary feature, use the no mls qos trust device interface configuration
command.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
mls qos Enable QoS globally.
Step 3
cdp run Enable CDP globally. By default, CDP is enabled.
Step 4
interface interface-id Enter interface configuration mode, and specify the interface connected to
the IP phone.
Valid interfaces include physical interfaces.
Step 5
cdp enable Enable CDP on the interface. By default, CDP is enabled.
Step 6
mls qos trust cos Configure the interface to trust the CoS value in received traffic. By default,
the port is not trusted.
Step 7
mls qos trust device cisco-phone Specify that the Cisco IP phone is a trusted device.
You cannot enable both trusted boundary and auto-QoS (auto qos voip
interface configuration command) at the same time; they are mutually
exclusive.
Step 8
end Return to privileged EXEC mode.
Step 9
show mls qos interface Verify your entries.
Step 10
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3550 Series and is the answer not in the manual?

Cisco Catalyst 3550 Series Specifications

General IconGeneral
BrandCisco
ModelCatalyst 3550 Series
CategoryNetwork Router
LanguageEnglish

Related product manuals