104
C
HAPTER
6: VLAN O
PERATION
Enabling/Disabling Voice VLAN Security Mode
In security mode, the system can filter out the traffic whose source MAC is not OUI
within the Voice VLAN, while the other VLANs are not influenced. If security mode is
disabled, the system cannot filter anything.
Perform the following configuration in System View.
By default, the Voice VLAN security mode is enabled.
Enabling/Disabling Voice VLAN Auto Mode
In auto mode, if you enable Voice VLAN features on a port and there is IP Phone
traffic through the port, the system automatically adds the port to the Voice VLAN.
But in manual mode, you have to perform the above operation manually.
Perform the following configuration in System View.
By default, Voice VLAN auto mode is enabled.
Setting the Aging Time of Voice VLAN
In auto mode, using the follow command, you can set the aging time of Voice VLAN.
After the OUI address, the MAC address of IP Phone, is aged on the port, this port
enters the aging phase of Voice VLAN. If OUI address is not learned by a port within
the aging time, the port is automatically deleted from Voice VLAN. This command
does not operate in manual mode.
Perform the following configuration in System View.
The default aging time is 1440 minutes.
Table 93
Configuring the Voice VLAN Security Mode
Operation
Command
Enable Voice VLAN security mode
voice vlan security enable
Disable Voice VLAN security mode
undo voice vlan security enable
Table 94
Configuring Voice VLAN Auto Mode
Operation
Command
Enable Voice VLAN auto mode
voice vlan mode auto
Disable Voice VLAN auto mode (that is, to enable
manual mode)
undo voice vlan mode auto
Table 95
Configuring the Aging Time of Voice VLAN
Operation
command
Set the aging time of Voice VLAN
voice vlan aging
minutes
Restore the default aging time
undo voice vlan aging
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...