104
C
HAPTER
6: VLAN O
PERATION
Enabling/Disabling Voice VLAN Security Mode
In security mode, the system can filter out the traffic whose source MAC is not OUI
within the Voice VLAN, while the other VLANs are not influenced. If security mode is
disabled, the system cannot filter anything.
Perform the following configuration in System View.
By default, the Voice VLAN security mode is enabled.
Enabling/Disabling Voice VLAN Auto Mode
In auto mode, if you enable Voice VLAN features on a port and there is IP Phone
traffic through the port, the system automatically adds the port to the Voice VLAN.
But in manual mode, you have to perform the above operation manually.
Perform the following configuration in System View.
By default, Voice VLAN auto mode is enabled.
Setting the Aging Time of Voice VLAN
In auto mode, using the follow command, you can set the aging time of Voice VLAN.
After the OUI address, the MAC address of IP Phone, is aged on the port, this port
enters the aging phase of Voice VLAN. If OUI address is not learned by a port within
the aging time, the port is automatically deleted from Voice VLAN. This command
does not operate in manual mode.
Perform the following configuration in System View.
The default aging time is 1440 minutes.
Table 93
Configuring the Voice VLAN Security Mode
Operation
Command
Enable Voice VLAN security mode
voice vlan security enable
Disable Voice VLAN security mode
undo voice vlan security enable
Table 94
Configuring Voice VLAN Auto Mode
Operation
Command
Enable Voice VLAN auto mode
voice vlan mode auto
Disable Voice VLAN auto mode (that is, to enable
manual mode)
undo voice vlan mode auto
Table 95
Configuring the Aging Time of Voice VLAN
Operation
command
Set the aging time of Voice VLAN
voice vlan aging
minutes
Restore the default aging time
undo voice vlan aging
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...