58
C
HAPTER
12: V
OICE
VLAN C
ONFIGURATION
CAUTION:
■
You can enable voice VLAN feature for only one VLAN at a moment.
■
If the VLAN for whom the voice VLAN function is enabled is a dynamic VLAN, the
VLAN becomes a static VLAN after you enable the voice VLAN function.
■
A port operating in the automatic mode cannot be added to/removed from a voice
VLAN.
■
When a voice VLAN operates in the security mode, the devices in it only permit
packets whose source addresses are the voice OUI addresses that can be
identified. Packets whose source addresses cannot be identified, including certain
authentication packets (such as 802.1x authentication packets), will be dropped.
So, do not transmit both voice data and service data in a voice VLAN. If you have
to do so, make sure the voice VLAN do not operate in the security mode.
Add a
port to
the
VLAN
Access
port
Enter VLAN
view
vlan
vlan-id
Required
Add the port
to the VLAN
port
port-type port-num
Trunk or
hybrid
port
Enter port
view
interface
interface-type
interface-num
Add the port
to the voice
VLAN
port trunk permit vlan
vlan-id
port hybrid vlan
vlan-id
{
tagged | untagged }
Configure
the voice
VLAN to be
the default
VLAN of the
port
port trunk pvid vlan
vlan-id
port hybrid pvid vlan
vlan-id
Optional
Refer to Table 37 to
determine whether or not
this operation is needed.
Quit to system view
quit
-
Set an OUI address to be one that
can be identified by the voice
VLAN
voice vlan mac-address
oui
mask
oui-mask
[
description
string
]
Optional
If you do not set the
address, the default OUI
address is used.
Enable the voice VLAN security
mode
voice vlan security enable
Optional
By default, the voice VLAN
security mode is enabled.
Set aging time for the voice VLAN
voice vlan aging
minutes
Optional
The default aging time is
1,440 minutes.
Enable the voice VLAN function
globally
voice vlan
vlan-id
enable
Required
Table 39
Configure a voice VLAN to operate in manual mode (Continued)
Operation
Command
Description
Summary of Contents for 4200G 12-Port
Page 10: ...8 CONTENTS...
Page 14: ...4 ABOUT THIS GUIDE...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS...