
2-33
Cisco IP Telephony Network Design Guide
78-11103-03
Chapter 2 Campus Infrastructure Considerations
Quality of Service
Figure 2-16 shows a different case in which the PC is not trusted completely, yet
it gets a level of service higher than it would with CoS=0. This is achieved by
extending a specific CoS value to the PC traffic.
Figure 2-16 PC Is Not Trusted but Gets a Non-Zero CoS
Note All of the previously discussed configurations can be used on any
Catalyst switch that runs Cisco CatOS or native Cisco IOS software
(for example, Catalyst 3524XL).
QoS Commands
Three commands are available for specifying classification and trust boundary:
• set port qos mod/ports trust {untrusted | trust-cos | trust-ipprec |
trust-dscp}
Defines the trust boundary.
• set port qos mod/ports {trust-ext | trust-cos}
Extends the trust boundary to the PC.
• set port qos mod/ports cos-ext value
Sets a defined CoS to the traffic from the PC.
Example: set port qos 2/1 cos-ext 2
PC is untrusted.
Phone ASIC
rewrites CoS based
on switch
configuration
(for Example
Extended CoS = 2)
CoS = 5
CoS = 5
CoS = 2 CoS = 7
IP
40772
Comentarios a estos manuales