H3C LS-5100-16P-SI-OVS-H3 Configuration page 267

Low-end ethernet switches
Table of Contents

Advertisement

Voice VLAN
H3C Low-End Ethernet Switches Configuration Examples
[CoreSwitch] dhcp server ip-pool vlan100
[CoreSwitch-dhcp-pool-vlan100] network 192.168.1.0 mask 255.255.255.0
# Configure VLAN 200 as the voice VLAN and the voice server IP address as
192.168.3.3 for option 184 in the address pool vlan100.
[CoreSwitch-dhcp-pool-vlan100] voice-config ncp-ip 192.168.3.3
[CoreSwitch-dhcp-pool-vlan100] voice-config voice-vlan 200 enable
[CoreSwitch-dhcp-pool-vlan100] quit
# Configure VLAN-interface 100 to operate in global address pool mode.
[CoreSwitch] interface Vlan-interface 100
[CoreSwitch-Vlan-interface100] dhcp select global
[CoreSwitch-Vlan-interface100] quit
# Create an address pool for VLAN-interface 200 and VLAN-interface 400 respectively
to allocate IP addresses for the IP phones in the office area and the IP phone in meeting
room 2.
[CoreSwitch] interface Vlan-interface 200
[CoreSwitch-Vlan-interface200] dhcp select interface
[CoreSwitch-Vlan-interface200] quit
[CoreSwitch] interface Vlan-interface 400
[CoreSwitch-Vlan-interface400] dhcp select interface
Note:
For detailed information about DHCP configuration, refer to the user manual of the
S3600 series.
The core switch thus configured should be able to allocate IP addresses, voice VLANs,
and the voice server IP address for IP phones in VLAN 200 and VLAN 400, and to
forward voice traffic at Layer 3. If required, configure dynamic routing protocols on the
core switch, which is beyond the scope of this document.
III. Configuration remarks
After you finish the configuration, the IP phones in each area can establish connections
with the voice server, get telephone numbers, and communicate normally. For the
configuration on the voice server, refer to the user manual of the H3C XE voice server.
You are recommended to enable DHCP snooping and some security functions on
Switch A and Switch B to ensure that only legal IP phones that get IP addresses from
the core switch can use the service, thus preventing malicious interception.
Chapter 2 Configuration Examples
2-9

Advertisement

Table of Contents
loading

Table of Contents