What will happen to a data frame with a CoS of 5 that is sent from the PC through the IP phone to port Fastethernet0/2 on the switch?

A Cisco Catalyst switch has an IP phone connected to its Fastethernet0/2 port. The IP phone has an attached PC. The Fastethernet0/2 port on the switch has been configured with the commands mls qos trust cos, mls qos trust device cisco-phone, and switchport priority extend trust.
What will happen to a data frame with a CoS of 5 that is sent from the PC through the IP phone to port Fastethernet0/2 on the switch?

A Cisco Catalyst switch has an IP phone connected to its Fastethernet0/2 port. The IP phone has an attached PC. The Fastethernet0/2 port on the switch has been configured with the commands mls qos trust cos, mls qos trust device cisco-phone, and switchport priority extend trust.
What will happen to a data frame with a CoS of 5 that is sent from the PC through the IP phone to port Fastethernet0/2 on the switch?

A.
The IP phone will, by default, overwrite the switch CoS value and mark the data packet as CoS 0.

B.
The IP phone will allow the data packet through without modifying the CoS settings of the data frame.

C.
The switch will instruct the phone to allow the packet through without modification only if the phone has been configured to do so.

D.
While the packet will pass through the IP phone without modification, the switch will, by default, override the CoS priority with the switch default CoS priority.

Explanation:

In a typical network, you connect a Cisco IP Phone to a switch port. Traffic sent from the telephone to the switch is typically marked with a tag that uses the 802.1Q header. The header contains the VLAN information and the CoS 3-bit field, which determines the priority of the packet. For most Cisco IP Phone configurations, the traffic sent from the telephone to the switch is trusted to ensure that voice traffic is properly prioritized over other types of traffic in the network. By using the mls qos trust cos interface configuration command, you can configure the switch port to which the telephone is connected to trust the CoS labels of all traffic received on that port. In some situations, you also might connect a PC or workstation to the IP phone. In these cases, you can use the switchport priority extend cos interface configuration command to configure the telephone through the switch CLI to override the priority of the traffic received from the PC. With this command, you can prevent a PC from taking advantage of a high-priority data queue. However, if a user bypasses the telephone and connects the PC directly to the switch, the CoS labels generated by the PC are trusted by the switch (because of the trusted CoS setting) and can allow misuse of high-priority queues. The trusted boundary feature solves this problem by using the CDP to detect the presence of a Cisco IP Phone (such as the Cisco IP Phone 7910, 7935, 7940, and 7960) on a switch port. If the telephone is not detected, the trusted boundary feature Domain.com
disables the trusted setting on the switch port and prevents misuse of a high-priority queue.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


http://Www.youtube.com/watch?v=howfokocy3e

http://Www.youtube.com/watch?v=howfokocy3e

metals which can be used in order to buy innovations for
your own provide as well as buy a completely brand new deliver.
You can make fleets and invade other players or just colonize new planets.
I have some friends here I do believe in this world.