36-48
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 36 Configuring QoS
Configuring Standard QoS
To delete an access list, use the
no ipv6 access-list
access-list-number
global configuration command.
This example shows how to create an ACL that permits IPv6 traffic from any source to any destination
that has the DSCP value set to 32:
Switch(config)#
ipv6
access-list 100 permit ip any any dscp 32
This example shows how to create an ACL that permits IPv6 traffic from a source host at 10.1.1.1 to a
destination host at 10.1.1.2 with a precedence value of 5:
Switch(config)#
ipv6 access-list ipv6_Name_ACL permit ip host 10::1 host 10.1.1.2
precedence 5
Beginning in privileged EXEC mode, follow these steps to create a Layer 2 MAC ACL for non-IP traffic:
Step 4
end
Return to privileged EXEC mode.
Step 5
show ipv6 access-list
Verify the access list configuration.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
mac access-list extended
name
Create a Layer 2 MAC ACL by specifying the name of the list.
After entering this command, the mode changes to extended MAC
ACL configuration.
Step 3
{
permit
|
deny
} {
host
src-MAC-addr mask
|
any
|
host
dst-MAC-addr
|
dst-MAC-addr
mask
} [
type mask
]
Specify the type of traffic to permit or deny if the conditions are
matched, entering the command as many times as necessary.
•
For
src-MAC-addr
, enter the MAC address of the host from
which the packet is being sent. You specify this by using the
hexadecimal format (H.H.H), by using the
any
keyword as an
abbreviation for
source
0.0.0,
source-wildcard
ffff.ffff.ffff, or
by using the
host
keyword for
source
0.0.0.
•
For
mask,
enter the wildcard bits by placing ones in the bit
positions that you want to ignore.
•
For
dst-MAC-addr
, enter the MAC address of the host to which
the packet is being sent. You specify this by using the
hexadecimal format (H.H.H), by using the
any
keyword as an
abbreviation for
source
0.0.0,
source-wildcard
ffff.ffff.ffff, or
by using the
host
keyword for
source
0.0.0.
•
(Optional) For
type mask
, specify the Ethertype number of a
packet with Ethernet II or SNAP encapsulation to identify the
protocol of the packet. For
type
, the range is from 0 to 65535,
typically specified in hexadecimal. For
mask
, enter the
don’t
care
bits applied to the Ethertype before testing for a match.
Note
When creating an access list, remember that, by default, the
end of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
Step 4
end
Return to privileged EXEC mode.