
36-50
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 36 Configuring QoS
Configuring Standard QoS
Beginning in privileged EXEC mode, follow these steps to create a class map and to define the match
criterion to classify traffic:
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
}
source
[
source-wildcard
]
or
access-list
access-list-number
{
deny
|
permit
}
protocol source
[
source-wildcard
]
destination
[
destination-wildcard
]
or
ipv6 access-list
access-list-name
{
deny
|
permit
}
protocol
{
source-ipv6-prefix/prefix-length
|
any
|
host
source-ipv6-address
}
[
operator
[
port-number
]]
{
destination-ipv6-prefix
/
prefix-length
|
any
|
host
destination-ipv6-address
}
[
operator
[
port-number
]]
[
dscp
value
] [
fragments
] [
log
] [
log-input
]
[
routing
]
[
sequence
value
] [
time-range
name
]
or
mac access-list extended
name
{
permit
|
deny
} {
host
src-MAC-addr mask
|
any
|
host
dst-MAC-addr
|
dst-MAC-addr
mask
} [
type mask
]
Create an IP standard or extended ACL or an IPv6 ACL for IP traffic,
or a Layer 2 MAC ACL for non-IP traffic, repeating the command as
many times as necessary.
For more information, see the
“Classifying Traffic by Using ACLs”
.
Note
When creating an access list, remember that, by default, the
end of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.