27-29
Cisco ME 3800X and 3600X Switch Software Configuration Guide
OL-23400-01
Chapter 27 Configuring QoS
Configuring QoS
Creating IP Standard ACLs
Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic:
To delete an access list, use the no access-list access-list-number global configuration command.
This example shows how to allow access for only those hosts on the three specified networks. The
wildcard bits apply to the host portions of the network addresses.
Switch(config)#
access-list 1 permit 192.5.255.0 0.0.0.255
Switch(config)#
access-list 1 permit 128.88.0.0 0.0.255.255
Switch(config)#
access-list 1 permit 36.0.0.0 0.0.0.255
Creating IP Extended ACLs
Although you can configure many options in ACLs, only some are supported for QoS ACLs.
•
For permit protocol, the supported keywords are: gre, icmp, igmp, ipinip, tcp, and udp.
•
For source and destination address, the supported entries are ip-address, any, or host.
•
For match criteria, the supported keywords are dscp or tos. You can also specify a time-range.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
access-list access-list-number
permit source [source-wildcard]
Create an IP standard ACL, repeating the command as many times as
necessary.
•
For access-list-number, enter the access list number. The range is 1 to 99
and 1300 to 1999.
•
Always use the permit keyword for ACLs used as match criteria in QoS
policies. QoS policies do not match ACLs that use the deny keyword.
•
For source, enter the network or host from which the packet is being sent.
You can use the any keyword as an abbreviation for 0.0.0.0
255.255.255.255.
•
(Optional) For source-wildcard, enter the wildcard bits in dotted decimal
notation to be applied to the source.
or
ip access-list standard name
Define a standard IPv4 access list using a name, and enter access-list
configuration mode. The name can be a number from 1 to 99.
In access-list configuration mode, enter permit source [source-wildcard]
Step 3
end
Return to privileged EXEC mode.
Step 4
show access-lists
Verify your entries.
Step 5
copy running-config
startup-config
(Optional) Save your entries in the configuration file.