16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
93
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Classifying Traffic by Using Class Maps
You use the class-map global configuration command to isolate a specific traffic flow (or class) from all
other traffic and to name it. The class map defines the criteria to use to match against a specific traffic
flow to further classify it. Match statements can include criteria such as an ACL. The match criterion is
defined with one match statement entered within the class-map configuration mode.
Note
You can also create class maps during policy map creation by using the class policy-map
configuration command. For more information, see the
“Classifying, Policing, and Marking Traffic
by Using Policy Maps” section on page 94
.
Beginning in privileged EXEC mode, follow these steps to create a class map and to define the match
criterion to classify traffic:
To delete an existing class map, use the no class-map class-map-name global configuration command.
To remove a match criterion, use the no match access-group acl-index-or-name class-map
configuration command.
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
access-list access-list-number {deny |
permit} {source source-wildcard | host
source | any}
or
access-list access-list-number
{deny | permit | remark} protocol
{source source-wildcard | host
source
|
any
}
[operator port] {destination
destination-wildcard | host
destination
|
any} [operator port]
Creates an IP standard or extended ACL for IP traffic, repeating the
command as many times as necessary.
For more information, see the
“Classifying Traffic by Using ACLs”
section on page 91
.
Note
Deny statements are not supported for QoS ACLS. See the
“Classification Based on QoS ACLs” section on page 32
for
more details.
Step 3
class-map class-map-name
Creates a class map, and enter class-map configuration mode.
By default, no class maps are defined.
For class-map-name, specify the name of the class map.
Step 4
match access-group acl-index-or-name
Defines the match criterion to classify traffic.
By default, no match criterion is supported.
Only one match criterion per class map is supported, and only one ACL
per class map is supported.
For access-group acl-index-or-name, specify the number or name of
the ACL created in Step 3.
Step 5
end
Returns to privileged EXEC mode.
Step 6
show class-map [class-map-name]
Verifies your entries.
Step 7
copy running-config startup-config
(Optional) Saves your entries in the configuration file.