37-49
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 37 Configuring QoS
Configuring Standard QoS
Configuring a QoS Policy
Configuring a QoS policy typically requires classifying traffic into classes, configuring policies applied
to those traffic classes, and attaching policies to ports.
For background information, see the
“Classification” section on page 37-5
and the
. For configuration guidelines, see the
Guidelines” section on page 37-39
.
These sections describe how to classify, police, and mark traffic. Depending on your network
configuration, you must perform one or more of these tasks:
•
Classifying Traffic by Using ACLs, page 37-49
•
Classifying Traffic by Using Class Maps, page 37-54
•
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, page 37-59
•
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps, page 37-64
Classifying Traffic by Using ACLs
You can classify IP traffic by using IPv4 standard or IP extended ACLs. You can also use IPv6 ACLs.
You can classify non-IP traffic by using Layer 2 MAC ACLs.
Creating an IP Standard ACL
Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IPv4 traffic:
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
}
source
[
source-wildcard
]
Create an IP standard ACL, repeating the command as many times as necessary.
•
For
access-list-number
, enter the access list number. The range is 1 to 99 and
1300 to 1999.
•
Use the
permit
keyword to permit a certain type of traffic if the conditions
are matched. Use the
deny
keyword to deny a certain type of traffic if
conditions are matched.
•
For
source
, enter the network or host from which the packet is being sent.
You can use the
any
keyword as an abbreviation for 0.0.0.0 255.255.255.255.
•
(Optional) For
source-wildcard
, enter the wildcard bits in dotted decimal
notation to be applied to the source. Place ones in the bit positions that you
want to ignore.
Note
When you create an access list, remember that by default the end of the
access list contains an implicit deny statement for everything if it did not
find a match before reaching the end.
Step 3
end
Return to privileged EXEC mode.
Step 4
show access-lists
Verify your entries.
Step 5
copy running-config
startup-config
(Optional) Save your entries in the configuration file.
Содержание Catalyst 3750-E Series
Страница 48: ...Contents xlviii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...
Страница 52: ...lii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 Preface ...
Страница 1414: ...Index IN 58 Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...