36-39
Cisco IE 3000 Switch Software Configuration Guide
OL-13018-03
Chapter 36 Configuring QoS
Configuring Standard QoS
Configuring a QoS Policy
Configuring a QoS policy typically requires classifying traffic into classes, configuring policies applied
to those traffic classes, and attaching policies to ports.
For background information, see the
“Classification” section on page 36-5
and the
“Policing and
Marking” section on page 36-8
. For configuration guidelines, see the
“Standard QoS Configuration
Guidelines” section on page 36-31
.
These sections describe how to classify, police, and mark traffic. Depending on your network
configuration, you must perform one or more of these tasks:
•
Classifying Traffic by Using ACLs, page 36-39
•
Classifying Traffic by Using Class Maps, page 36-42
•
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, page 36-44
•
Classifying, Policing, and Marking Traffic by Using Aggregate Policers, page 36-48
Classifying Traffic by Using ACLs
You can classify IP traffic by using IP standard or IP extended ACLs; you can classify non-IP traffic by
using Layer 2 MAC ACLs.
Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic:
To delete an access list, use the
no access-list
access-list-number
global configuration command.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
}
source
[
source-wildcard
]
Create an IP standard ACL, repeating the command as many times as
necessary.
•
For
access-list-number
, enter the access list number. The range is
1 to 99 and 1300 to 1999.
•
Use the
permit
keyword to permit a certain type of traffic if the
conditions are matched. Use the
deny
keyword to deny a certain
type of traffic if conditions are matched.
•
For
source
, enter the network or host from which the packet is
being sent. You can use the
any
keyword as an abbreviation for
0.0.0.0 255.255.255.255.
•
(Optional) For
source-wildcard
, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
Note
When creating an access list, remember that, by default, the end
of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
Step 3
end
Return to privileged EXEC mode.
Step 4
show access-lists
Verify your entries.
Step 5
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Содержание IE 3000
Страница 36: ...xxxiv Cisco IE 3000 Switch Software Configuration Guide OL 13018 03 Preface ...
Страница 784: ...39 20 Cisco IE 3000 Switch Software Configuration Guide OL 13018 03 Chapter 39 Troubleshooting Troubleshooting Tables ...
Страница 874: ...Index IN 42 Cisco IE 3000 Switch Software Configuration Guide OL 13018 03 ...