Configuring A Qos Policy; Classifying Traffic By Using Acls - Cisco IE-3000-8TC Software Configuration Manual

Software configuration guide
Hide thumbs Also See for IE-3000-8TC:
Table of Contents

Advertisement

Chapter 36
Configuring QoS

Configuring a QoS Policy

Configuring a QoS policy typically requires classifying traffic into classes, configuring policies applied
to those traffic classes, and attaching policies to ports.
For background information, see the
Marking" section on page
Guidelines" section on page
These sections describe how to classify, police, and mark traffic. Depending on your network
configuration, you must perform one or more of these tasks:

Classifying Traffic by Using ACLs

You can classify IP traffic by using IP standard or IP extended ACLs; you can classify non-IP traffic by
using Layer 2 MAC ACLs.
Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic:
Command
Step 1
configure terminal
Step 2
access-list access-list-number {deny |
permit} source [source-wildcard]
Step 3
end
Step 4
show access-lists
Step 5
copy running-config startup-config
To delete an access list, use the no access-list access-list-number global configuration command.
OL-13018-03
36-8. For configuration guidelines, see the
36-31.
Classifying Traffic by Using ACLs, page 36-39
Classifying Traffic by Using Class Maps, page 36-42
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, page 36-44
Classifying, Policing, and Marking Traffic by Using Aggregate Policers, page 36-48
"Classification" section on page 36-5
Purpose
Enter global configuration mode.
Create an IP standard ACL, repeating the command as many times as
necessary.
For access-list-number, enter the access list number. The range is
1 to 99 and 1300 to 1999.
Use the permit keyword to permit a certain type of traffic if the
conditions are matched. Use the deny keyword to deny a certain
type of traffic if conditions are matched.
For source, enter the network or host from which the packet is
being sent. You can use the any keyword as an abbreviation for
0.0.0.0 255.255.255.255.
(Optional) For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
When creating an access list, remember that, by default, the end
Note
of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Cisco IE 3000 Switch Software Configuration Guide
Configuring Standard QoS
and the
"Policing and
"Standard QoS Configuration
36-39

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ie 3000

Table of Contents