EasyManuals Logo

Cisco 3750G - Catalyst Integrated Wireless LAN Controller User Manual

Cisco 3750G - Catalyst Integrated Wireless LAN Controller
1204 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #758 background imageLoading...
Page #758 background image
33-46
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
Chapter 33 Configuring QoS
Configuring Standard QoS
Beginning in privileged EXEC mode, follow these steps to create a Layer 2 MAC ACL for non-IP traffic:
To delete an access list, use the no mac access-list extended access-list-name global configuration
command.
This example shows how to create a Layer 2 MAC ACL with two permit statements. The first statement
allows traffic from the host with MAC address 0001.0000.0001 to the host with MAC
address 0002.0000.0001. The second statement allows only Ethertype XNS-IDP traffic from the host
with MAC address 0001.0000.0002 to the host with MAC address 0002.0000.0002.
Switch(config)# mac access-list extended maclist1
Switch(config-ext-macl)# permit 0001.0000.0001 0.0.0 0002.0000.0001 0.0.0
Switch(config-ext-macl)# permit 0001.0000.0002 0.0.0 0002.0000.0002 0.0.0 xns-idp
! (Note: all other access implicitly denied)
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
mac access-list extended name Create a Layer 2 MAC ACL by specifying the name of the list.
After entering this command, the mode changes to extended MAC
ACL configuration.
Step 3
{permit | deny} {host src-MAC-addr mask |
any | host dst-MAC-addr | dst-MAC-addr
mask} [type mask]
Specify the type of traffic to permit or deny if the conditions are
matched, entering the command as many times as necessary.
• For src-MAC-addr, enter the MAC address of the host from
which the packet is being sent. You specify this by using the
hexadecimal format (H.H.H), by using the any keyword as an
abbreviation for source 0.0.0, source-wildcard ffff.ffff.ffff, or by
using the host keyword for source 0.0.0.
• For mask, enter the wildcard bits by placing ones in the bit
positions that you want to ignore.
• For dst-MAC-addr, enter the MAC address of the host to which
the packet is being sent. You specify this by using the
hexadecimal format (H.H.H), by using the any keyword as an
abbreviation for source 0.0.0, source-wildcard ffff.ffff.ffff, or by
using the host keyword for source 0.0.0.
• (Optional) For type mask, specify the Ethertype number of a
packet with Ethernet II or SNAP encapsulation to identify the
protocol of the packet. For type, the range is from 0 to 65535,
typically specified in hexadecimal. For mask, enter the don’t
care bits applied to the Ethertype before testing for a match.
Note When creating an access list, remember that, by default, the
end of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
Step 4
end Return to privileged EXEC mode.
Step 5
show access-lists [access-list-number |
access-list-name]
Verify your entries.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 3750G - Catalyst Integrated Wireless LAN Controller and is the answer not in the manual?

Cisco 3750G - Catalyst Integrated Wireless LAN Controller Specifications

General IconGeneral
Switching Capacity32 Gbps
RAM128 MB
Flash Memory32 MB
Power DeviceInternal power supply
Ports48 x 10/100/1000 + 4 x SFP
Performance38.7 Mpps
Wireless LAN Controller Capacity50
StackingYes
FeaturesVLAN support, QoS
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z
Operating Humidity10% to 85% non-condensing
Power over Ethernet (PoE)Yes (optional)

Related product manuals