EasyManuals Logo

Cisco Catalyst 3560-X User Manual

Cisco Catalyst 3560-X
1538 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #968 background imageLoading...
Page #968 background image
1-54
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring QoS
Configuring Standard QoS
This example shows how to create a Layer 2 MAC ACL with two permit statements. The first statement
allows traffic from the host with MAC address 0001.0000.0001 to the host with MAC
address 0002.0000.0001. The second statement allows only Ethertype XNS-IDP traffic from the host
with MAC address 0001.0000.0002 to the host with MAC address 0002.0000.0002.
Switch(config)# mac access-list extended maclist1
Switch(config-ext-macl)# permit 0001.0000.0001 0.0.0 0002.0000.0001 0.0.0
Switch(config-ext-macl)# permit 0001.0000.0002 0.0.0 0002.0000.0002 0.0.0 xns-idp
! (Note: all other access implicitly denied)
Classifying Traffic by Using Class Maps
You use the class-map global configuration command to name and to isolate a specific traffic flow (or
class) from all other traffic. The class map defines the criteria to use to match against a specific traffic
flow to further classify it. Match statements can include criteria such as an ACL, IP precedence values,
or DSCP values. The match criterion is defined with one match statement entered within the class-map
configuration mode.
Note You can also create class-maps during policy map creation by using the class policy-map configuration
command. For more information, see the “Classifying, Policing, and Marking Traffic on Physical Ports
by Using Policy Maps” section on page 1-58 and the “Classifying, Policing, and Marking Traffic on
SVIs by Using Hierarchical Policy Maps” section on page 1-63.
Beginning in privileged EXEC mode, follow these steps to create a class map and to define the match
criterion to classify traffic:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
access-list access-list-number {deny | permit}
source [source-wildcard]
or
access-list access-list-number {deny | permit}
protocol source [source-wildcard] destination
[destination-wildcard]
or
ipv6 access-list access-list-name {deny | permit}
protocol {source-ipv6-prefix/prefix-length | any |
host source-ipv6-address}
[operator [port-number]] {destination-ipv6-prefix/
prefix-length | any | host destination-ipv6-address}
[operator [port-number]] [dscp value] [fragments]
[log] [log-input] [routing] [sequence value]
[time-range name]
or
mac access-list extended name {permit | deny}
{host
src-MAC-addr mask | any | host
dst-MAC-addr | dst-MAC-addr mask} [type mask]
Create an IP standard or extended ACL, an IPv6 ACL for IP
traffic, or a Layer 2 MAC ACL for non-IP traffic, repeating the
command as many times as necessary.
For more information, see the “Classifying Traffic by Using
ACLs” section on page 1-49.
Note When creating an access list, remember that, by
default, the end of the access list contains an implicit
deny statement for everything if it did not find a match
before reaching the end.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3560-X and is the answer not in the manual?

Cisco Catalyst 3560-X Specifications

General IconGeneral
Enclosure TypeRack-mountable - 1U
SubtypeGigabit Ethernet
Ports48 x 10/100/1000 + 4 x SFP
Flash Memory64 MB
Power DeviceInternal power supply
Voltage RequiredAC 120/230 V (50/60 Hz)
Operating SystemCisco IOS
Device TypeSwitch
PerformanceSwitching capacity: 128 Gbps
Jumbo Frame SupportYes
Routing ProtocolRIP-1, RIP-2, EIGRP
Remote Management ProtocolSNMP 1, RMON 1, RMON 2, RMON 3, RMON 9, Telnet, SNMP 3, HTTP, HTTPS
FeaturesDHCP support, VLAN support, QoS, IPv6 support, Syslog
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.1p, IEEE 802.3af, IEEE 802.3x, IEEE 802.3ad, IEEE 802.1w, IEEE 802.1x, IEEE 802.1s, IEEE 802.3ah, IEEE 802.1ag, IEEE 802.3at
StackingStackable
Security FeaturesSSH, RADIUS, TACACS+
ManagementCLI
Dimensions (H x W x D)17.5 in
Operating Temperature32 to 113 °F (0 to 45 °C)
Humidity10 - 95% (non-condensing)

Related product manuals