EasyManuals Logo

Cisco Catalyst 3750-X User Manual

Cisco Catalyst 3750-X
1438 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #930 background imageLoading...
Page #930 background image
39-50
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 39 Configuring QoS
Configuring Standard QoS
This example shows how to create an ACL that permits IPv6 traffic from any source to any destination
that has the DSCP value set to 32:
Switch(config)# ipv6 access-list 100 permit ip any any dscp 32
This example shows how to create an ACL that permits IPv6 traffic from a source host at 10.1.1.1 to a
destination host at 10.1.1.2 with a precedence value of 5:
Switch(config)# ipv6 access-list ipv6_Name_ACL permit ip host 10::1 host 10.1.1.2
precedence 5
Creating a Layer 2 MAC ACL
Beginning in privileged EXEC mode, follow these steps to create a Layer 2 MAC ACL for non-IP traffic:
To delete an access list, use the no m
ac access-list extended access-list-name global configuration
command.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
mac access-list extended name Create a Layer 2 MAC ACL by specifying the name of the list.
After entering this command, the mode changes to extended MAC
A
CL configuration.
Step 3
{permit | deny} {host src-MAC-addr mask |
any | host dst-MAC-addr | dst-MAC-addr
mask} [type mask]
Specify the type of traffic to permit or deny if the conditions are
matched, entering the command as many times as necessary.
For src-MAC-addr, enter the MAC address of the host from
which the packet is being sent. You specify this by using the
hexadecimal format (H.H.H), by using the any keyword as an
abbreviation for source 0.0.0, source-wildcard ffff.ffff.ffff, or by
using the host keyword for source 0.0.0.
For mask, enter the wildcard bits by placing ones in the bit
positions that you want to ignore.
For dst-MAC-addr, enter the MAC address of the host to which
the packet is being sent. You specify this by using the
hexadecimal format (H.H.H), by using the any keyword as an
abbreviation for source 0.0.0, source-wildcard ffff.ffff.ffff, or by
using the host keyword for source 0.0.0.
(Optional) For type mask, specify the Ethertype number of a
packet with Ethernet II or SNAP encapsulation to identify the
protocol of the packet. For type, the range is from 0 to 65535,
typically specified in hexadecimal. For mask, enter the don’t
care bits applied to the Ethertype before testing for a match.
Note When creating an access list, remember that, by default, the
end of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
Step 4
end Return to privileged EXEC mode.
Step 5
show access-lists [access-list-number |
access-list-name]
Verify your entries.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Other manuals for Cisco Catalyst 3750-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-X and is the answer not in the manual?

Cisco Catalyst 3750-X Specifications

General IconGeneral
Switching Capacity160 Gbps
Stacking Bandwidth64 Gbps
Max Stacking Units9
Layer SupportLayer 2 and Layer 3
Form FactorRack-mountable
DRAM256 MB
Flash Memory64 MB
ModelCisco Catalyst 3750-X Series
Ports24 or 48 10/100/1000 Ethernet ports
Uplink Interfaces4 SFP or 2 SFP+
FeaturesStackWise Plus, EnergyWise
ImageIP Base or IP Services
Operating Temperature0 to 40°C
Operating Humidity10 to 85% noncondensing

Related product manuals