EasyManuals Logo

Cisco ME 3400 User Manual

Cisco ME 3400
1138 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #657 background imageLoading...
Page #657 background image
33-31
Cisco ME 3400 Ethernet Access Switch Software Configuration Guide
OL-9639-07
Chapter 33 Configuring QoS
Configuring QoS
Using ACLs to Classify Traffic
You can classify IP traffic by using IP standard or IP extended ACLs. You can classify IP and non-IP
traffic by using Layer 2 MAC ACLs. For more information about configuring ACLs, see
Chapter 31,
“Configuring Network Security with ACLs.
Follow these guidelines when configuring QoS ACLs:
You cannot match IP fragments against configured IP extended ACLs to enforce QoS. IP fragments
are sent as best-effort. IP fragments are denoted by fields in the IP header.
The switch supports only one access group per class in an input policy map.
You cannot configure match-access group in an output policy map.
These sections describe how to create QoS ACLs:
“Creating IP Standard ACLs” section on page 33-31
“Creating IP Extended ACLs” section on page 33-32
“Creating Layer 2 MAC ACLs” section on page 33-33
Creating IP Standard ACLs
Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic:
To delete an access list, use the no access-list access-list-number global configuration command.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
access-list access-list-number
permit source [source-wildcard]
Create an IP standard ACL, repeating the command as many times as
necessary.
For access-list-number, enter the access list number. The range is 1 to 99
and 1300 to 1999.
Always use the permit keyword for ACLs used as match criteria in QoS
policies. QoS policies do not match ACLs that use the deny keyword.
For source, enter the network or host from which the packet is being sent.
You can use the any keyword as an abbreviation for 0.0.0.0
255.255.255.255.
(Optional) For source-wildcard, enter the wildcard bits in dotted decimal
notation to be applied to the source.
or ip access-list standard name Define a standard IPv4 access list using a name, and enter access-list
configuration mode. The name can be a number from 1 to 99.
In access-list configuration mode, enter permit source [source-wildcard]
Step 3
end Return to privileged EXEC mode.
Step 4
show access-lists Verify your entries.
Step 5
copy running-config
startup-config
(Optional) Save your entries in the configuration file.

Table of Contents

Other manuals for Cisco ME 3400

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ME 3400 and is the answer not in the manual?

Cisco ME 3400 Specifications

General IconGeneral
CategorySwitch
Rack MountableYes
Jumbo Frame SupportYes
Authentication MethodRADIUS, TACACS+
RAM128 MB
Flash Memory32 MB
Power DeviceInternal power supply
ModelME 3400
LayerLayer 2
MAC Address Table Size8000 entries
Remote Management ProtocolSNMP, Telnet, SSH, HTTP, HTTPS
FeaturesVLAN support, IGMP snooping, Quality of Service (QoS)
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.3x
Memory128 MB
Power SupplyAC 120/230 V (50/60 Hz)
Dimensions (H x W x D)4.4 cm x 44.5 cm x 24.2 cm
Routing ProtocolStatic routing

Related product manuals