Cisco NM-8B-U User Guide - Page 144

QoS Configuration Examples, Classifying Traffic by Using ACL Example, Classifying, Policing

Page 144 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples for the 16- and 36-Port Ethernet Switch Module The following example uses an extended ACL to deny traffic from port 80 (HTTP). It permits all other types of traffic: Switch(config)# access-list 106 deny tcp any any eq 80 Switch(config)# access-list 106 permit ip any any Switch(config)# interface gigabitethernet0/2 Switch(config-if)# ip access-group 106 in QoS Configuration Examples • Classifying Traffic by Using ACL Example, page 144 • Classifying Traffic by Using Class Maps Example, page 144 • Classifying, Policing, and Marking Traffic by Using Policy Maps Example, page 144 • Configuring the CoS-to-DSCP Map Example, page 145 • Configuring the DSCP-to-CoS Map Example, page 145 • Displaying QoS Information Example, page 145 Classifying Traffic by Using ACL Example The following example shows how to allow access for only those hosts on the two specified networks. The wildcard bits apply to the host portions of the network addresses. Any host with a source address that does not match the ACL statements is rejected. Switch(config)# access-list 1 permit 192.5.255.0 0.0.0.255 Switch(config)# access-list 1 permit 36.0.0.0 0.0.0.255 Classifying Traffic by Using Class Maps Example The following example shows how to configure the class map called class1. The class1 has one match criterion, which is an ACL called 103. Switch(config)# access-list 103 permit any any tcp eq 80 Switch(config)# class-map class1 Switch(config-cmap)# match access-group 103 Switch(config-cmap)# end Switch# Classifying, Policing, and Marking Traffic by Using Policy Maps Example The following example shows how to create a policy map and attach it to an ingress interface. In the configuration, the IP standard ACL permits traffic from network 10.1.0.0. For traffic matching this classification, the DSCP value in the incoming packet is trusted. If the matched traffic exceeds an average traffic rate of 48000 bps and a normal burst size of 8000 bytes, its DSCP is marked down to a value of 10 and transmitted. Switch(config)# access-list 1 permit 10.1.0.0 0.0.255.255 Switch(config)# class-map ipclass1 Switch(config-cmap)# match access-group 1 Switch(config-cmap)# exit Switch(config)# policy-map flow1t Switch(config-pmap)# class ipclass1 Switch(config-pmap-c)# police 5000000 8192 exceed-action dscp 10 Switch(config-pmap-c)# exit 144 Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Examples for the 16- and 36-Port Ethernet Switch Module
144
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
The following example uses an extended ACL to deny traffic from port 80 (HTTP). It permits all other
types of traffic:
Switch(config)#
access-list 106 deny tcp any any eq 80
Switch(config)#
access-list 106 permit ip any any
Switch(config)#
interface gigabitethernet0/2
Switch(config-if)#
ip access-group 106 in
QoS Configuration Examples
Classifying Traffic by Using ACL Example, page 144
Classifying Traffic by Using Class Maps Example, page 144
Classifying, Policing, and Marking Traffic by Using Policy Maps Example, page 144
Configuring the CoS-to-DSCP Map Example, page 145
Configuring the DSCP-to-CoS Map Example, page 145
Displaying QoS Information Example, page 145
Classifying Traffic by Using ACL Example
The following example shows how to allow access for only those hosts on the two specified networks.
The wildcard bits apply to the host portions of the network addresses. Any host with a source address
that does not match the ACL statements is rejected.
Switch(config)#
access-list 1 permit 192.5.255.0 0.0.0.255
Switch(config)#
access-list 1 permit 36.0.0.0 0.0.0.255
Classifying Traffic by Using Class Maps Example
The following example shows how to configure the class map called class1. The class1 has one match
criterion, which is an ACL called 103.
Switch(config)#
access-list 103 permit any any tcp eq 80
Switch(config)#
class-map class1
Switch(config-cmap)#
match access-group 103
Switch(config-cmap)#
end
Switch#
Classifying, Policing, and Marking Traffic by Using Policy Maps Example
The following example shows how to create a policy map and attach it to an ingress interface. In the
configuration, the IP standard ACL permits traffic from network 10.1.0.0. For traffic matching this
classification, the DSCP value in the incoming packet is trusted. If the matched traffic exceeds an
average traffic rate of 48000 bps and a normal burst size of 8000 bytes, its DSCP is marked down to a
value of 10 and transmitted.
Switch(config)#
access-list 1 permit 10.1.0.0 0.0.255.255
Switch(config)#
class-map ipclass1
Switch(config-cmap)#
match access-group 1
Switch(config-cmap)#
exit
Switch(config)#
policy-map flow1t
Switch(config-pmap)#
class ipclass1
Switch(config-pmap-c)#
police 5000000 8192 exceed-action dscp 10
Switch(config-pmap-c)#
exit