Cisco NME-16ES-1G User Guide - Page 93

Classifying Traffic by Using Class Maps, show class-map

Page 93 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks Classifying Traffic by Using Class Maps You use the class-map global configuration command to isolate a specific traffic flow (or class) from all other traffic and to name it. The class map defines the criteria to use to match against a specific traffic flow to further classify it. Match statements can include criteria such as an ACL. The match criterion is defined with one match statement entered within the class-map configuration mode. Note You can also create class maps during policy map creation by using the class policy-map configuration command. For more information, see the "Classifying, Policing, and Marking Traffic by Using Policy Maps" section on page 94. Beginning in privileged EXEC mode, follow these steps to create a class map and to define the match criterion to classify traffic: Step 1 Step 2 Step 3 Command configure terminal access-list access-list-number {deny | permit} {source source-wildcard | host source | any} or access-list access-list-number {deny | permit | remark} protocol {source source-wildcard | host source | any} [operator port] {destination destination-wildcard | host destination | any} [operator port] class-map class-map-name Step 4 match access-group acl-index-or-name Step 5 Step 6 Step 7 end show class-map [class-map-name] copy running-config startup-config Purpose Enters global configuration mode. Creates an IP standard or extended ACL for IP traffic, repeating the command as many times as necessary. For more information, see the "Classifying Traffic by Using ACLs" section on page 91. Note Deny statements are not supported for QoS ACLS. See the "Classification Based on QoS ACLs" section on page 32 for more details. Creates a class map, and enter class-map configuration mode. By default, no class maps are defined. For class-map-name, specify the name of the class map. Defines the match criterion to classify traffic. By default, no match criterion is supported. Only one match criterion per class map is supported, and only one ACL per class map is supported. For access-group acl-index-or-name, specify the number or name of the ACL created in Step 3. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. To delete an existing class map, use the no class-map class-map-name global configuration command. To remove a match criterion, use the no match access-group acl-index-or-name class-map configuration command. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 93

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
93
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Classifying Traffic by Using Class Maps
You use the
class-map
global configuration command to isolate a specific traffic flow (or class) from all
other traffic and to name it. The class map defines the criteria to use to match against a specific traffic
flow to further classify it. Match statements can include criteria such as an ACL. The match criterion is
defined with one match statement entered within the class-map configuration mode.
Note
You can also create class maps during policy map creation by using the
class
policy-map
configuration command. For more information, see the
“Classifying, Policing, and Marking Traffic
by Using Policy Maps” section on page 94
.
Beginning in privileged EXEC mode, follow these steps to create a class map and to define the match
criterion to classify traffic:
To delete an existing class map, use the
no class-map
class-map-name
global configuration command.
To remove a match criterion, use the
no match
access-group
acl-index-or-name
class-map
configuration command.
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
} {
source
source-wildcard
|
host
source
|
any
}
or
access-list
access-list-number
{
deny
|
permit
|
remark
}
protocol
{
source
source-wildcard
|
host
source
|
any
}
[
operator
port
]
{
destination
destination-wildcard
|
host
destination
|
any
} [
operator
port
]
Creates an IP standard or extended ACL for IP traffic, repeating the
command as many times as necessary.
For more information, see the
“Classifying Traffic by Using ACLs”
section on page 91
.
Note
Deny statements are not supported for QoS ACLS. See the
“Classification Based on QoS ACLs” section on page 32
for
more details.
Step 3
class-map
class-map-name
Creates a class map, and enter class-map configuration mode.
By default, no class maps are defined.
For
class-map-name,
specify the name of the class
map
.
Step 4
match
access-group
acl-index-or-name
Defines the match criterion to classify traffic.
By default, no match criterion is supported.
Only one match criterion per class map is supported, and only one ACL
per class map is supported.
For
access-group
acl-index-or-name
, specify the number or name of
the ACL created in Step 3.
Step 5
end
Returns to privileged EXEC mode.
Step 6
show class-map
[
class-map-name
]
Verifies your entries.
Step 7
copy running-config startup-config
(Optional) Saves your entries in the configuration file.