Cisco NME-16ES-1G User Guide - Page 94

Classifying, Policing, and Marking Traffic by Using Policy Maps, class, access-group

Page 94 highlights

Configuration Tasks 16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Classifying, Policing, and Marking Traffic by Using Policy Maps A policy map specifies which traffic class to act on. Actions can include trusting the CoS or DSCP values in the traffic class; setting a specific DSCP value in the traffic class; and specifying the traffic bandwidth limitations for each matched traffic class (policer) and the action to take when the traffic is out of profile (marking). A separate policy-map class can exist for each type of traffic received through an interface. You can attach only one policy map per interface in the input direction. Beginning in privileged EXEC mode, follow these steps to create a policy map: Step 1 Step 2 Step 3 Command configure terminal access-list access-list-number {deny | permit} {source source-wildcard | host source | any} or access-list access-list-number {deny | permit | remark} protocol {source source-wildcard | host source | any}[operator port] {destination destination-wildcard | host destination | any} [operator port] policy-map policy-map-name Step 4 class class-map-name [access-group acl-index-or-name] Purpose Enters global configuration mode. Creates an IP standard or extended ACL for IP traffic, repeating the command as many times as necessary. For more information, see the "Classifying Traffic by Using ACLs" section on page 91. Note Deny statements are not supported for QoS ACLS. See the "Classification Based on QoS ACLs" section on page 32 for more details. Creates a policy map by entering the policy map name, and enter policy-map configuration mode. By default, no policy maps are defined. The default behavior of a policy map is to set the DSCP to 0 if the packet is an IP packet and to set the CoS to 0 if the packet is tagged. No policing is performed. Defines a traffic classification, and enter policy-map class configuration mode. By default, no policy map class maps are defined. If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command. For access-group acl-index-or-name, specify the number or name of the ACL created in Step 2. Note In a policy map, the class named class-default is not supported. The switch does not filter traffic based on the policy map defined by the class class-default policy-map configuration command. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 94

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
94
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Classifying, Policing, and Marking Traffic by Using Policy Maps
A policy map specifies which traffic class to act on. Actions can include trusting the CoS or DSCP values
in the traffic class; setting a specific DSCP value in the traffic class; and specifying the traffic bandwidth
limitations for each matched traffic class (policer) and the action to take when the traffic is out of profile
(marking).
A separate policy-map class can exist for each type of traffic received through an interface. You can
attach only one policy map per interface in the input direction.
Beginning in privileged EXEC mode, follow these steps to create a policy map:
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
} {
source
source-wildcard
|
host
source
|
any
}
or
access-list
access-list-number
{
deny
|
permit
|
remark
}
protocol
{
source
source-wildcard
|
host
source
|
any
}
[
operator
port
]
{
destination
destination-wildcard
|
host
destination
|
any}
[
operator
port
]
Creates an IP standard or extended ACL for IP traffic, repeating the
command as many times as necessary.
For more information, see the
“Classifying Traffic by Using ACLs”
section on page 91
.
Note
Deny statements are not supported for QoS ACLS. See the
“Classification Based on QoS ACLs” section on page 32
for
more details.
Step 3
policy-map
policy-map-name
Creates a policy map by entering the policy map name, and enter
policy-map configuration mode.
By default, no policy maps are defined.
The default behavior of a policy map is to set the DSCP to 0 if the
packet is an IP packet and to set the CoS to 0 if the packet is tagged. No
policing is performed.
Step 4
class
class-map-name
[
access-group
acl-index-or-name
]
Defines a traffic classification, and enter policy-map class
configuration mode.
By default, no policy map class maps are defined.
If a traffic class has already been defined by using the
class-map
global
configuration command, specify its name for
class-map-name
in this
command.
For
access-group
acl-index-or-name
, specify t
he
number or name of the
ACL created in Step 2.
Note
In a policy map, the class named class-default is not supported.
The switch does not filter traffic based on the policy map
defined by the
class class-default
policy-map configuration
command.