beautypg.com

Configuring a qos policy, Classifying traffic by using acls – IBM 12.1(22)EA6 User Manual

Page 431

background image

23-23

Cisco Systems Intelligent Gigabit Ethernet Switch Modules for the IBM BladeCenter, Software Configuration Guide

24R9746

Chapter 23 Configuring QoS

Configuring Standard QoS

Configuring a QoS Policy

Configuring a QoS policy typically requires classifying traffic into classes, configuring policies applied
to those traffic classes, and attaching policies to interfaces.

For background information, see the

“Classification” section on page 23-4

and the

“Policing and

Marking” section on page 23-6

.

This section contains this configuration information:

Classifying Traffic by Using ACLs, page 23-23

Classifying Traffic by Using Class Maps, page 23-27

Classifying, Policing, and Marking Traffic by Using Policy Maps, page 23-28

Classifying Traffic by Using ACLs

You can classify IP traffic by using IP standard or IP extended ACLs; you can classify Layer 2 traffic
by using Layer 2 MAC ACLs.

Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic:

Command

Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

access-list access-list-number {permit |
remark} {source source-wildcard | host
source | any}

Create an IP standard ACL, repeating the command as many times as
necessary.

For access-list-number, enter the ACL number. The range is 1 to 99 and
1300 to 1999.

Enter permit to specify whether to permit access if conditions are
matched.

Enter remark to specify an ACL entry comment up to 100 characters.

Note

Deny statements are not supported for QoS ACLs. See the

“Classification Based on QoS ACLs” section on page 23-5

for

more details.

The source is the source address of the network or host from which the
packet is being sent, specified in one of three ways:

The 32-bit quantity in dotted decimal format.

The keyword any as an abbreviation for source and
source-wildcard
of 0.0.0.0 255.255.255.255. You do not need to
enter a source wildcard.

The keyword host as an abbreviation for source and
source-wildcard of source 0.0.0.0.

(Optional) The source-wildcard variable applies wildcard bits to the
source (see first bullet item).

Step 3

end

Return to privileged EXEC mode.

Step 4

show access-lists

Verify your entries.

Step 5

copy running-config startup-config

(Optional) Save your entries in the configuration file.