Cisco Systems A9014CFD Router User Manual


 
24-49
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
OL-23826-09
Chapter 24 Configuring QoS
Configuring Quality of Service (QoS)
Note The Cisco ASR 901 does not support all of the commands described in the IOS Release 12.2SR
documentation.
Configuring Ethernet Trusted Mode
The Cisco ASR 901 supports trusted and non-trusted mode for Gigabit ethernet ports. Gigabit ethernet
ports are set in non-trusted mode by default. Trust mode is configured through table-maps. Use the set
qos-group cos command to use default mapping.
Creating IP Extended ACLs
Complete the following steps to create an IP extended ACL for IP traffic:
To delete an access list, use the no access-list access-list-number global configuration command.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
access-list access-list-number permit
protocol {source source-wildcard
destination destination-wildcard}
[precedence precedence] [tos tos] [dscp
dscp]
Create an IP extended ACL. Repeat the step as many times as necessary.
For access-list-number, enter the access list number. The range is
100 to 199 and 2000 to 2699.
For protocol, enter the name or number of an IP protocol. Use the
question mark (?) to see a list of available protocols. To match any
Internet protocol (including ICMP, TCP, and UDP), enter ip.
The source is the number of the network or host sending the packet.
The source-wildcard applies wildcard bits to the source.
The destination is the network or host number receiving the packet.
The destination-wildcard applies wildcard bits to the destination.
You can specify source, destination, and wildcards as:
The 32-bit quantity in dotted-decimal format.
The keyword any for 0.0.0.0 255.255.255.255 (any host).
The keyword host for a single host 0.0.0.0.
or ip access-list extended name Define an extended IPv4 access list using a name, and enter access-list
configuration mode. The name can be a number from 100 to 199.
In access-list configuration mode, enter permit protocol {source
source-wildcard destination destination-wildcard}.
Step 3
end Return to privileged EXEC mode.
Step 4
show access-lists Verify your entries.
Step 5
copy running-config startup-config (Optional) Save your entries in the configuration file.