41-67
Cisco 7600 Series Router Cisco IOS Software Configuration Guide, Release 12.2SX
OL-4266-08
Chapter 41 Configuring PFC QoS
Configuring PFC QoS
• policy-map—Enter the policy-map command to define the following:
–
Policy map class trust mode
–
Aggregate policing and marking
–
Microflow policing and marking
• service-policy—Enter the service-policy command to attach a policy map to an interface.
Configuring MAC ACLs
These sections describe MAC ACL configuration:
• Configuring Protocol-Independent MAC ACL Filtering, page 41-67
• Enabling VLAN-Based MAC QoS Filtering, page 41-68
• Configuring MAC ACLs, page 41-69
Note You can use MAC ACLs with VLAN ACLs (VACLs). For more information, see Chapter 35,
“Configuring VLAN ACLs.”
Configuring Protocol-Independent MAC ACL Filtering
With Release 12.2(18)SXD and later releases, PFC3BXL and PFC3B modes support
protocol-independent MAC ACL filtering. Protocol-independent MAC ACL filtering applies MAC
ACLs to all ingress traffic types (for example, IPv4 traffic, IPv6 traffic, and MPLS traffic, in addition to
MAC-layer traffic).
You can configure these interface types for protocol-independent MAC ACL filtering:
• VLAN interfaces without IP addresses
• Physical LAN ports configured to support EoMPLS
• Logical LAN subinterfaces configured to support EoMPLS
Ingress traffic permitted or denied by a MAC ACL on an interface configured for protocol-independent
MAC ACL filtering is processed by egress interfaces as MAC-layer traffic. You cannot apply egress IP
ACLs to traffic that was permitted or denied by a MAC ACL on an interface configured for
protocol-independent MAC ACL filtering.
To configure protocol-independent MAC ACL filtering, perform this task:
Command Purpose
Step 1
Router(config)# interface {{vlan
vlan_ID
} |
{
type
1
slot/port
[.
subinterface
]} |
{port-channel
number
[.
subinterface
]}}
1.
type
= ethernet, fastethernet, gigabitethernet, or tengigabitethernet
Selects the interface to configure.
Step 2
Router(config-if)# mac packet-classify
Enables protocol-independent MAC ACL filtering on the
interface.
Router(config-if)# no mac packet-classify
Disables protocol-independent MAC ACL filtering on the
interface.