The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
To define a traffic classification match criteria for the specified class-map name, use the class command in policy-map configuration mode. Use the no form of this command to delete an existing class map.
class { class-map-name | class-default }
no class { class-map-name | class-default }
class-map-name |
The class map name. |
class-default |
Refers to a system default class that matches unclassified packets. |
No policy map class-maps are defined.
Policy-map configuration
Release |
Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
Before using the class command, you must use the policy-map global configuration command to identify the policy map and enter policy-map configuration mode. After specifying a policy map, you can configure a policy for new classes or modify a policy for any existing classes in that policy map. You attach the policy map to a port by using the service-policy interface configuration command.
After entering the class command, you enter the policy-map class configuration mode. These configuration commands are available:
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
The class command performs the same function as the class-map global configuration command. Use the class command when a new classification, which is not shared with any other ports, is needed. Use the class-map command when the map is shared among many ports.
You can configure a default class by using the class class-default policy-map configuration command. Unclassified traffic (traffic that does not meet the match criteria specified in the traffic classes) is treated as default traffic.
You can verify your settings by entering the show policy-map privileged EXEC command.
This example shows how to create a policy map called policy1. When attached to the ingress direction, it matches all the incoming traffic defined in class1, sets the IP Differentiated Services Code Point (DSCP) to 10, and polices the traffic at an average rate of 1 Mb/s and bursts at 20 KB. Traffic exceeding the profile is marked down to a DSCP value gotten from the policed-DSCP map and then sent.
Controller(config)# policy-map policy1 Controller(config-pmap)# class class1 Controller(config-pmap-c)# set dscp 10 Controller(config-pmap-c)# police 1000000 20000 exceed-action policed-dscp-transmit Controller(config-pmap-c)# exit
This example shows how to configure a default traffic class to a policy map. It also shows how the default traffic class is automatically placed at the end of policy-map pm3 even though class-default was configured first:
Controller# configure terminal Controller(config)# class-map cm-3 Controller(config-cmap)# match ip dscp 30 Controller(config-cmap)# exit Controller(config)# class-map cm-4 Controller(config-cmap)# match ip dscp 40 Controller(config-cmap)# exit Controller(config)# policy-map pm3 Controller(config-pmap)# class class-default Controller(config-pmap-c)# set dscp 10 Controller(config-pmap-c)# exit Controller(config-pmap)# class cm-3 Controller(config-pmap-c)# set dscp 4 Controller(config-pmap-c)# exit Controller(config-pmap)# class cm-4 Controller(config-pmap-c)# set precedence 5 Controller(config-pmap-c)# exit Controller(config-pmap)# exit Controller# show policy-map pm3 Policy Map pm3 Class cm-3 set dscp 4 Class cm-4 set precedence 5 Class class-default set dscp af11
Command |
Description |
Creates a class map to be used for matching packets to the class whose name you specify and enters class-map configuration mode. |
|
Creates or modifies a policy map that can be attached to multiple physical ports or SVIs and enters policy-map configuration mode. |
|
Displays QoS policy maps. |
|
Classifies IP traffic by setting a DSCP or an IP-precedence value in the packet. |
To create a class map to be used for matching packets to the class whose name you specify and to enter class-map configuration mode, use the class-map command in global configuration mode. Use the no form of this command to delete an existing class map and to return to global or policy map configuration mode.
class-map [ match-any | type ] class-map-name
no class-map [ match-any | type ] class-map-name
match-any |
(Optional) Perform a logical-OR of the matching statements under this class map. One or more criteria must be matched. |
type |
(Optional) Configures the CPL class map. |
class-map-name |
The class map name. |
No class maps are defined.
Global configuration
Policy map configuration
Cisco IOS XE 3.2SE |
This command was introduced. |
Cisco IOS XE 3.3SE |
The type keyword was added. |
Use this command to specify the name of the class for which you want to create or modify class-map match criteria and to enter class-map configuration mode.
The class-map command and its subcommands are used to define packet classification, marking, and aggregate policing as part of a globally named service policy applied on a per-port basis.
After you are in quality of service (QoS) class-map configuration mode, these configuration commands are available:
If you enter the match-any keyword, you can only use it to specify an extended named access control list (ACL) with the match access-group class-map configuration command.
To define packet classification on a physical-port basis, only one match command per class map is supported.
The ACL can have multiple access control entries (ACEs).
This example shows how to configure the class map called class1 with one match criterion, which is an access list called 103:
Controller(config)# access-list 103 permit ip any any dscp 10 Controller(config)# class-map class1 Controller(config-cmap)# match access-group 103 Controller(config-cmap)# exit
This example shows how to delete the class map class1:
Controller(config)# no class-map class1
You can verify your settings by entering the show class-map privileged EXEC command.
Command |
Description |
Creates or modifies a policy map that can be attached to multiple physical ports or SVIs and enters policy-map configuration mode. |
|
Displays QoS policy maps. |
To define the match criteria to classify traffic, use the match command in class-map configuration mode. Use the no form of this command to remove the match criteria.
match { access-group { nameacl-name | acl-index } | class-map class-map-name | cos cos-value | dscp dscp-value | [ ip ] dscp dscp-list | [ip] precedence ip-precedence-list | precedence precedence-value1...value4 | qos-group qos-group-value | vlan vlan-id }
no match { access-group { nameacl-name | acl-index } | class-map class-map-name | cos cos-value | dscp dscp-value | [ ip ] dscp dscp-list | [ip] precedence ip-precedence-list | precedence precedence-value1...value4 | qos-group qos-group-value | vlan vlan-id }
access-group |
Specifies an access group. |
name acl-name |
Specifies the name of an IP standard or extended access control list (ACL) or MAC ACL. |
acl-index |
Specifies the number of an IP standard or extended access control list (ACL) or MAC ACL. For an IP standard ACL, the ACL index range is 1 to 99 and 1300 to 1999. For an IP extended ACL, the ACL index range is 100 to 199 and 2000 to 2699. |
class-map class-map-name |
Uses a traffic class as a classification policy and specifies a traffic class name to use as the match criterion. |
cos cos-value |
Matches a packet on the basis of a Layer 2 class of service (CoS)/Inter-Switch Link (ISL) marking. The cos-value is from 0 to 7. You can specify up to four CoS values in one match cos statement, separated by a space. |
dscp dscp-value |
Specifies the parameters for each DSCP value. You can specify a value in the range 0 to 63 specifying the differentiated services code point value. |
ip dscp dscp-list |
Specifies a list of up to eight IP Differentiated Services Code Point (DSCP) values to match against incoming packets. Separate each value with a space. The range is 0 to 63. You also can enter a mnemonic name for a commonly used value. |
ip precedence ip-precedence-list |
Specifies a list of up to eight IP-precedence values to match against incoming packets. Separate each value with a space. The range is 0 to 7. You also can enter a mnemonic name for a commonly used value. |
precedence precedence-value1...value4 |
Assigns an IP precedence value to the classified traffic. The range is 0 to 7. You also can enter a mnemonic name for a commonly used value. |
qos-group qos-group-value |
Identifies a specific QoS group value as a match criterion. The range is 0 to 31. |
vlan vlan-id |
Identifies a specific VLAN as a match criterion. The range is 1 to 4095. |
No match criteria are defined.
Class-map configuration
Cisco IOS XE 3.2SE |
This command was introduced. |
Cisco IOS XE 3.3SE |
The class-map class-map-name, cos cos-value, qos-group qos-group-value, and vlan vlan-id keywords were added. |
The match command is used to specify which fields in the incoming packets are examined to classify the packets. Only the IP access group or the MAC access group matching to the Ether Type/Len are supported.
If you enter the class-map match-anyclass-map-name global configuration command, you can enter the following match commands:
Note |
The ACL must be an extended named ACL. |
The match access-group acl-index command is not supported.
To define packet classification on a physical-port basis, only one match command per class map is supported. In this situation, the match-any keyword is equivalent.
For the match ip dscp dscp-list or the match ip precedence ip-precedence-list command, you can enter a mnemonic name for a commonly used value. For example, you can enter the match ip dscp af11 command, which is the same as entering the match ip dscp 10 command. You can enter the match ip precedence critical command, which is the same as entering the match ip precedence 5 command. For a list of supported mnemonics, enter the match ip dscp ? or the match ip precedence ? command to see the command-line help strings.
Use the input-interface interface-id-list keyword when you are configuring an interface-level class map in a hierarchical policy map. For the interface-id-list, you can specify up to six entries.
This example shows how to create a class map called class2, which matches all the incoming traffic with DSCP values of 10, 11, and 12:
Controller(config)# class-map class2 Controller(config-cmap)# match ip dscp 10 11 12 Controller(config-cmap)# exit
This example shows how to create a class map called class3, which matches all the incoming traffic with IP-precedence values of 5, 6, and 7:
Controller(config)# class-map class3 Controller(config-cmap)# match ip precedence 5 6 7 Controller(config-cmap)# exit
This example shows how to delete the IP-precedence match criteria and to classify traffic using acl1:
Controller(config)# class-map class2 Controller(config-cmap)# match ip precedence 5 6 7 Controller(config-cmap)# no match ip precedence Controller(config-cmap)# match access-group acl1 Controller(config-cmap)# exit
This example shows how to specify a list of physical ports to which an interface-level class map in a hierarchical policy map applies:
Controller(config)# class-map match-any class4 Controller(config-cmap)# match cos 4 Controller(config-cmap)# exit
This example shows how to specify a range of physical ports to which an interface-level class map in a hierarchical policy map applies:
Controller(config)# class-map match-any class4 Controller(config-cmap)# match cos 4 Controller(config-cmap)# exit
You can verify your settings by entering the show class-map privileged EXEC command.
To match non-client NRT (non-real-time), use the match non-client-nrt command in class-map configuration mode. Use the no form of this command to return to the default setting.
match non-client-nrt
no match non-client-nrt
This command has no arguments or keywords.
None
Class-map
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
None
This example show how you can configure non-client NRT:
Controller(config)# class-map test_1000 Controller(config-cmap)# match non-client-nrt
To match 802.11 specific values, use the match wlan user-priority command in class-map configuration mode. Use the no form of this command to return to the default setting.
match wlan user-priority wlan-value [ wlan-value] [ wlan-value] [ wlan-value]
no match wlan user-priority wlan-value [ wlan-value] [ wlan-value] [ wlan-value]
wlan-value |
The 802.11-specific values. Enter the user priority 802.11 TID user priority (0-7). (Optional) Enter up to three user priority values separated by white-spaces. |
None
Class-map
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
None
This example show how you can configure user-priority values:
Controller(config)# class-map test_1000 Controller(config-cmap)# match wlan user-priority 7
To create or modify a policy map that can be attached to multiple physical ports or switch virtual interfaces (SVIs) and to enter policy-map configuration mode, use the policy-map command in global configuration mode. Use the no form of this command to delete an existing policy map and to return to global configuration mode.
policy-map policy-map-name
no policy-map policy-map-name
policy-map-name |
Name of the policy map. |
No policy maps are defined.
Global configuration
Cisco IOS XE 3.2SE |
This command was introduced. |
After entering the policy-map command, you enter policy-map configuration mode, and these configuration commands are available:
To return to global configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
Before configuring policies for classes whose match criteria are defined in a class map, use the policy-map command to specify the name of the policy map to be created, added to, or modified. Entering the policy-map command also enables the policy-map configuration mode in which you can configure or modify the class policies for that policy map.
You can configure class policies in a policy map only if the classes have match criteria defined for them. To configure the match criteria for a class, use the class-map global configuration and match class-map configuration commands. You define packet classification on a physical-port basis.
Only one policy map per ingress port is supported. You can apply the same policy map to multiple physical ports.
You can apply a nonhierarchical policy maps to physical ports. A nonhierarchical policy map is the same as the port-based policy maps in the controller.
A hierarchical policy map has two levels in the format of a parent-child policy. The parent policy cannot be modified but the child policy (port-child policy) can be modified to suit the QoS configuration.
In VLAN-based QoS, a service policy is applied to an SVI interface. All physical interfaces belonging to a VLAN policy map then need to be configured to refer to the VLAN-based policy maps instead of the port-based policy map.
Note |
Not all MQC QoS combinations are supported for wired and wireless ports. For information about these restrictions, see chapters "Restrictions for QoS on Wired Targets" and "Restrictions for QoS on Wireless Targets" in the QoS configuration guide. |
This example shows how to create a policy map called policy1. When attached to the ingress port, it matches all the incoming traffic defined in class1, sets the IP DSCP to 10, and polices the traffic at an average rate of 1 Mb/s and bursts at 20 KB. Traffic less than the profile is sent.
Controller(config)# policy-map policy1 Controller(config-pmap)# class class1 Controller(config-pmap-c)# set dscp 10 Controller(config-pmap-c)# police 1000000 20000 conform-action transmit Controller(config-pmap-c)# exit
This example show you how to configure hierarchical polices:
Switch# configure terminal Controller(config)# class-map c1 Controller(config-cmap)# exit Controller(config)# class-map c2 Controller(config-cmap)# exit Controller(config)# policy-map child Controller(config-pmap)# class c1 Controller(config-pmap-c)# priority level 1 Controller(config-pmap-c)# police rate percent 20 conform-action transmit exceed action drop Controller(config-pmap-c-police)# exit Controller(config-pmap-c)# exit Controller(config-pmap)# class c2 Controller(config-pmap-c)# bandwidth 20000 Controller(config-pmap-c)# exit Controller(config-pmap)# class class-default Controller(config-pmap-c)# bandwidth 20000 Controller(config-pmap-c)# exit Controller(config-pmap)# exit Controller(config)# policy-map parent Controller(config-pmap)# class class-default Controller(config-pmap-c)# shape average 1000000 Controller(config-pmap-c)# service-policy child Controllerconfig-pmap-c)# end
This example shows how to delete a policy map:
Controller(config)# no policy-map policymap2
You can verify your settings by entering the show policy-map privileged EXEC command.
Command |
Description |
Defines a traffic classification match criteria for the specified class-map name. |
|
Creates a class map to be used for matching packets to the class whose name you specify and enters class-map configuration mode. |
|
Applies a policy map to a physical port or an SVI. |
|
Displays QoS policy maps. |
To assign priority to a class of traffic belonging to a policy map, use the priority command in policy-map class configuration mode. To remove a previously specified priority for a class, use the no form of this command.
priority [ Kbps [ burst -in-bytes] | level level-value [ Kbps [ burst -in-bytes] ] | percent percentage [ Kb/s [ burst -in-bytes] ] ]
no priority [ Kb/s [ burst -in-bytes] | level level value [ Kb/s [ burst -in-bytes] ] | percent percentage [ Kb/s [ burst -in-bytes] ] ]
Kb/s | (Optional) Guaranteed allowed bandwidth, in kilobits per second (kbps), for the priority traffic. The amount of guaranteed bandwidth varies according to the interface and platform in use. Beyond the guaranteed bandwidth, the priority traffic will be dropped in the event of congestion to ensure that the nonpriority traffic is not starved. The value must be between 1 and 2,000,000 kbps. |
burst -in-bytes | (Optional) Burst size in bytes. The burst size configures the network to accommodate temporary bursts of traffic. The default burst value, which is computed as 200 milliseconds of traffic at the configured bandwidth rate, is used when the burst argument is not specified. The range of the burst is from 32 to 2000000 bytes. |
level level-value | (Optional) Assigns priority level. Available values for level-value are 1 and 2. Level 1 is a higher priority than Level 2. Level 1 reserves bandwidth and goes first, so latency is very low. Reserve the bandwidth even if you do not use it. Both levels 1 and 2 can reserve bandwidth. |
percent percentage | (Optional) Specifies the amount of guaranteed bandwidth to be specified by the percent of available bandwidth. |
No priority is set.
Policy-map class configuration
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
Cisco IOS XE 3.3SE |
The Kbps, burst -in-bytes, and percent percentage keywords were added. |
This command configures low latency queuing (LLQ), providing strict priority queuing (PQ) for class-based weighted fair queuing (CBWFQ). Strict PQ allows delay-sensitive data such as voice to be dequeued and sent before packets in other queues are dequeued.
The priority command allows you to set up classes based on a variety of criteria (not just User Datagram Ports [UDP] ports) and assign priority to them, and is available for use on serial interfaces and ATM permanent virtual circuits (PVCs). A similar command, the ip rtp priority command, allows you to stipulate priority flows based only on UDP port numbers and is not available for ATM PVCs.
When the device is not congested, the priority class traffic is allowed to exceed its allocated bandwidth. When the device is congested, the priority class traffic above the allocated bandwidth is discarded.
The bandwidth and priority commands cannot be used in the same class, within the same policy map. However, these commands can be used together in the same policy map.
Within a policy map, you can give one or more classes priority status. When multiple classes within a single policy map are configured as priority classes, all traffic from these classes is queued to the same, single, priority queue.
When the policy map containing class policy configurations is attached to the interface to stipulate the service policy for that interface, available bandwidth is assessed. If a policy map cannot be attached to a particular interface because of insufficient interface bandwidth, the policy is removed from all interfaces to which it was successfully attached.
The following example shows how to configure the priority of the class in policy map policy1:
Controller(config)# class-map cm1 Controller(config-cmap)#match precedence 2 Controller(config-cmap)#exit Controller(config)#class-map cm2 Controller(config-cmap)#match dscp 30 Controller(config-cmap)#exit Controller(config)# policy-map policy1 Controller(config-pmap)# class cm1 Controller(config-pmap-c)# priority level 1 Controller(config-pmap-c)# police 1m Controller(config-pmap-c-police)#exit Controller(config-pmap-c)#exit Controller(config-pmap)#exit Controller(config)#policy-map policy1 Controller(config-pmap)#class cm2 Controller(config-pmap-c)#priority level 2 Controller(config-pmap-c)#police 1m
To configure the queue buffer for the class, use the queue-buffers ratio command in policy-map class configuration mode. Use the no form of this command to remove the ratio limit.
queue-buffers ratio ratio limit
no queue-buffers ratio ratio limit
ratio limit | (Optional) Configures the queue buffer for the class. Enter the queue buffers ratio limit (0-100). |
No queue buffer for the class is defined.
Policy-map class configuration
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
Either the bandwidth, shape, or priority command must be used before using this command. For more information about these commands, see Cisco IOS Quality of Service Solutions Command Reference available on Cisco.com
The controller allows you to allocate buffers to queues. If buffers are not allocated, then they are divided equally amongst all queues. You can use the queue-buffer ratio to divide it in a particular ratio. The buffers are soft buffers because Dynamic Threshold and Scaling (DTS) is active on all queues by default.
Note |
The queue-buffer ratio is supported on both wired and wireless ports, but the queue-buffer ratio cannot be configured with a queue-limit. |
The following example sets the queue buffers ratio to 10 percent:
Controller(config)# policy-map policy_queuebuf01 Controller(config-pmap)# class-map class_queuebuf01 Controller(config-cmap)# exit Controller(config)# policy policy_queuebuf01 Controller(config-pmap)# class class_queuebuf01 Controller(config-pmap-c)# bandwidth percent 80 Controller(config-pmap-c)# queue-buffers ratio 10 Controller(config-pmap)# end
You can verify your settings by entering the show policy-map privileged EXEC command.
Command |
Description |
Displays QoS policy maps. |
To specify or modify the maximum number of packets the queue can hold for a class policy configured in a policy map, use the queue-limit policy-map class configuration command. To remove the queue packet limit from a class, use the no form of this command.
queue-limit queue-limit-size [ packets ] { cos cos-value | dscp dscp-value } percent percentage-of-packets
no queue-limit queue-limit-size [ packets ] { cos cos-value | dscp dscp-value } percent percentage-of-packets
queue-limit-size | The maximum size of the queue. The maximum varies according to the optional unit of measure keyword specified ( bytes, ms, us, or packets). |
cos cos-value | Specifies parameters for each cos value. CoS values are from 0 to 7. |
dscp dscp-value | Specifies parameters for each DSCP value. You can specify a value in the range 0 to 63 specifying the differentiated services code point value for the type of queue limit . |
percent percentage-of-packets | A percentage in the range 1 to 100 specifying the maximum percentage of packets that the queue for this class can accumulate. |
None
Policy-map class configuration
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
Although visible in the command line help-strings, the packets unit of measure is not supported; use the percent unit of measure.
Note |
This command is supported only on wired ports in the egress direction. |
Weighted fair queuing (WFQ) creates a queue for every class for which a class map is defined. Packets satisfying the match criteria for a class accumulate in the queue reserved for the class until they are sent, which occurs when the queue is serviced by the fair queuing process. When the maximum packet threshold you defined for the class is reached, queuing of any further packets to the class queue causes tail drop.
You use queue limits to configure Weighted Tail Drop (WTD). WTD ensures the configuration of more than one threshold per queue. Each class of service is dropped at a different threshold value to provide for QoS differentiation.
You can configure the maximum queue thresholds for the different subclasses of traffic, that is, DSCP and CoS and configure the maximum queue thresholds for each subclass.
The following example configures a policy map called port-queue to contain policy for a class called dscp-1. The policy for this class is set so that the queue reserved for it has a maximum packet limit of 20 percent:
Controller(config)# policy-map policy11 Controller(config-pmap)# class dscp-1 Controller(config-pmap-c)# bandwidth percent 20 Controller(config-pmap-c)# queue-limit dscp 1 percent 20
To configure the default trust behavior to untrust wireless packets, use the qos wireless-default untrust command. To configure the default trust behavior of wireless traffic to trust, use the no form of the command.
qos wireless-default-untrust
no qos wireless-default-untrust
This command has no arguments or keywords.
By default, the wireless traffic is untrusted.
To check the trust behavior on the controller, use the show running-config | sec qos or the show run | include untrust command.
Configuration
Release |
Modification |
---|---|
Cisco IOS XE 3.3SE |
This command was introduced. |
Note |
The default trust behavior of wireless traffic was untrusted in the Cisco IOS XE 3.2 SE release. |
Note |
If you upgrade from Cisco IOS XE 3.2 SE Release to a later release, the default behavior of the wireless traffic is still untrusted. In this situation, you can use the no qos wireless-default untrust command to enable trust behavior for wireless traffic. However, if you install Cisco IOS XE 3.3 SE or a later release on the controller, the default QoS behavior for wireless traffic is trust. Starting with Cisco IOS XE 3.3 SE Release and later, the packet markings are preserved in both egress and ingress directions for new installations (not upgrades) for wireless traffic. |
The Cisco IOS XE 3.2 Release supported different trust defaults for wired and wireless ports. The trust default for wired ports was the same as for this software release. For wireless ports, the default system behavior was non-trust, which meant that when the controller came up, all markings for the wireless ports were defaulted to zero and no traffic received priority treatment. For compatibility with an existing wired controller, all traffic went to the best-effort queue by default. The access point performed priority queuing by default. In the downstream direction, the access point maintained voice, video, best-effort, and background queues for queuing. The access selected the queuing strategy based on the 11e tag information. By default, the access point treated all wireless packets as best effort.
The following command changes the default behavior for trusting wireless traffic to untrust.
Controller(config)# qos wireless-default-untrust
To apply a policy map to a physical port or a switch virtual interface (SVI), use the service-policy command in interface configuration mode. Use the no form of this command to remove the policy map and port association.
service-policy { input | output} policy-map-name
no service-policy { input | output} policy-map-name
input policy-map-name |
Apply the specified policy map to the input of a physical port or an SVI. |
output policy-map-name |
Apply the specified policy map to the output of a physical port or an SVI. |
No policy maps are attached to the port.
WLAN interface configuration
Cisco IOS XE 3.2SE |
This command was introduced. |
A policy map is defined by the policy map command.
Only one policy map is supported per port, per direction. In other words, only one input policy and one output policy is allowed on any one port.
You can apply a policy map to incoming traffic on a physical port or on an SVI. QoS Configuration Guide (Cisco WLC 5700 Series).
Note |
Though visible in the command-line help strings, the history keyword is not supported, and you should ignore the statistics that it gathers. |
This example shows how to apply plcmap1 to an physical ingress port:
Controller(config)# interface gigabitethernet2/0/1 Controller(config-if)# service-policy input plcmap1
This example shows how to remove plcmap2 from a physical port:
Controller(config)# interface gigabitethernet2/0/2 Controller(config-if)# no service-policy input plcmap2
The following example displays a VLAN policer configuration. At the end of this configuration, the VLAN policy map is applied to an interface for QoS:
Controller# configure terminal Controller(config)# class-map vlan100 Controller(config-cmap)# match vlan 100 Controller(config-cmap)# exit Controller(config)# policy-map vlan100 Controller(config-pmap)# policy-map class vlan100 Controller(config-pmap-c)# police 100000 bc conform-action transmit exceed-action drop Controller(config-pmap-c-police)# end Controller# configure terminal Controller(config)# interface gigabitEthernet1/0/5 Controller(config-if)# service-policy input vlan100
You can verify your settings by entering the show running-config privileged EXEC command.
Command |
Description |
Creates or modifies a policy map that can be attached to multiple physical ports or SVIs and enters policy-map configuration mode. |
|
Displays QoS policy maps. |
To configure the WLAN quality of service (QoS) service policy, use the service-policy command. To disable a QoS policy on a WLAN, use the no form of this command.
service-policy [client] { input | output } policy-name
no service-policy [client] { input | output } policy-name
client | (Optional) Assigns a policy map to all clients in the WLAN. |
input | Assigns an input policy map. |
output | Assigns an output policy map. |
policy-name | The policy name. |
No policies are assigned and the state assigned to the policy is None.
WLAN configuration
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
You must disable the WLAN before using this command. See Related Commands section for more information on how to disable a WLAN.
This example shows how to configure the input QoS service policy on a WLAN:
Controller# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Controller(config)# wlan wlan1 Controller(config-wlan)# service-policy input policy-test
This example shows how to disable the input QoS service policy on a WLAN:
Controller# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Controller(config)# wlan wlan1 Controller(config-wlan)# no service-policy input policy-test
This example shows how to configure the output QoS service policy on a WLAN to platinum (precious metal policy):
Controller# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Controller(config)# wlan wlan1 Controller(config-wlan)# service-policy output platinum
Command |
Description |
Creates or disables a WLAN. |
To classify IP traffic by setting a Differentiated Services Code Point (DSCP) or an IP-precedence value in the packet, use the set command in policy-map class configuration mode. Use the no form of this command to remove traffic classification.
set cos | dscp | precedence | ip | qos-group | wlan
set cos { cos-value } | { cos | dscp | precedence | qos-group | wlan } [ table table-map-name ]
set dscp { dscp-value } | { cos | dscp | precedence | qos-group | wlan } [ table table-map-name ]
set ip { dscp | precedence }
set precedence { precedence-value } | { cos | dscp | precedence | qos-group } [ table table-map-name ]
set qos-group { qos-group-value | dscp [ table table-map-name ] | precedence [ table table-map-name ] }
set wlan user-priorityuser-priority-value | costable table-map-name | dscptable table-map-name | qos-grouptable table-map-name | wlantable table-map-name
No traffic classification is defined.
Policy-map class configuration
Cisco IOS XE 3.2SE |
This command was introduced. |
Cisco IOS XE 3.3SE |
The cos, dscp, qos-group, wlantable table-map-name, keywords were added. |
For the set dscp dscp-value command, the set cos cos-value command, and the set ip precedence precedence-value command, you can enter a mnemonic name for a commonly used value. For example, you can enter the set dscp af11 command, which is the same as entering the set dscp 10 command. You can enter the set ip precedence critical command, which is the same as entering the set ip precedence 5 command. For a list of supported mnemonics, enter the set dscp ? or the set ip precedence ? command to see the command-line help strings.
When you configure the set dscp coscommand, note the following: The CoS value is a 3-bit field, and the DSCP value is a 6-bit field. Only the three bits of the CoS field are used.
The set qos-group command cannot be applied until you create a service policy in policy-map configuration mode and then attach the service policy to an interface or ATM virtual circuit (VC).
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
This example shows how to assign DSCP 10 to all FTP traffic without any policers:
Controller(config)# policy-map policy_ftp Controller(config-pmap)# class-map ftp_class Controller(config-cmap)# exit Controller(config)# policy policy_ftp Controller(config-pmap)# class ftp_class Controller(config-pmap-c)# set dscp 10 Controller(config-pmap)# exit
You can verify your settings by entering the show policy-map privileged EXEC command.
Command |
Description |
Defines a traffic classification match criteria for the specified class-map name. |
|
Creates or modifies a policy map that can be attached to multiple physical ports or SVIs and enters policy-map configuration mode. |
|
Displays QoS policy maps. |
To display service-policy information for a specific Cisco lightweight access point, use the show ap name service-policy command.
show ap name ap-name service-policy
ap-name | Name of the Cisco lightweight access point. |
None
Any command mode
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
This example shows how to display service-policy information for a specific Cisco lightweight access point:
Controller# show ap name 3502b service-policy
NAME: Cisco AP , DESCR: Cisco Wireless Access Point
PID: 3502I , VID: V01, SN: FTX1525E94A
NAME: Dot11Radio0 , DESCR: 802.11N 2.4GHz Radio
PID: UNKNOWN, VID: , SN: FOC1522BLNA
NAME: Dot11Radio1 , DESCR: 802.11N 5GHz Radio
PID: UNKNOWN, VID: , SN: FOC1522BLNA
To display 802.11a or 802.11b configuration information that corresponds to specific Cisco lightweight access points, use the show ap name dot11 command.
show ap name ap-name dot11 { 24ghz | 5ghz } { ccx | cdp | profile | service-poicy output | stats | tsm { all | client-mac } }
ap-name | Name of the Cisco lightweight access point. |
24ghz | Displays the 2.4 GHz band. |
5ghz | Displays the 5 GHz band. |
ccx | Displays the Cisco Client eXtensions (CCX) radio management status information. |
cdp | Displays Cisco Discovery Protocol (CDP) information. |
profile | Displays configuration and statistics of 802.11 profiling. |
service-policy output | Displays downstream service policy information. |
stats | Displays Cisco lightweight access point statistics. |
tsm | Displays 802.11 traffic stream metrics statistics. |
all | Displays the list of all access points to which the client has associations. |
client-mac | MAC address of the client. |
None
Any command mode
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
This example shows how to display the service policy that is associated with the access point:
Controller# show ap name test-ap dot11 24ghz service-policy output
Policy Name : test-ap1
Policy State : Installed
This example shows how to display the CCX RRM 802.11 configuration for a specific access point:
Controller# show ap name AP01 dot11 24ghz ccx
This example show how to display CDP information for a specific access point:
Controller# show ap name AP01 dot11 24ghz cdp
AP Name AP CDP State
--------------------- --------------
AP03 Disabled
This example show how to display the configuration and statistics of 802.11b profiling for a specific access point:
Controller# show ap name AP01 dot11 24ghz profile
802.11b Cisco AP performance profile mode : GLOBAL
802.11b Cisco AP Interference threshold : 10 %
802.11b Cisco AP noise threshold : -70 dBm
802.11b Cisco AP RF utilization threshold : 80 %
802.11b Cisco AP throughput threshold : 1000000 bps
802.11b Cisco AP clients threshold : 12 clients
This example show how to display downstream service policy information for a specific access point:
Controller# show ap name AP01 dot11 24ghz service-policy output
Policy Name : def-11gn
Policy State : Installed
This example show how to display statistics for a specific access point:
Controller# show ap name AP01 dot11 24ghz stats
Number of Users................................: 0
TxFragmentCount................................: 0
MulticastTxFrameCnt............................: 0
FailedCount....................................: 0
RetryCount.....................................: 0
MultipleRetryCount.............................: 0
FrameDuplicateCount............................: 0
RtsSuccessCount................................: 0
RtsFailureCount................................: 0
AckFailureCount................................: 0
RxIncompleteFragment...........................: 0
MulticastRxFrameCnt............................: 0
FcsErrorCount..................................: 0
TxFrameCount...................................: 0
WepUndecryptableCount..........................: 0
TxFramesDropped................................: 0
Call Admission Control (CAC) Stats
Voice Bandwidth in use(% of config bw).........: 0
Video Bandwidth in use(% of config bw).........: 0
Total BW in use for Voice(%)...................: 0
Total BW in use for SIP Preferred call(%)......: 0
Load based Voice Call Stats
Total channel MT free..........................: 0
Total voice MT free............................: 0
Na Direct......................................: 0
Na Roam........................................: 0
WMM TSPEC CAC Call Stats
Total num of voice calls in progress...........: 0
Num of roaming voice calls in progress.........: 0
Total Num of voice calls since AP joined.......: 0
Total Num of roaming calls since AP joined.....: 0
Total Num of exp bw requests received..........: 0
Total Num of exp bw requests admitted..........: 0
Num of voice calls rejected since AP joined....: 0
Num of roam calls rejected since AP joined.....: 0
Num of calls rejected due to insufficent bw....: 0
Num of calls rejected due to invalid params....: 0
Num of calls rejected due to PHY rate..........: 0
Num of calls rejected due to QoS policy........: 0
SIP CAC Call Stats
Total Num of calls in progress.................: 0
Num of roaming calls in progress...............: 0
Total Num of calls since AP joined.............: 0
Total Num of roaming calls since AP joined.....: 0
Total Num of Preferred calls received..........: 0
Total Num of Preferred calls accepted..........: 0
Total Num of ongoing Preferred calls...........: 0
Total Num of calls rejected(Insuff BW).........: 0
Total Num of roam calls rejected(Insuff BW)....: 0
Band Select Stats
Num of dual band client .......................: 0
Num of dual band client added..................: 0
Num of dual band client expired ...............: 0
Num of dual band client replaced...............: 0
Num of dual band client detected ..............: 0
Num of suppressed client ......................: 0
Num of suppressed client expired...............: 0
Num of suppressed client replaced..............: 0
This example show how to display the traffic stream configuration for all clients that correspond to a specific access point:
Controller# show ap name AP01 dot11 24ghz tsm all
To display quality of service (QoS) class maps, which define the match criteria to classify traffic, use the show class-map command in EXEC mode.
show class-map [ class-map-name]
class-map-name |
(Optional) The class map name. |
User EXEC
Privileged EXEC
Cisco IOS XE 3.2SE |
This command was introduced. |
This is an example of output from the show class-map command:
Controller# show class-map
Class Map match-any videowizard_10-10-10-10 (id 2)
Match access-group name videowizard_10-10-10-10
Class Map match-any class-default (id 0)
Match any
Class Map match-any dscp5 (id 3)
Match ip dscp 5
Command |
Description |
Creates a class map to be used for matching packets to the class whose name you specify and enters class-map configuration mode. |
To display the total number of active or rejected calls on the controller, use the show wireless client calls command in privileged EXEC mode.
show wireless client calls { active | rejected}
active | Displays active calls. |
rejected | Displays rejected calls. |
No default behavior or values.
Privileged EXEC
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
The following is sample output from the show wireless client calls command:
controller# show wireless client calls active
TSPEC Calls:
----------------------------------------------------------------------------
MAC Address AP Name Status WLAN Authenticated
-----------------------------------------------------------------------------
0000.1515.000f AP-2 Associated 1 Yes
SIP Calls:
------------------
Number of Active TSPEC calls on 802.11a and 802.11b/g: 1
Number of Active SIP calls on 802.11a and 802.11b/g: 0
To display the total number of active or rejected calls for a specific band (2.4 Ghz or 5 Ghz), use the show wireless client dot11 command in privileged EXEC mode.
show wireless client dot11 { 24ghz | 5ghz} calls { active | rejected}
24ghz | Displays the 802.11b/g network. |
5ghz | Displays the 802.11a network. |
calls | Displays the wireless client calls. |
active | Displays active calls. |
rejected | Displays rejected calls. |
No default behavior or values.
Privileged EXEC
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
The following is sample output from the show wireless client dot11 command:
Controller# show wireless client dot11 5ghz calls active
TSPEC Calls:
------------------
SIP Calls:
------------------
Number of Active TSPEC calls on 802.11a: 0
Number of Active SIP calls on 802.11a: 0
To view call control information related to clients, use the show wireless client mac-address command in privileged EXEC mode.
show wireless client mac-address mac-address call-control call-info
mac-address | The client MAC address. |
call-control call-info | Displays the call control and IP-related information about a client. |
None
Privileged EXEC
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
This example shows how to display call control and IP-related information about a client:
Controller# show wireless client mac-address 30e4.db41.6157 call-control call-info
Client MAC Address : 30E4DB416157
Call 1 Statistics
Uplink IP Address : 209.165.200.225
Downlink IP Address : 209.165.200.226
Uplink Port : 29052
Downlink Port : 27538
Call ID : c40acb4d-3b3b0.3d27da1e-356bed03
Called Party : sip:1011
Calling Party : sip:1012
Priority : 6
Call On Hold : false
Call Duration : 30
Call 2 Statistics
No Active Call
To view information about TCLAS and user priority, use the show wireless client mac-address command in privileged EXEC mode.
show wireless client mac-address mac-address tclas
mac-address | The client MAC address. |
tclas | Displays TCLAS and user priority-related information about a client. |
Privileged EXEC
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
This example shows how to display the TCLAS and user priority-related information about a client:
Controller# show wireless client mac-address 30e4.db41.6157 tclas
MAC Address UP TID Mask Source IP Addr Dest IP Addr SrcPort DstPort Proto
----------------------------------------------------------------------------------
30e4.db41.6157 4 4 95 167838052 2164326668 5060 5060 6
30e4.db41.6157 6 1 31 0 2164326668 0 27538 17
To display wireless client voice diagnostic parameters, use the show wireless client voice diagnostics command in privileged EXEC mode.
show wireless client voice diagnostics { qos-map | roam-history | rssi | status | tspec}
qos-map | Displays information about the QoS and DSCP mapping and packet statistics in each of the four queues: VO, VI, BE, BK. The different DSCP values are also displayed. |
roam-history | Displays information about the last 3 roaming histories for each known client. The output contains the timestamp, access point associated with roaming, roaming reason, and if there is a roaming failure, a reason for the roaming failure. |
rssi | Displays the client's RSSI values in the last 5 seconds when voice diagnostics are enabled. |
status | Displays status of voice diagnostics for clients. |
tspec | Displays voice diagnostics that are enabled for TSPEC clients. |
No default behavior or values.
Privileged EXEC
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
Debug voice diagnostics must be enabled for voice diagnostics to work.
The following is sample output from the show wireless client voice diagnostics status command:
Controller# show wireless client voice diagnostics status
Voice Diagnostics Status: FALSE
To display quality of service (QoS) policy maps, which define classification criteria for incoming traffic, use the show policy-map command in EXEC mode.
show policy-map [ policy-map-name | interface interface-id ]
policy-map-name |
(Optional) Name of the policy-map. |
interface interface-id |
(Optional) Identifies the interface. |
User EXEC
Privileged EXEC
Cisco IOS XE 3.2SE |
This command was introduced. |
Cisco IOS XE 3.3SE |
The interface interface-id keyword was added. |
Policy maps can include policers that specify the bandwidth limitations and the action to take if the limits are exceeded.
This is an example of output from the show policy-map interface command, where classification counters are displayed:
Controller# show policy-map interface gigabitethernet1/0/1
GigabitEthernet1/0/1
Service-policy input: AutoQos-4.0-CiscoPhone-Input-Policy
Class-map: AutoQos-4.0-Voip-Data-CiscoPhone-Class (match-any)
0 packets
Match: cos 5
0 packets, 0 bytes
5 minute rate 0 bps
QoS Set
dscp ef
police:
cir 128000 bps, bc 8000 bytes
conformed 0 bytes; actions:
transmit
exceeded 0 bytes; actions:
set-dscp-transmit dscp table policed-dscp
conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Voip-Signal-CiscoPhone-Class (match-any)
0 packets
Match: cos 3
0 packets, 0 bytes
5 minute rate 0 bps
QoS Set
dscp cs3
police:
cir 32000 bps, bc 8000 bytes
conformed 0 bytes; actions:
transmit
exceeded 0 bytes; actions:
set-dscp-transmit dscp table policed-dscp
conformed 0000 bps, exceed 0000 bps
Class-map: AutoQos-4.0-Default-Class (match-any)
0 packets
Match: access-group name AutoQos-4.0-Acl-Default
0 packets, 0 bytes
5 minute rate 0 bps
QoS Set
dscp default
Class-map: class-default (match-any)
0 packets
Match: any
0 packets, 0 bytes
5 minute rate 0 bps
Service-policy output: AutoQos-4.0-Output-Policy
queue stats for all priority classes:
Queueing
priority level 1
(total drops) 0
(bytes output) 0
Class-map: AutoQos-4.0-Output-Priority-Queue (match-any)
0 packets
Match: dscp cs4 (32) cs5 (40) ef (46)
0 packets, 0 bytes
5 minute rate 0 bps
Match: cos 5
0 packets, 0 bytes
5 minute rate 0 bps
Priority: 30% (300000 kbps), burst bytes 7500000,
Priority Level: 1
Class-map: AutoQos-4.0-Output-Control-Mgmt-Queue (match-any)
0 packets
Match: dscp cs2 (16) cs3 (24) cs6 (48) cs7 (56)
0 packets, 0 bytes
5 minute rate 0 bps
Match: cos 3
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
queue-limit dscp 16 percent 80
queue-limit dscp 24 percent 90
queue-limit dscp 48 percent 100
queue-limit dscp 56 percent 100
(total drops) 0
(bytes output) 0
bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Conf-Queue (match-any)
0 packets
Match: dscp af41 (34) af42 (36) af43 (38)
0 packets, 0 bytes
5 minute rate 0 bps
Match: cos 4
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
(total drops) 0
(bytes output) 0
bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Trans-Data-Queue (match-any)
0 packets
Match: dscp af21 (18) af22 (20) af23 (22)
0 packets, 0 bytes
5 minute rate 0 bps
Match: cos 2
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
(total drops) 0
(bytes output) 0
bandwidth remaining 10%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Bulk-Data-Queue (match-any)
0 packets
Match: dscp af11 (10) af12 (12) af13 (14)
0 packets, 0 bytes
5 minute rate 0 bps
Match: cos 1
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
(total drops) 0
(bytes output) 0
bandwidth remaining 4%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Scavenger-Queue (match-any)
0 packets
Match: dscp cs1 (8)
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
(total drops) 0
(bytes output) 0
bandwidth remaining 1%
queue-buffers ratio 10
Class-map: AutoQos-4.0-Output-Multimedia-Strm-Queue (match-any)
0 packets
Match: dscp af31 (26) af32 (28) af33 (30)
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
(total drops) 0
(bytes output) 0
bandwidth remaining 10%
queue-buffers ratio 10
Class-map: class-default (match-any)
0 packets
Match: any
0 packets, 0 bytes
5 minute rate 0 bps
Queueing
(total drops) 0
(bytes output) 0
bandwidth remaining 25%
queue-buffers ratio 25
Command |
Description |
Creates or modifies a policy map that can be attached to multiple physical ports or SVIs and enters policy-map configuration mode. |
To view WLAN parameters, use the show wlan command.
show wlan { all | id wlan-id | name wlan-name | summary }
all | Displays a summary of parameters of all configured WLANs. The list is ordered by the ascending order of the WLAN IDs. |
id wlan-id | Specifies the wireless LAN identifier. The range is from 1 to 512. |
name wlan-name | Specifies the WLAN profile name. The name is from 1 to 32 characters. |
summary | Displays a summary of the parameters configured on a WLAN. |
None
Global configuration
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
This example shows how to display a summary of the WLANs configured on the device:
Controller# show wlan summary
Number of WLANs: 1
WLAN Profile Name SSID VLAN Status
--------------------------------------------------------------------------------
45 test-wlan test-wlan-ssid 1 UP
This example shows how to display a summary of parameters configured on a particular WLAN:
Controller# show wlan name test-wlan
WLAN Identifier : 45
Profile Name : test-wlan
Network Name (SSID) : test-wlan-ssid
Status : Enabled
Broadcast SSID : Enabled
Maximum number of Associated Clients : 0
AAA Policy Override : Disabled
Network Admission Control
NAC-State : Disabled
Number of Active Clients : 0
Exclusionlist Timeout : 60
Session Timeout : 1800 seconds
CHD per WLAN : Enabled
Webauth DHCP exclusion : Disabled
Interface : default
Interface Status : Up
Multicast Interface : test
WLAN IPv4 ACL : test
WLAN IPv6 ACL : unconfigured
DHCP Server : Default
DHCP Address Assignment Required : Disabled
DHCP Option 82 : Disabled
DHCP Option 82 Format : ap-mac
DHCP Option 82 Ascii Mode : Disabled
DHCP Option 82 Rid Mode : Disabled
QoS Service Policy - Input
Policy Name : unknown
Policy State : None
QoS Service Policy - Output
Policy Name : unknown
Policy State : None
QoS Client Service Policy
Input Policy Name : unknown
Output Policy Name : unknown
WifiDirect : Disabled
WMM : Disabled
Channel Scan Defer Priority:
Priority (default) : 4
Priority (default) : 5
Priority (default) : 6
Scan Defer Time (msecs) : 100
Media Stream Multicast-direct : Disabled
CCX - AironetIe Support : Enabled
CCX - Gratuitous ProbeResponse (GPR) : Disabled
CCX - Diagnostics Channel Capability : Disabled
Dot11-Phone Mode (7920) : Invalid
Wired Protocol : None
Peer-to-Peer Blocking Action : Disabled
Radio Policy : All
DTIM period for 802.11a radio : 1
DTIM period for 802.11b radio : 1
Local EAP Authentication : Disabled
Mac Filter Authorization list name : Disabled
Accounting list name : Disabled
802.1x authentication list name : Disabled
Security
802.11 Authentication : Open System
Static WEP Keys : Disabled
802.1X : Disabled
Wi-Fi Protected Access (WPA/WPA2) : Enabled
WPA (SSN IE) : Disabled
WPA2 (RSN IE) : Enabled
TKIP Cipher : Disabled
AES Cipher : Enabled
Auth Key Management
802.1x : Enabled
PSK : Disabled
CCKM : Disabled
IP Security : Disabled
IP Security Passthru : Disabled
L2TP : Disabled
Web Based Authentication : Disabled
Conditional Web Redirect : Disabled
Splash-Page Web Redirect : Disabled
Auto Anchor : Disabled
Sticky Anchoring : Enabled
Cranite Passthru : Disabled
Fortress Passthru : Disabled
PPTP : Disabled
Infrastructure MFP protection : Enabled
Client MFP : Optional
Webauth On-mac-filter Failure : Disabled
Webauth Authentication List Name : Disabled
Webauth Parameter Map : Disabled
Tkip MIC Countermeasure Hold-down Timer : 60
Call Snooping : Disabled
Passive Client : Disabled
Non Cisco WGB : Disabled
Band Select : Disabled
Load Balancing : Disabled
IP Source Guard : Disabled
Netflow Monitor : test
Direction : Input
Traffic : Datalink
Mobility Anchor List
IP Address
-----------
To configure trust for supported devices connected to an interface, use the trust device command in interface configuration mode. Use the no form of this command to disable trust for the connected device.
trust device { cisco-phone | cts | ip-camera | media-player}
no trust device { cisco-phone | cts | ip-camera | media-player}
cisco-phone | Configures a Cisco IP phone |
cts | Configures a Cisco TelePresence System |
ip-camera | Configures an IP Video Surveillance Camera (IPVSC) |
media-player | Configures a Cisco Digital Media Player (DMP) |
Trust disabled
Interface configuration
Release | Modification |
---|---|
Cisco IOS XE 3.2SE |
This command was introduced. |
Use the trust device command on the following types of interfaces:
The following example configures trust for a Cisco IP phone in Interface GigabitEthernet 1/0/1:
Controller(config)# interface GigabitEthernet1/0/1 Controller(config-if)# trust device cisco-phone
You can verify your settings by entering the show interface status privileged EXEC command.