O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The ingress policy

The ingress policy is created to classify traffic depending upon the known parameters at the edge devices. In the example, we create access lists to match traffic based on IP addresses of business-critical servers, and access lists to classify voice traffic based on UDP traffic from any address to the IP address range used within the organization.

These access lists are then called within the class maps, which are referred to within the policy map to set the DSCP values. The following configuration shows the creation of ACLs and class maps:

Figure 21: Configuration for classifying packets

The configuration for building a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required