<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring DiffServ on the SecureStacks/D-Series in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/configuring-diffserv-on-the-securestacks-d-series/m-p/50997#M691</link>
    <description>Article ID: 5848 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack B3&lt;BR /&gt;
SecureStack B2&lt;BR /&gt;
SecureStack A2&lt;BR /&gt;
D-Series &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Configure DiffServ&lt;BR /&gt;
Sample configuration &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
'set diffserv' &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
The SecureStack A2 supports DiffServ (the 'set diffserv' command set), but not Policy (the 'set policy' command set). &lt;BR /&gt;
The SecureStack B2 &amp;amp; B3 support DiffServ by default, as long as Policy licensing (&lt;A href="http://bit.ly/Ig6wNS" target="_blank" rel="nofollow noreferrer noopener"&gt;5781&lt;/A&gt;) has not been applied. &lt;BR /&gt;
The D-Series supports DiffServ by default, as long as Policy licensing (&lt;A href="http://bit.ly/1bQrXRb" target="_blank" rel="nofollow noreferrer noopener"&gt;10791&lt;/A&gt;) has not been applied. &lt;BR /&gt;
&lt;BR /&gt;
This article explains the subset of what may be accomplished using DiffServ functionality rather than the more full-featured Policy (including DSCP manipulation) functionality, and also provides detailed configuration guidance. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Differentiated Services configuration permits the user to classify incoming traffic (VLAN-tagged or not), and then either drop it or forward it. Forwarded traffic may optionally have an Inbound Rate Limiter (within the range of 1 Kbps through line speed) applied, and/or the traffic may optionally be "marked" with a value written to the first 3 (Precedence) bits of the TOS byte or to the first 6 (DSCP) bits of the TOS byte. &lt;BR /&gt;
&lt;BR /&gt;
It is possible to assign an 802.1p Priority or an 802.1Q VLAN using Policy, but not using DiffServ. &lt;BR /&gt;
&lt;BR /&gt;
For Layer 2 (switching) purposes, DiffServ can be effective for dropping or rate limiting inbound traffic. &lt;BR /&gt;
For Layer 3 (routing) purposes, DiffServ can be effective for setting the routing precedence to be used during periods of network congestion. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Note:&lt;/B&gt; If DiffServ is used to mark the DSCP value of a frame based on a keyword of "ef" or a value of 46 (with either of these yielding L3 Express Forwarding), as a side-function the outgoing L2 frame will be placed into the highest priority hardware queue (Queue 5) for transmission (&lt;A href="http://bit.ly/1aWrewD" target="_blank" rel="nofollow noreferrer noopener"&gt;5859&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
It is advisable that you review the background information contained in &lt;A href="http://bit.ly/1rOVKny" target="_blank" rel="nofollow noreferrer noopener"&gt;5811&lt;/A&gt; before proceeding with the remainder of this document. &lt;BR /&gt;
Also, please review the DiffServ guidelines and limitations contained in the latest non-patch &lt;A href="https://extranet.enterasys.com/downloads/" target="_blank" rel="nofollow noreferrer noopener"&gt;firmware release notes&lt;/A&gt; associated with your firmware version. &lt;BR /&gt;
&lt;BR /&gt;
&lt;U&gt;DiffServ configuration commands&lt;/U&gt;&lt;BR /&gt;
 set diffserv&lt;BR /&gt;
 &lt;BR /&gt;
   adminmode              Configure the DiffServ Admin mode.&lt;BR /&gt;
     enable                 Enable the DiffServ Admin mode.&lt;BR /&gt;
     disable                Disable the DiffServ Admin mode.&lt;BR /&gt;
 &lt;BR /&gt;
   class                  Configure a DiffServ Class to trigger a DiffServ Policy.&lt;BR /&gt;
     create                 Create a DiffServ collection of classification rules.&lt;BR /&gt;
       all                  All match conditions must be met, to trigger the Policy.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * New Class name, up to 31 alphanumeric characters&lt;BR /&gt;
     delete                 Delete a DiffServ collection of classification rules.&lt;BR /&gt;
       &lt;CLASSNAME&gt;          * Existing Class to be deleted&lt;BR /&gt;
     match                  Add a classification rule to a DiffServ Class.&lt;BR /&gt;
       dstip                Match to this Destination IP Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;I&gt;         * IP Address (example: 10.20.30.40)&lt;BR /&gt;
             &lt;I&gt;       * IP subnet bitmask (example: 255.255.255.0)&lt;BR /&gt;
       dstl4port            Match to this Destination Layer 4 Port value.&lt;BR /&gt;
         keyword            Match based on a Destination Layer 4 Port Keyword.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
                   * One of -&amp;gt; domain / echo / ftp / ftpdata / http /&lt;BR /&gt;
                                        smtp / snmp / telnet / tftp / www&lt;BR /&gt;
         number             Match based on a Destination Layer 4 Port Number value.&lt;BR /&gt;
           &lt;L4PORTNUMBER&gt;   * L4 port number within the range 0-65535&lt;BR /&gt;
       dstmac               Match to this Destination MAC Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;MACADDR&gt;        * MAC Address (example: 00-00-01-02-03-ab)&lt;BR /&gt;
             &lt;MACMASK&gt;      * MAC address bitmask (example: ff-ff-ff-00-00-00)&lt;BR /&gt;
       every                Match to all untagged packets regardless of attributes.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
       ipdscp               Match to this DSCP value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;DSCPVAL&gt;        * One of -&amp;gt; DSCP value within the range 0-63 -or-&lt;BR /&gt;
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be&lt;BR /&gt;
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef&lt;BR /&gt;
       ipprecedence         Match to this IP Precedence (first 3 bits of TOS) value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
                   * IP Precedence value within the range 0-7&lt;BR /&gt;
       iptos                Match to this IP TOS (all 8 bits of TOS) value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;TOSBITS&gt;        * TOS bits value within the range 00-ff&lt;BR /&gt;
             &lt;TOSMASK&gt;      * TOS bitmask value within the range 00-ff&lt;BR /&gt;
       protocol             Match to this IP Protocol.&lt;BR /&gt;
         keyword            Match based on a IP Protocol Keyword.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
               * One of -&amp;gt; icmp / igmp / ip / tcp / udp&lt;BR /&gt;
         number             Match based on an IP Protocol value.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
               * IP Protocol value within the range 0-255&lt;BR /&gt;
       refclass             Add or remove the match rules referenced by this Class.&lt;BR /&gt;
         add                Add a set of match conditions.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which the rules should be added&lt;BR /&gt;
             &lt;REFCLASSNAME&gt; * Existing Class to be used as the rule source&lt;BR /&gt;
         remove             Remove a set of match conditions.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class from which the rules should be removed&lt;BR /&gt;
             &lt;REFCLASSNAME&gt; * Existing Class to be used as the rule template&lt;BR /&gt;
       srcip                Match to this Source IP Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;I&gt;         * IP Address (example: 10.20.30.40)&lt;BR /&gt;
             &lt;I&gt;       * IP subnet bitmask (example: 255.255.255.0)&lt;BR /&gt;
       srcl4port            Match to this Source Layer 4 Port.&lt;BR /&gt;
         keyword            Match based on a Source Layer 4 Port Keyword.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
                   * One of -&amp;gt; domain / echo / ftp / ftpdata / http /&lt;BR /&gt;
                                        smtp / snmp / telnet / tftp / www&lt;BR /&gt;
         number             Match based on a Destination Layer 4 Port Number value.&lt;BR /&gt;
           &lt;L4PORTNUMBER&gt;   * L4 port number within the range 0-65535&lt;BR /&gt;
       srcmac               Match to this Source MAC Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;MACADDR&gt;        * MAC Address (example: 00-00-01-02-03-ab)&lt;BR /&gt;
             &lt;MACMASK&gt;      * MAC address bitmask (example: ff-ff-ff-00-00-00)&lt;BR /&gt;
       vlan                 Match to this assigned VLAN ID value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;VLANID&gt;         * VLAN ID within the range 1-4093&lt;BR /&gt;
 &lt;BR /&gt;
   rename                 Rename a DiffServ Class.&lt;BR /&gt;
     &lt;OL&gt;         * Existing Class name to be renamed 
       &lt;NEWCLASSNAME&gt;       * New Class name, up to 31 alphanumeric characters 
  
   policy                 Configure a DiffServ Policy to perform an action. 
     class                  Add or remove a member Class to/from a Policy. 
       add                  Add a class instance to a Policy. 
                * Existing Policy to which this Class should be added 
           &lt;CLASSNAME&gt;      * Existing Class to be added to the Policy 
       remove               Remove a class instance from the Policy. 
                * Existing Policy from which this Class should be removed 
           &lt;CLASSNAME&gt;      * Existing Class to be removed from the Policy 
     create                 Create a DiffServ Policy. 
                * New Policy name, up to 31 alphanumeric characters 
         in                 Only Ingress policies are supported. 
     delete                 Delete a DiffServ Policy. 
                * Existing Policy to be deleted 
     mark                   Configure a Marking action in the absence of Policing. 
       ipdscp               Rewrite this IP DSCP (TOS bits 0x'11111100') value. 
                * Existing Policy to utilize the Mark action 
           &lt;CLASSNAME&gt;      * Existing embedded Class to trigger the Mark action 
             &lt;DSCPVAL&gt;      * One of -&amp;gt; DSCP value within the range 0-63 -or- 
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be 
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef 
       ipprecedence         Rewrite this IP Precedence (TOS bits 0x'11100000') value. 
                * Existing Policy to utilize the Mark action 
           &lt;CLASSNAME&gt;      * Existing embedded Class to trigger the Mark action 
                   * IP precedence value within the range 0-7 
     police                 Configure a Policing Action or Style. 
       action               Configure a Policing Action. 
         conform            Specify an action taken on rule-conforming traffic. 
           drop             Conforming traffic should be dropped. 
                * Existing Policy to utilize the Drop action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Drop action 
           send             Conforming traffic should be forwarded. 
                * Existing Policy to utilize the Forward action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Forward action 
           markdscp         Rewrite this IP DSCP (TOS bits 0x'11111100') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                 &lt;DSCPVAL&gt;  * One of -&amp;gt; DSCP value within the range 0-63 -or- 
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be 
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef 
           markprec         Rewrite this IP Precedence (TOS bits 0x'11100000') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                   * IP precedence value within the range 0-7 
         nonconform         Specify an action taken on rule-nonconforming traffic. 
           drop             Conforming traffic should be dropped. 
                * Existing Policy to utilize the Drop action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Drop action 
           send             Conforming traffic should be forwarded. 
                * Existing Policy to utilize the Forward action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Forward action 
           markdscp         Rewrite this IP DSCP (TOS bits 0x'11111100') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                 &lt;DSCPVAL&gt;  * One of -&amp;gt; DSCP value within the range 0-63 -or- 
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be 
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef 
           markprec         Rewrite this IP Precedence (TOS bits 0x'11100000') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                   * IP precedence value within the range 0-7 
       style                Configure a Policing Style for limiting forwarded traffic. 
         simple             Only simple policing is supported. 
                * Existing Policy to utilize the Rate Limiting action 
             &lt;CLASSNAME&gt;    * Existing embedded Class to trigger the Rate Limiting 
               &lt;RATELIMIT&gt;  * Rate limit within the range 1-4294967295 Kbits/s 
                &lt;B&gt; * Maximum burst size within the range 1-128 KBytes 
     rename                 Rename a DiffServ Policy. 
       [list=1]      * Existing Policy name to be renamed 
         &lt;NEWPOLICYNAME&gt;    * New Policy name, up to 31 alphanumeric characters 
  
   service                Configure a DiffServ Service to tie a Policy to a Port. 
     add                    Add a Policy to a Port. 
       in                   Only Ingress policies are supported. 
               * Port(s) which should receive this Policy (ex. ge.1.1-2) 
                * Existing Policy to be added to the port(s) 
     remove                 Remove a Policy from a Port. 
       in                   Only Ingress policies are supported. 
               * Port(s) which should lose this policy (ex. ge.1.1-2) 
                * Existing Policy to be removed from the port(s) 
 To display diffserv configuration results, here are some useful commands: 
 show diffserv class detailed &lt;CLASSNAME&gt; 
 show diffserv policy detailed  
 show diffserv service info detailed  in 
 To delete DiffServ configurations, remove in order: service commands, policy commands, and classcommands; then globally disable DiffServ to restore the default condition: 
 set diffserv service remove in   
 set diffserv policy delete  
 set diffserv class delete &lt;CLASSNAME&gt; 
 set diffserv adminmode disable 
 show config diffserv 
 &lt;U&gt;DiffServ configuration examples&lt;/U&gt;  
 
When using the diffserv command set; one would generally enable DiffServ, create a Class, create one or more classification rules within the Class, create a Policy, add one or more Classes to it, add Policing (Conforming/Non-conforming, Drop/Forward, Rate Limit, Precedence/DSCP Rewrite) styles &amp;amp; actions (both or neither) or just Marking (Precedence/DSCP Rewrite) actions to the Policy, and then assign the Policy to one or more ports.  
 
This example creates two separate policies:[list=1] 
&lt;LI&gt;'policyef' rate-limits ingressed traffic on port fe.1.1 to a maximum of 100Mb/s, and on the same traffic also rewrites the six DSCP bits to a decimal value of 46 for Express Forwarding on layer 3. 
&lt;/LI&gt;&lt;LI&gt;'policyaf31' rate-limits ingressed traffic on port fe.1.2 to a maximum of 100Mb/s, and on the same traffic also rewrites the six DSCP bits to a decimal value of 26 for Flash forwarding on layer 3.&lt;/LI&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/NEWPOLICYNAME&gt;&lt;/B&gt;&lt;/RATELIMIT&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/NEWCLASSNAME&gt;&lt;/OL&gt; #diffserv&lt;BR /&gt;
 set diffserv adminmode enable&lt;BR /&gt;
 set diffserv class create all classevery&lt;BR /&gt;
 set diffserv class match every classevery&lt;BR /&gt;
 set diffserv policy create policyef in&lt;BR /&gt;
 set diffserv policy class add policyef classevery&lt;BR /&gt;
 set diffserv policy police style simple policyef classevery 100000 128&lt;BR /&gt;
 set diffserv policy police action conform markdscp policyef classevery ef&lt;BR /&gt;
 set diffserv policy create policyaf31 in&lt;BR /&gt;
 set diffserv policy class add policyaf31 classevery&lt;BR /&gt;
 set diffserv policy police style simple policyaf31 classevery 100000 128&lt;BR /&gt;
 set diffserv policy police action conform markdscp policyaf31 classevery af31&lt;BR /&gt;
 set diffserv service add in fe.1.1 policyef&lt;BR /&gt;
 set diffserv service add in fe.1.2 policyaf31&lt;BR /&gt;
 This example creates one policy which identifies VOIP traffic (DSCP value 46 or 32) on ports ge.1.1 through ge.1.10, and drops all other traffic.&lt;BR /&gt;
 #diffserv&lt;BR /&gt;
 set diffserv adminmode enable&lt;BR /&gt;
 set diffserv class create all classVOIP&lt;BR /&gt;
 set diffserv class match ipdscp classVOIP ef&lt;BR /&gt;
 set diffserv class match ipdscp classVOIP cs4&lt;BR /&gt;
 set diffserv policy create policyQOS in&lt;BR /&gt;
 set diffserv policy class add policyQOS classVOIP&lt;BR /&gt;
 set diffserv policy police style simple policyQOS classVOIP 1000000 128&lt;BR /&gt;
 set diffserv policy police action nonconform drop policyQOS classVOIP&lt;BR /&gt;
 set diffserv service add in ge.1.1-10 policyQOS&lt;BR /&gt;
 This example creates one policy which identifies VOIP traffic (TOS value b8) on port fe.1.32, and overwrites the six DSCP bits to their pre-existing value, incidentally placing the packet into the high priority transmit queue as described at the top of this document.&lt;BR /&gt;
 #diffserv&lt;BR /&gt;
 set diffserv adminmode enable &lt;BR /&gt;
 set diffserv class create all classVoice &lt;BR /&gt;
 set diffserv class match iptos classVoice b8 ff&lt;BR /&gt;
 set diffserv policy create policyPhones in &lt;BR /&gt;
 set diffserv policy class add policyPhones classVoice &lt;BR /&gt;
 set diffserv policy mark ipdscp policyPhones classVoice ef &lt;BR /&gt;
 set diffserv service add in fe.1.32 policyPhones&lt;BR /&gt;
 This example creates one policy which identifies ICMP (PING) traffic, denying it when sourced from any user plugged into port ge.1.5.&lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all classICMP&lt;BR /&gt;
set diffserv class match protocol keyword classICMP icmp&lt;BR /&gt;
set diffserv policy create policyDropICMP in&lt;BR /&gt;
set diffserv policy class add policyDropICMP classICMP&lt;BR /&gt;
set diffserv policy police style simple policyDropICMP classICMP 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyDropICMP classICMP&lt;BR /&gt;
set diffserv service add in ge.1.5 policyDropICMP&lt;BR /&gt;
 This example creates one policy which identifies traffic sourced from the 10.16.17.0/24 subnet, denying it on all ports. It was developed to serve as a form of Layer2 ACL (an A2 feature which does not support subnet masking).&lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all class17dot0&lt;BR /&gt;
set diffserv class match srcip class17dot0 10.16.17.0 255.255.255.0&lt;BR /&gt;
set diffserv policy create policyDrop17dot0 in&lt;BR /&gt;
set diffserv policy class add policyDrop17dot0 class17dot0&lt;BR /&gt;
set diffserv policy police style simple policyDrop17dot0 class17dot0 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyDrop17dot0 class17dot0&lt;BR /&gt;
set diffserv service add in fe.1.1-24 policyDrop17dot0&lt;BR /&gt;
 This example is an elaboration of the previous one (Layer2 ACL), creating one policy which identifies traffic sourced from IP 10.10.2.49 or 10.10.2.177, denying it on all ports. It demonstrates the use of more than one class per policy. Though not true here, each class may optionally invoke a unique action.&lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all classIP49&lt;BR /&gt;
set diffserv class match srcip classIP49 10.10.2.49 255.255.255.255&lt;BR /&gt;
set diffserv class create all classIP177&lt;BR /&gt;
set diffserv class match srcip classIP177 10.10.2.177 255.255.255.255&lt;BR /&gt;
set diffserv policy create policyAccessACL in&lt;BR /&gt;
set diffserv policy class add policyAccessACL classIP49&lt;BR /&gt;
set diffserv policy class add policyAccessACL classIP177&lt;BR /&gt;
set diffserv policy police style simple policyAccessACL classIP49 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyAccessACL classIP49&lt;BR /&gt;
set diffserv policy police style simple policyAccessACL classIP177 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyAccessACL classIP177&lt;BR /&gt;
set diffserv service add in fe.1.1-24 policyAccessACL&lt;BR /&gt;
 See also: &lt;A href="http://bit.ly/1aWoGyG" target="_blank" rel="nofollow noreferrer noopener"&gt;5847&lt;/A&gt;.&lt;/VLANID&gt;&lt;/CLASSNAME&gt;&lt;/MACMASK&gt;&lt;/MACADDR&gt;&lt;/CLASSNAME&gt;&lt;/L4PORTNUMBER&gt;&lt;/CLASSNAME&gt;&lt;/I&gt;&lt;/I&gt;&lt;/CLASSNAME&gt;&lt;/REFCLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/REFCLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/TOSMASK&gt;&lt;/TOSBITS&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/MACMASK&gt;&lt;/MACADDR&gt;&lt;/CLASSNAME&gt;&lt;/L4PORTNUMBER&gt;&lt;/CLASSNAME&gt;&lt;/I&gt;&lt;/I&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;</description>
    <pubDate>Wed, 27 Nov 2013 02:32:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-11-27T02:32:00Z</dc:date>
    <item>
      <title>Configuring DiffServ on the SecureStacks/D-Series</title>
      <link>https://community.extremenetworks.com/t5/faqs/configuring-diffserv-on-the-securestacks-d-series/m-p/50997#M691</link>
      <description>Article ID: 5848 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack B3&lt;BR /&gt;
SecureStack B2&lt;BR /&gt;
SecureStack A2&lt;BR /&gt;
D-Series &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Configure DiffServ&lt;BR /&gt;
Sample configuration &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
'set diffserv' &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
The SecureStack A2 supports DiffServ (the 'set diffserv' command set), but not Policy (the 'set policy' command set). &lt;BR /&gt;
The SecureStack B2 &amp;amp; B3 support DiffServ by default, as long as Policy licensing (&lt;A href="http://bit.ly/Ig6wNS" target="_blank" rel="nofollow noreferrer noopener"&gt;5781&lt;/A&gt;) has not been applied. &lt;BR /&gt;
The D-Series supports DiffServ by default, as long as Policy licensing (&lt;A href="http://bit.ly/1bQrXRb" target="_blank" rel="nofollow noreferrer noopener"&gt;10791&lt;/A&gt;) has not been applied. &lt;BR /&gt;
&lt;BR /&gt;
This article explains the subset of what may be accomplished using DiffServ functionality rather than the more full-featured Policy (including DSCP manipulation) functionality, and also provides detailed configuration guidance. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Differentiated Services configuration permits the user to classify incoming traffic (VLAN-tagged or not), and then either drop it or forward it. Forwarded traffic may optionally have an Inbound Rate Limiter (within the range of 1 Kbps through line speed) applied, and/or the traffic may optionally be "marked" with a value written to the first 3 (Precedence) bits of the TOS byte or to the first 6 (DSCP) bits of the TOS byte. &lt;BR /&gt;
&lt;BR /&gt;
It is possible to assign an 802.1p Priority or an 802.1Q VLAN using Policy, but not using DiffServ. &lt;BR /&gt;
&lt;BR /&gt;
For Layer 2 (switching) purposes, DiffServ can be effective for dropping or rate limiting inbound traffic. &lt;BR /&gt;
For Layer 3 (routing) purposes, DiffServ can be effective for setting the routing precedence to be used during periods of network congestion. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Note:&lt;/B&gt; If DiffServ is used to mark the DSCP value of a frame based on a keyword of "ef" or a value of 46 (with either of these yielding L3 Express Forwarding), as a side-function the outgoing L2 frame will be placed into the highest priority hardware queue (Queue 5) for transmission (&lt;A href="http://bit.ly/1aWrewD" target="_blank" rel="nofollow noreferrer noopener"&gt;5859&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
It is advisable that you review the background information contained in &lt;A href="http://bit.ly/1rOVKny" target="_blank" rel="nofollow noreferrer noopener"&gt;5811&lt;/A&gt; before proceeding with the remainder of this document. &lt;BR /&gt;
Also, please review the DiffServ guidelines and limitations contained in the latest non-patch &lt;A href="https://extranet.enterasys.com/downloads/" target="_blank" rel="nofollow noreferrer noopener"&gt;firmware release notes&lt;/A&gt; associated with your firmware version. &lt;BR /&gt;
&lt;BR /&gt;
&lt;U&gt;DiffServ configuration commands&lt;/U&gt;&lt;BR /&gt;
 set diffserv&lt;BR /&gt;
 &lt;BR /&gt;
   adminmode              Configure the DiffServ Admin mode.&lt;BR /&gt;
     enable                 Enable the DiffServ Admin mode.&lt;BR /&gt;
     disable                Disable the DiffServ Admin mode.&lt;BR /&gt;
 &lt;BR /&gt;
   class                  Configure a DiffServ Class to trigger a DiffServ Policy.&lt;BR /&gt;
     create                 Create a DiffServ collection of classification rules.&lt;BR /&gt;
       all                  All match conditions must be met, to trigger the Policy.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * New Class name, up to 31 alphanumeric characters&lt;BR /&gt;
     delete                 Delete a DiffServ collection of classification rules.&lt;BR /&gt;
       &lt;CLASSNAME&gt;          * Existing Class to be deleted&lt;BR /&gt;
     match                  Add a classification rule to a DiffServ Class.&lt;BR /&gt;
       dstip                Match to this Destination IP Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;I&gt;         * IP Address (example: 10.20.30.40)&lt;BR /&gt;
             &lt;I&gt;       * IP subnet bitmask (example: 255.255.255.0)&lt;BR /&gt;
       dstl4port            Match to this Destination Layer 4 Port value.&lt;BR /&gt;
         keyword            Match based on a Destination Layer 4 Port Keyword.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
                   * One of -&amp;gt; domain / echo / ftp / ftpdata / http /&lt;BR /&gt;
                                        smtp / snmp / telnet / tftp / www&lt;BR /&gt;
         number             Match based on a Destination Layer 4 Port Number value.&lt;BR /&gt;
           &lt;L4PORTNUMBER&gt;   * L4 port number within the range 0-65535&lt;BR /&gt;
       dstmac               Match to this Destination MAC Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;MACADDR&gt;        * MAC Address (example: 00-00-01-02-03-ab)&lt;BR /&gt;
             &lt;MACMASK&gt;      * MAC address bitmask (example: ff-ff-ff-00-00-00)&lt;BR /&gt;
       every                Match to all untagged packets regardless of attributes.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
       ipdscp               Match to this DSCP value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;DSCPVAL&gt;        * One of -&amp;gt; DSCP value within the range 0-63 -or-&lt;BR /&gt;
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be&lt;BR /&gt;
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef&lt;BR /&gt;
       ipprecedence         Match to this IP Precedence (first 3 bits of TOS) value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
                   * IP Precedence value within the range 0-7&lt;BR /&gt;
       iptos                Match to this IP TOS (all 8 bits of TOS) value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;TOSBITS&gt;        * TOS bits value within the range 00-ff&lt;BR /&gt;
             &lt;TOSMASK&gt;      * TOS bitmask value within the range 00-ff&lt;BR /&gt;
       protocol             Match to this IP Protocol.&lt;BR /&gt;
         keyword            Match based on a IP Protocol Keyword.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
               * One of -&amp;gt; icmp / igmp / ip / tcp / udp&lt;BR /&gt;
         number             Match based on an IP Protocol value.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
               * IP Protocol value within the range 0-255&lt;BR /&gt;
       refclass             Add or remove the match rules referenced by this Class.&lt;BR /&gt;
         add                Add a set of match conditions.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which the rules should be added&lt;BR /&gt;
             &lt;REFCLASSNAME&gt; * Existing Class to be used as the rule source&lt;BR /&gt;
         remove             Remove a set of match conditions.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class from which the rules should be removed&lt;BR /&gt;
             &lt;REFCLASSNAME&gt; * Existing Class to be used as the rule template&lt;BR /&gt;
       srcip                Match to this Source IP Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;I&gt;         * IP Address (example: 10.20.30.40)&lt;BR /&gt;
             &lt;I&gt;       * IP subnet bitmask (example: 255.255.255.0)&lt;BR /&gt;
       srcl4port            Match to this Source Layer 4 Port.&lt;BR /&gt;
         keyword            Match based on a Source Layer 4 Port Keyword.&lt;BR /&gt;
           &lt;CLASSNAME&gt;      * Existing Class to which this rule should be added&lt;BR /&gt;
                   * One of -&amp;gt; domain / echo / ftp / ftpdata / http /&lt;BR /&gt;
                                        smtp / snmp / telnet / tftp / www&lt;BR /&gt;
         number             Match based on a Destination Layer 4 Port Number value.&lt;BR /&gt;
           &lt;L4PORTNUMBER&gt;   * L4 port number within the range 0-65535&lt;BR /&gt;
       srcmac               Match to this Source MAC Address value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;MACADDR&gt;        * MAC Address (example: 00-00-01-02-03-ab)&lt;BR /&gt;
             &lt;MACMASK&gt;      * MAC address bitmask (example: ff-ff-ff-00-00-00)&lt;BR /&gt;
       vlan                 Match to this assigned VLAN ID value.&lt;BR /&gt;
         &lt;CLASSNAME&gt;        * Existing Class to which this rule should be added&lt;BR /&gt;
           &lt;VLANID&gt;         * VLAN ID within the range 1-4093&lt;BR /&gt;
 &lt;BR /&gt;
   rename                 Rename a DiffServ Class.&lt;BR /&gt;
     &lt;OL&gt;         * Existing Class name to be renamed 
       &lt;NEWCLASSNAME&gt;       * New Class name, up to 31 alphanumeric characters 
  
   policy                 Configure a DiffServ Policy to perform an action. 
     class                  Add or remove a member Class to/from a Policy. 
       add                  Add a class instance to a Policy. 
                * Existing Policy to which this Class should be added 
           &lt;CLASSNAME&gt;      * Existing Class to be added to the Policy 
       remove               Remove a class instance from the Policy. 
                * Existing Policy from which this Class should be removed 
           &lt;CLASSNAME&gt;      * Existing Class to be removed from the Policy 
     create                 Create a DiffServ Policy. 
                * New Policy name, up to 31 alphanumeric characters 
         in                 Only Ingress policies are supported. 
     delete                 Delete a DiffServ Policy. 
                * Existing Policy to be deleted 
     mark                   Configure a Marking action in the absence of Policing. 
       ipdscp               Rewrite this IP DSCP (TOS bits 0x'11111100') value. 
                * Existing Policy to utilize the Mark action 
           &lt;CLASSNAME&gt;      * Existing embedded Class to trigger the Mark action 
             &lt;DSCPVAL&gt;      * One of -&amp;gt; DSCP value within the range 0-63 -or- 
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be 
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef 
       ipprecedence         Rewrite this IP Precedence (TOS bits 0x'11100000') value. 
                * Existing Policy to utilize the Mark action 
           &lt;CLASSNAME&gt;      * Existing embedded Class to trigger the Mark action 
                   * IP precedence value within the range 0-7 
     police                 Configure a Policing Action or Style. 
       action               Configure a Policing Action. 
         conform            Specify an action taken on rule-conforming traffic. 
           drop             Conforming traffic should be dropped. 
                * Existing Policy to utilize the Drop action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Drop action 
           send             Conforming traffic should be forwarded. 
                * Existing Policy to utilize the Forward action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Forward action 
           markdscp         Rewrite this IP DSCP (TOS bits 0x'11111100') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                 &lt;DSCPVAL&gt;  * One of -&amp;gt; DSCP value within the range 0-63 -or- 
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be 
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef 
           markprec         Rewrite this IP Precedence (TOS bits 0x'11100000') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                   * IP precedence value within the range 0-7 
         nonconform         Specify an action taken on rule-nonconforming traffic. 
           drop             Conforming traffic should be dropped. 
                * Existing Policy to utilize the Drop action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Drop action 
           send             Conforming traffic should be forwarded. 
                * Existing Policy to utilize the Forward action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Forward action 
           markdscp         Rewrite this IP DSCP (TOS bits 0x'11111100') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                 &lt;DSCPVAL&gt;  * One of -&amp;gt; DSCP value within the range 0-63 -or- 
                              keyword af12 / af21 / af22 / af31 / af32 / af33 / be 
                                cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 / ef 
           markprec         Rewrite this IP Precedence (TOS bits 0x'11100000') value. 
                * Existing Policy to utilize the Mark action 
               &lt;CLASSNAME&gt;  * Existing embedded Class to trigger the Mark action 
                   * IP precedence value within the range 0-7 
       style                Configure a Policing Style for limiting forwarded traffic. 
         simple             Only simple policing is supported. 
                * Existing Policy to utilize the Rate Limiting action 
             &lt;CLASSNAME&gt;    * Existing embedded Class to trigger the Rate Limiting 
               &lt;RATELIMIT&gt;  * Rate limit within the range 1-4294967295 Kbits/s 
                &lt;B&gt; * Maximum burst size within the range 1-128 KBytes 
     rename                 Rename a DiffServ Policy. 
       [list=1]      * Existing Policy name to be renamed 
         &lt;NEWPOLICYNAME&gt;    * New Policy name, up to 31 alphanumeric characters 
  
   service                Configure a DiffServ Service to tie a Policy to a Port. 
     add                    Add a Policy to a Port. 
       in                   Only Ingress policies are supported. 
               * Port(s) which should receive this Policy (ex. ge.1.1-2) 
                * Existing Policy to be added to the port(s) 
     remove                 Remove a Policy from a Port. 
       in                   Only Ingress policies are supported. 
               * Port(s) which should lose this policy (ex. ge.1.1-2) 
                * Existing Policy to be removed from the port(s) 
 To display diffserv configuration results, here are some useful commands: 
 show diffserv class detailed &lt;CLASSNAME&gt; 
 show diffserv policy detailed  
 show diffserv service info detailed  in 
 To delete DiffServ configurations, remove in order: service commands, policy commands, and classcommands; then globally disable DiffServ to restore the default condition: 
 set diffserv service remove in   
 set diffserv policy delete  
 set diffserv class delete &lt;CLASSNAME&gt; 
 set diffserv adminmode disable 
 show config diffserv 
 &lt;U&gt;DiffServ configuration examples&lt;/U&gt;  
 
When using the diffserv command set; one would generally enable DiffServ, create a Class, create one or more classification rules within the Class, create a Policy, add one or more Classes to it, add Policing (Conforming/Non-conforming, Drop/Forward, Rate Limit, Precedence/DSCP Rewrite) styles &amp;amp; actions (both or neither) or just Marking (Precedence/DSCP Rewrite) actions to the Policy, and then assign the Policy to one or more ports.  
 
This example creates two separate policies:[list=1] 
&lt;LI&gt;'policyef' rate-limits ingressed traffic on port fe.1.1 to a maximum of 100Mb/s, and on the same traffic also rewrites the six DSCP bits to a decimal value of 46 for Express Forwarding on layer 3. 
&lt;/LI&gt;&lt;LI&gt;'policyaf31' rate-limits ingressed traffic on port fe.1.2 to a maximum of 100Mb/s, and on the same traffic also rewrites the six DSCP bits to a decimal value of 26 for Flash forwarding on layer 3.&lt;/LI&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/NEWPOLICYNAME&gt;&lt;/B&gt;&lt;/RATELIMIT&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/NEWCLASSNAME&gt;&lt;/OL&gt; #diffserv&lt;BR /&gt;
 set diffserv adminmode enable&lt;BR /&gt;
 set diffserv class create all classevery&lt;BR /&gt;
 set diffserv class match every classevery&lt;BR /&gt;
 set diffserv policy create policyef in&lt;BR /&gt;
 set diffserv policy class add policyef classevery&lt;BR /&gt;
 set diffserv policy police style simple policyef classevery 100000 128&lt;BR /&gt;
 set diffserv policy police action conform markdscp policyef classevery ef&lt;BR /&gt;
 set diffserv policy create policyaf31 in&lt;BR /&gt;
 set diffserv policy class add policyaf31 classevery&lt;BR /&gt;
 set diffserv policy police style simple policyaf31 classevery 100000 128&lt;BR /&gt;
 set diffserv policy police action conform markdscp policyaf31 classevery af31&lt;BR /&gt;
 set diffserv service add in fe.1.1 policyef&lt;BR /&gt;
 set diffserv service add in fe.1.2 policyaf31&lt;BR /&gt;
 This example creates one policy which identifies VOIP traffic (DSCP value 46 or 32) on ports ge.1.1 through ge.1.10, and drops all other traffic.&lt;BR /&gt;
 #diffserv&lt;BR /&gt;
 set diffserv adminmode enable&lt;BR /&gt;
 set diffserv class create all classVOIP&lt;BR /&gt;
 set diffserv class match ipdscp classVOIP ef&lt;BR /&gt;
 set diffserv class match ipdscp classVOIP cs4&lt;BR /&gt;
 set diffserv policy create policyQOS in&lt;BR /&gt;
 set diffserv policy class add policyQOS classVOIP&lt;BR /&gt;
 set diffserv policy police style simple policyQOS classVOIP 1000000 128&lt;BR /&gt;
 set diffserv policy police action nonconform drop policyQOS classVOIP&lt;BR /&gt;
 set diffserv service add in ge.1.1-10 policyQOS&lt;BR /&gt;
 This example creates one policy which identifies VOIP traffic (TOS value b8) on port fe.1.32, and overwrites the six DSCP bits to their pre-existing value, incidentally placing the packet into the high priority transmit queue as described at the top of this document.&lt;BR /&gt;
 #diffserv&lt;BR /&gt;
 set diffserv adminmode enable &lt;BR /&gt;
 set diffserv class create all classVoice &lt;BR /&gt;
 set diffserv class match iptos classVoice b8 ff&lt;BR /&gt;
 set diffserv policy create policyPhones in &lt;BR /&gt;
 set diffserv policy class add policyPhones classVoice &lt;BR /&gt;
 set diffserv policy mark ipdscp policyPhones classVoice ef &lt;BR /&gt;
 set diffserv service add in fe.1.32 policyPhones&lt;BR /&gt;
 This example creates one policy which identifies ICMP (PING) traffic, denying it when sourced from any user plugged into port ge.1.5.&lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all classICMP&lt;BR /&gt;
set diffserv class match protocol keyword classICMP icmp&lt;BR /&gt;
set diffserv policy create policyDropICMP in&lt;BR /&gt;
set diffserv policy class add policyDropICMP classICMP&lt;BR /&gt;
set diffserv policy police style simple policyDropICMP classICMP 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyDropICMP classICMP&lt;BR /&gt;
set diffserv service add in ge.1.5 policyDropICMP&lt;BR /&gt;
 This example creates one policy which identifies traffic sourced from the 10.16.17.0/24 subnet, denying it on all ports. It was developed to serve as a form of Layer2 ACL (an A2 feature which does not support subnet masking).&lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all class17dot0&lt;BR /&gt;
set diffserv class match srcip class17dot0 10.16.17.0 255.255.255.0&lt;BR /&gt;
set diffserv policy create policyDrop17dot0 in&lt;BR /&gt;
set diffserv policy class add policyDrop17dot0 class17dot0&lt;BR /&gt;
set diffserv policy police style simple policyDrop17dot0 class17dot0 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyDrop17dot0 class17dot0&lt;BR /&gt;
set diffserv service add in fe.1.1-24 policyDrop17dot0&lt;BR /&gt;
 This example is an elaboration of the previous one (Layer2 ACL), creating one policy which identifies traffic sourced from IP 10.10.2.49 or 10.10.2.177, denying it on all ports. It demonstrates the use of more than one class per policy. Though not true here, each class may optionally invoke a unique action.&lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all classIP49&lt;BR /&gt;
set diffserv class match srcip classIP49 10.10.2.49 255.255.255.255&lt;BR /&gt;
set diffserv class create all classIP177&lt;BR /&gt;
set diffserv class match srcip classIP177 10.10.2.177 255.255.255.255&lt;BR /&gt;
set diffserv policy create policyAccessACL in&lt;BR /&gt;
set diffserv policy class add policyAccessACL classIP49&lt;BR /&gt;
set diffserv policy class add policyAccessACL classIP177&lt;BR /&gt;
set diffserv policy police style simple policyAccessACL classIP49 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyAccessACL classIP49&lt;BR /&gt;
set diffserv policy police style simple policyAccessACL classIP177 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyAccessACL classIP177&lt;BR /&gt;
set diffserv service add in fe.1.1-24 policyAccessACL&lt;BR /&gt;
 See also: &lt;A href="http://bit.ly/1aWoGyG" target="_blank" rel="nofollow noreferrer noopener"&gt;5847&lt;/A&gt;.&lt;/VLANID&gt;&lt;/CLASSNAME&gt;&lt;/MACMASK&gt;&lt;/MACADDR&gt;&lt;/CLASSNAME&gt;&lt;/L4PORTNUMBER&gt;&lt;/CLASSNAME&gt;&lt;/I&gt;&lt;/I&gt;&lt;/CLASSNAME&gt;&lt;/REFCLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/REFCLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/TOSMASK&gt;&lt;/TOSBITS&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/DSCPVAL&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/MACMASK&gt;&lt;/MACADDR&gt;&lt;/CLASSNAME&gt;&lt;/L4PORTNUMBER&gt;&lt;/CLASSNAME&gt;&lt;/I&gt;&lt;/I&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;&lt;/CLASSNAME&gt;</description>
      <pubDate>Wed, 27 Nov 2013 02:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/configuring-diffserv-on-the-securestacks-d-series/m-p/50997#M691</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-11-27T02:32:00Z</dc:date>
    </item>
  </channel>
</rss>

