Layer 2 ACLs can be used in QoS services.
Table 1 describes the typical applications of Layer 2 ACLs.
| Typical Application | Usage Scenario | Operation | 
|---|---|---|
| QoS | To process different types of traffic, users can configure a Layer 2 ACL to perform traffic policing, traffic shaping, or traffic classification on traffic that matches the ACL rules. | To find out more about the procedures for processing different types of traffic, see how to configure traffic policing, traffic shaping, and traffic behaviors. | 
Cases of applying a Layer 2 ACL in QoS services
acl number 4001
 rule permit 8021p 3 source-mac 1-1-1 ffff-ffff-ffff
 rule 10 deny 
traffic classifier acl 
 if-match acl 4001
traffic behavior test
 permit
traffic policy test
 classifier acl behavior test
interface GigabitEthernet0/1/8
 traffic-policy test inbound
Matching result: Only VLAN packets with the 802.1p priority 3 in the outer VLAN tag, source MAC address 1-1-1, and source MAC address mask ffff-ffff-ffff are permitted.
acl number 4001
 rule permit 8021p 3 source-mac 1-1-1 ffff-ffff-ffff
 rule 10 deny 
traffic classifier acl 
 if-match acl 4001
traffic behavior test
 remark 8021p 7
traffic policy test
 classifier acl behavior test
interface GigabitEthernet0/1/8
 traffic-policy test inbound
Matching result: Only VLAN packets with the 802.1p priority 3 in the outer VLAN tag, source MAC address 1-1-1, and source MAC address mask ffff-ffff-ffff are permitted, and the packets' 802.1p priority is re-marked 7.