BROCADE-ACL-MIB: View SNMP OID List / Download MIB
VENDOR: BROCADE
Home | MIB: BROCADE-ACL-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
brocadeACLMIB | 1.3.6.1.4.1.1588.3.1.16 | |||
bcsiACLNotifications | 1.3.6.1.4.1.1588.3.1.16.0 | |||
bcsiACLObjects | 1.3.6.1.4.1.1588.3.1.16.1 | |||
bcsiAclNameToIdMappingTable | 1.3.6.1.4.1.1588.3.1.16.1.1 |
This table maps the string name of an ACL to its numeric ACL ID for both L2 and L3 ACLs. |
||
1.3.6.1.4.1.1588.3.1.16.1.1.1 |
An entry in the bcsiAclNameToIdMappingTable which lists the ACl-ID for ACL-Names. |
|||
bcsiAclNametoAclIdMappingAclName | 1.3.6.1.4.1.1588.3.1.16.1.1.1.1 |
Name of the ACL. |
||
bcsiAclNametoAclIdMappingAclId | 1.3.6.1.4.1.1588.3.1.16.1.1.1.2 |
Numeric ID of the ACL. |
||
bcsiAclNametoAclIdMappingAclType | 1.3.6.1.4.1.1588.3.1.16.1.1.1.3 |
ACL can be of two types, namely standard and extended ACL. |
||
bcsiAclNametoAclIdMappingAclLevel | 1.3.6.1.4.1.1588.3.1.16.1.1.1.4 |
Protocol Layer at which ACLs are applied. L2 and L3 are the supported levels. |
||
bcsiL2NamedAclRuleTable | 1.3.6.1.4.1.1588.3.1.16.1.2 |
Table to display the L2 Named Access Control List Information listed below among others: - Source MAC address - Source MAC mask - Destination MAC address - Destination MAC mask - VLAN ID - Ethernet type |
||
1.3.6.1.4.1.1588.3.1.16.1.2.1 |
An entry in the L2 Access Control List table. |
|||
bcsiL2NamedAclId | 1.3.6.1.4.1.1588.3.1.16.1.2.1.1 |
Unique Numeric ID of ACL. It is the same as bcsiAclNametoAclIdMappingAclId in bcsiAclNameToIdMappingTable |
||
bcsiL2NamedAclSequenceNumber | 1.3.6.1.4.1.1588.3.1.16.1.2.1.2 |
Sequence number is the number associated with rules of ACL |
||
bcsiL2NamedAclName | 1.3.6.1.4.1.1588.3.1.16.1.2.1.3 |
Represents the name of each configured L2 named ACL. It is the same as bcsiAclNametoAclIdMappingAclName in bcsiAclNameToIdMappingTable |
||
bcsiL2NamedAclAction | 1.3.6.1.4.1.1588.3.1.16.1.2.1.4 |
Action to take if the ingress L2 packet matches this ACL. |
||
bcsiL2NamedAclSourceType | 1.3.6.1.4.1.1588.3.1.16.1.2.1.5 |
Source can be represented in three ways: 1. Mac address in HHHH.HHHH.HHHH format. 2. Any source mac address 3. Host specific mac address Interpretation of bcsiL2NamedAclSourceMacMask depends on the value of this object |
||
bcsiL2NamedAclSourceMac | 1.3.6.1.4.1.1588.3.1.16.1.2.1.6 |
Optional Source MAC address. It depends on the value of bcsiL2NamedAclSourceType. For standard(1) value of bcsiL2NamedAclSourceType, bcsiL2NamedAclSourceMac is user specified value. For any(2) value of bcsiL2NamedAclSourceType, bcsiL2NamedAclSourceMac is 0. For host(3) value of bcsiL2NamedAclSourceType, bcsiL2NamedAclSourceMac is user specified value. |
||
bcsiL2NamedAclSourceMacMask | 1.3.6.1.4.1.1588.3.1.16.1.2.1.7 |
Optional Source MAC address mask. By default, it matches with any source MAC within a packet. To match on the first two bytes of the address aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all source MAC addresses that contain aabb as the first two bytes and any values in the remaining bytes of the MAC address. Applicable for Extended ACLs only. |
||
bcsiL2NamedAclDestinationType | 1.3.6.1.4.1.1588.3.1.16.1.2.1.8 |
Destination can be represented in three ways. 1. Mac address in HHHH.HHHH.HHHH format. 2. Any destination mac address 3. Host specific mac address Interpretation of bcsiL2NamedAclDestinationMacMask depends on the value of this object |
||
bcsiL2NamedAclDestinationMac | 1.3.6.1.4.1.1588.3.1.16.1.2.1.9 |
Optional destination MAC address. By default, it matches with any destination MAC within a packet. It depends on the value of bcsiL2NamedAclDestinationType. For standard(1) value of bcsiL2NamedAclDestinationType, bcsiL2NamedAclDestinationMac is user specified value. For any(2) value of bcsiL2NamedAclDestinationType, bcsiL2NamedAclDestinationMac is 0. For host(3) value of bcsiL2NamedAclDestinationType, bcsiL2NamedAclDestinationMac is user specified value. Applicable for Extended ACLs only. |
||
bcsiL2NamedAclDestinationMacMask | 1.3.6.1.4.1.1588.3.1.16.1.2.1.10 |
Optional destination MAC address mask. By default, it matches with any destination MAC within a packet. To match on the first two bytes of the address aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all destination MAC addresses that contain aabb as the first two bytes and any values in the remaining bytes of the MAC address. Applicable for Extended ACLs only. |
||
bcsiL2NamedAclCount | 1.3.6.1.4.1.1588.3.1.16.1.2.1.11 |
Indicates if the user has enabled/disabled count for number of packets against which the configured action is taken, for a given rule |
||
bcsiL2NamedAclCopySflow | 1.3.6.1.4.1.1588.3.1.16.1.2.1.12 |
Indicates whether to sample the packet for sflow collection or not |
||
bcsiL2NamedAclDropPrecedenceForce | 1.3.6.1.4.1.1588.3.1.16.1.2.1.13 |
Force ingress drop precedence |
||
bcsiL2NamedAclVlanTagFormat | 1.3.6.1.4.1.1588.3.1.16.1.2.1.14 |
Vlan tag format can be of 3 types, namely single-tagged, double-tagged and untagged. When neither of these 3 types of tag are used, the feild is represented by 0. When the value of this field is single-tagged(1),bcsiL2NamedAclVlanId represents the Vlan ID. |
||
bcsiL2NamedAclInnerVlanId | 1.3.6.1.4.1.1588.3.1.16.1.2.1.15 |
vlan ID of the tagged inner vlan. If bcsiL2NamedAclVlanTagFormat is double-tagged(2), then 0 value of this field indicates any. |
||
bcsiL2NamedAclOuterVlanId | 1.3.6.1.4.1.1588.3.1.16.1.2.1.16 |
Vlan ID of the tagged outer vlan. If bcsiL2NamedAclVlanTagFormat is double-tagged(2), then 0 value of bcsiL2NamedAclInnerVlanId indicates any. |
||
bcsiL2NamedAclVlanId | 1.3.6.1.4.1.1588.3.1.16.1.2.1.17 |
Optional VLAN ID to match against that of the incoming packet. By default, the VLAN ID field is ignored during the match. In this case, value 0 is returned. This field is interpreted as Vlan ID when bcsiL2NamedAclVlanTagFormat is either 0(not tagged) or 1(single-tagged). Supported for Extended ACL only. |
||
bcsiL2NamedAclEthernetType | 1.3.6.1.4.1.1588.3.1.16.1.2.1.18 |
Ethernet Type to match against the Ethertype field in the L2 header of the incoming packet. By default, etype field is ignored during the match. Applicable for Extended ACLs only. |
||
bcsiL2NamedAclArpGuard | 1.3.6.1.4.1.1588.3.1.16.1.2.1.19 |
Represents enabling/disabling of arp-gurad for a given ACL |
||
bcsiL2NamedAclDot1Priority | 1.3.6.1.4.1.1588.3.1.16.1.2.1.20 |
The priority option assigns traffic that matches the ACL to a hardware forwarding queue. In addition to changing the internal forwarding priority, if the outgoing interface is an 802.1q interface, this option maps the specified priority to its equivalent 802.1p (QoS) priority and marks the packet with the new 802.1p priority. This option is applicable for inbound ACLs only. NOTE: bcsiL2NamedAclDot1Priority following bcsiL2NamedAclDot1PriorityForce cannot be used together in an ACL entry. Applicable for Extended ACLs only. |
||
bcsiL2NamedAclDot1PriorityForce | 1.3.6.1.4.1.1588.3.1.16.1.2.1.21 |
The priority-force option assigns packets of outgoing traffic that match the ACL to a specific hardware forwarding queue, even though the incoming packet may be assigned to another queue. This option is applicable for inbound ACLs only. NOTE: bcsiL2NamedAclDot1Priority following bcsiL2NamedAclDot1PriorityForce cannot be used together in an ACL entry. Applicable for Extended ACL only |
||
bcsiL2NamedAclMirrorPackets | 1.3.6.1.4.1.1588.3.1.16.1.2.1.22 |
Mirror packets matching ACL permit clause. Applicable for Extended ACLs only |
||
bcsiL2NamedAclLogEnable | 1.3.6.1.4.1.1588.3.1.16.1.2.1.23 |
Optional parameter to enable logging only when deny clause is specified. Note that traffic denied by implicit deny mechanism is not subject to logging. The implicit deny kicks in when the traffic does not match any of the clauses and there is no permit any any clause specified at the end. |
||
bcsiAclIfBindTable | 1.3.6.1.4.1.1588.3.1.16.1.3 |
Table for binding L2 and L3 ACLs to interfaces. - One cannot bind Layer 2 ACLs and Layer 3 ACLs to the same port. However, configuration can be made on one port to use Layer 2 ACLs, and another port on the same device to use Layer 3 ACLs. - In general, Layer 2 ACLs cannot be bound to virtual interfaces, unlike L3 ACLs. - One can not modify an existing Layer 2 ACL clause. For that, one must unbind the ACL, delete it and make a new clause. |
||
1.3.6.1.4.1.1588.3.1.16.1.3.1 |
An entry in the L2 and L3 ACL binding table which lists the ACL bindings to an interface. |
|||
bcsiAclIfBindDirection | 1.3.6.1.4.1.1588.3.1.16.1.3.1.1 |
Direction in which this ACL should be applied on this port. |
||
bcsiAclIfBindAclName | 1.3.6.1.4.1.1588.3.1.16.1.3.1.2 |
Represents the Name of each configured L2 or L3 named ACL. It is the same as bcsiAclNametoAclIdMappingAclName in bcsiAclNameToIdMappingTable |
||
bcsiACLConformance | 1.3.6.1.4.1.1588.3.1.16.2 |