FOUNDRY-SN-IP-ACL-MIB: View SNMP OID List / Download MIB
VENDOR: BROCADE
Home | MIB: FOUNDRY-SN-IP-ACL-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
snAgAcl | 1.3.6.1.4.1.1991.1.2.2.15 |
Copyright 1996-2010 Brocade Communications Systems, Inc. All rights reserved. This Brocade Communications Systems SNMP Management Information Base Specification embodies Brocade Communications Systems' confidential and proprietary intellectual property. Brocade Communications Systems retains all title and ownership in the Specification, including any revisions. This Specification is supplied AS IS, and Brocade Communications Systems makes no warranty, either express or implied, as to the use, operation, condition, or performance of the specification, and any unintended consequence it may on the user environment. |
||
snAgAclGlobal | 1.3.6.1.4.1.1991.1.2.2.15.1 | |||
snAgAclGblCurRowIndex | 1.3.6.1.4.1.1991.1.2.2.15.1.1 | integer32 | read-only |
The current row index of the ACL table entry. |
snAgAclGblAcctEnable | 1.3.6.1.4.1.1991.1.2.2.15.1.2 | integer | read-write |
Specifies the administration status of the ACL accounting. This object is not supported in CES/CER platforms. Enumeration: 'disabled': 0, 'enabled': 1. |
snAgAclGblIfIPv4AcctClear | 1.3.6.1.4.1.1991.1.2.2.15.1.3 | interfaceindexorzero | read-write |
Clears the IPv4 ACL accounting information for the given interface. If the value is 0 then it clears IPv4 ACL accounting information for all the interfaces. |
snAgAclGblIfIPv6AcctClear | 1.3.6.1.4.1.1991.1.2.2.15.1.4 | interfaceindexorzero | read-write |
Clears the IPv6 ACL accounting information for the given interface. If the value is 0 then it clears IPv6 accounting information for all the interfaces. |
snAgAclGblRebindAclNumber | 1.3.6.1.4.1.1991.1.2.2.15.1.5 | aclnumber | read-write |
The access-list number for rebind |
snAgAclGblRebindAclName | 1.3.6.1.4.1.1991.1.2.2.15.1.6 | displaystring | read-write |
The access-list name for rebind. |
brcdPbrAclAccntFilterAclName | 1.3.6.1.4.1.1991.1.2.2.15.1.7 | displaystring | read-write |
This object can be used to control the content of brcdPbrAclAccntTable. Any ACL filter that has a full or partial match with ACL name will not be returned in the brcdPbrAclAccntTable. If not specified, the default value is null and all ACL filters will be returned by the table. |
brcdPbrAclAccntCounterType | 1.3.6.1.4.1.1991.1.2.2.15.1.8 | integer | read-write |
This contains ACL Number, ACL Name, ACL Filter Id, last five minutes and cumulative accounting data since the ACL was installed. Each field is separated by a pipe character i.e. 5MIN|CUMULATIVE|ACL Number|ACL Filter Id|ACL Name Depending on the value of brcdPbrAclAccntCounterType the corresponding counter will have the value while the other is zero. Enumeration: 'cumulative': 1, 'last5min': 2. |
snAgAclTable | 1.3.6.1.4.1.1991.1.2.2.15.2 | no-access |
Table of Access Control List |
|
1.3.6.1.4.1.1991.1.2.2.15.2.1 | no-access |
An entry in the IP access control list table. |
||
snAgAclIndex | 1.3.6.1.4.1.1991.1.2.2.15.2.1.1 | integer32 | read-only |
The Access control list item number for an entry. This is a unique number that identifies different Access list entries combined with the Access list name and Access list number. This one has to be unique even though the name and number are not unique for a given Access list with same or different source address, subnet mask, destination address and destination mask, protocol type, action (permit/deny) type and the operator (neq, eq, gt and, lt) which makes the index a unique tuple (name, number, itemnumber). |
snAgAclNumber | 1.3.6.1.4.1.1991.1.2.2.15.2.1.2 | aclnumber | read-write |
The access-list number for this entry. |
snAgAclName | 1.3.6.1.4.1.1991.1.2.2.15.2.1.3 | displaystring | read-write |
ACL name for an entry. |
snAgAclAction | 1.3.6.1.4.1.1991.1.2.2.15.2.1.4 | action | read-write |
Action to take if the ip packet matches with this access control list. |
snAgAclProtocol | 1.3.6.1.4.1.1991.1.2.2.15.2.1.5 | ipprotocol | read-write |
Transport protocol. Valid values for the IP protocol are: 0 = any IP protocol 1 = ICMP 2 = IGMP 3 = ggp 4 = ipencap 5 = st2 6 = TCP 7 = cbt 8 = egp 9 = igp 10 = bbn_rcc 11 = nvp 12 = pup 13 = argus 14 = emcon 15 = xnet 16 = chaos 17 = UDP 18 = mux 19 = dcn 20 = hmp 21 = prm 22 = xns_idp 23 = trunk1 24 = trunk2 25 = leaf1 26 = leaf2 27 = rdp 28 = irtp 29 = iso_tp4 30 = netblt 31 = mfe_nsp 32 = merit_inp 33 = sep 34 = threepc 35 = idpr 36 = xtp 37 = ddp 38 = idpr_cmtp 39 = tppp 40 = il 41 = ipv6 42 = sdrp 43 = ipv6_route 44 = ipv6_frag 45 = idrp 46 = rsvp 47 = gre 48 = mhrp 49 = bna 50 = esp 51 = ahp 52 = inlsp 53 = swipe 54 = narp 55 = mobile 56 = tlsp 57 = skip 58 = ipv6_icmp 59 = ipv6_nonxt 60 = ipv6_opts 62 = cftp 64 = sat_expak 65 = kryptolan 66 = rvd 67 = ippc 69 = sat_mon 70 = visa 71 = ipcv 72 = cpnx 73 = cphb 74 = wsn 75 = pvp 76 = br_sat_mon 77 = sun_nd 78 = wb_mon 79 = wb_expak 80 = iso_ip 81 = vmtp 82 = secure_vmtp 83 = vines 84 = ttp 85 = nsfnet_igp 86 = dgp 87 = tcf 88 = IGRP 89 = OSPF 90 = sprite_rpc 91 = larp 92 = mtp 93 = ax25 94 = ipip 95 = micp 96 = scc_sp 97 = etherip 98 = encap 100 = gmtp 101 = ifmp 102 = pnni 103 = pim 104 = aris 105 = scps 106 = qnx 107 = an 108 = ipcomp 109 = snp 110 = compaq_peer 111 = ipxinip 112 = vrrp 113 = pgm 115 = l2tp 116 = ddx 117 = iatp 118 = st 119 = srp 120 = uti 121 = smp 122 = sm 123 = ptp 124 = isis 125 = fire 126 = crtp 127 = crdup 128 = sscopmce 129 = iplt 130 = sps 131 = pipe 132 = sctp 133 = fc 134 = rsvp_e2e_ignore 135 = mobility_header 136 = udplite 137 = mpls_in_ip 138 = manet 139 = hip 140 = shim6 254 = divert |
snAgAclSourceIp | 1.3.6.1.4.1.1991.1.2.2.15.2.1.6 | ipaddress | read-write |
Source IP address. |
snAgAclSourceMask | 1.3.6.1.4.1.1991.1.2.2.15.2.1.7 | ipaddress | read-write |
Source IP subnet mask. |
snAgAclSourceOperator | 1.3.6.1.4.1.1991.1.2.2.15.2.1.8 | operator | read-write |
Type of comparison to perform. For now, this only applys to tcp or udp to compare the port number |
snAgAclSourceOperand1 | 1.3.6.1.4.1.1991.1.2.2.15.2.1.9 | integer | read-write |
For now this only refers to transport protocol port number. 0 means NA |
snAgAclSourceOperand2 | 1.3.6.1.4.1.1991.1.2.2.15.2.1.10 | integer | read-write |
For now this only refers to transport protocol port number. Used in ICMP Protocol to convey the ICMP Type value. 0 means NA. Valid values for ICMP Type: 1 = Echo reply 4 = Destination unreachable 5 = Source quench 6 = Redirect 9 = Echo request 10=Router advertisement 11=Router solicitation 12=Time exceeded 13=Parameter problem 14=Timestamp request 15=Timestamp reply 16=Information request 17=Information reply 18=Address mask request 19=Address mask reply. |
snAgAclDestinationIp | 1.3.6.1.4.1.1991.1.2.2.15.2.1.11 | ipaddress | read-write |
Destination IP address. |
snAgAclDestinationMask | 1.3.6.1.4.1.1991.1.2.2.15.2.1.12 | ipaddress | read-write |
Destination IP subnet mask. |
snAgAclDestinationOperator | 1.3.6.1.4.1.1991.1.2.2.15.2.1.13 | operator | read-write |
Type of comparison to perform. For now, this only applys to tcp or udp to compare the port number |
snAgAclDestinationOperand1 | 1.3.6.1.4.1.1991.1.2.2.15.2.1.14 | integer | read-write |
For now this only refers to transport protocol port number. 0 means NA |
snAgAclDestinationOperand2 | 1.3.6.1.4.1.1991.1.2.2.15.2.1.15 | integer | read-write |
For now this only refers to transport protocol port number. 0 means NA |
snAgAclPrecedence | 1.3.6.1.4.1.1991.1.2.2.15.2.1.16 | precedencevalue | read-write |
This refers to IP precedence value in the range <0-7> critical(5), flash(3), flash-override(4), immediate(2), internet(6), network(7), priority(1), routine(0) |
snAgAclTos | 1.3.6.1.4.1.1991.1.2.2.15.2.1.17 | tosvalue | read-write |
This refers to the IP type of service value in range <0-15>, which is the sum of numeric vlaues of the following options - match packets with maximum reliability TOS (2) match packets with maximum throughput TOS (4) match packets with minimum delay (8) match packets with minimum monetary cost TOS (1) match packets with normal TOS (0) |
snAgAclEstablished | 1.3.6.1.4.1.1991.1.2.2.15.2.1.18 | rtrstatus | read-write |
Enable/Disable the filtering of established TCP packets of which the ACK or RESET flag is on. This additional filter only applies to TCP transport protocol. |
snAgAclLogOption | 1.3.6.1.4.1.1991.1.2.2.15.2.1.19 | truthval | read-write |
Log flag |
snAgAclStandardFlag | 1.3.6.1.4.1.1991.1.2.2.15.2.1.20 | truthval | read-write |
Return whether the ACL is standard or extended, 1 for standard ACL |
snAgAclRowStatus | 1.3.6.1.4.1.1991.1.2.2.15.2.1.21 | snrowstatus | read-write |
To create or delete a access list entry. |
snAgAclFlowCounter | 1.3.6.1.4.1.1991.1.2.2.15.2.1.22 | counter64 | read-only |
Approximate count of flows matching individual ACL entry. |
snAgAclPacketCounter | 1.3.6.1.4.1.1991.1.2.2.15.2.1.23 | counter64 | read-only |
Accurate count of packets matching individual ACL entry. |
snAgAclComments | 1.3.6.1.4.1.1991.1.2.2.15.2.1.24 | displaystring | read-write |
Remark description of individual ACL entry. |
snAgAclIpPriority | 1.3.6.1.4.1.1991.1.2.2.15.2.1.25 | integer | read-write |
QoS priority option for IP ACL entry. |
snAgAclPriorityForce | 1.3.6.1.4.1.1991.1.2.2.15.2.1.26 | integer | read-write |
Force packet outgoing priority. Not defined(4) |
snAgAclPriorityMapping | 1.3.6.1.4.1.1991.1.2.2.15.2.1.27 | integer | read-write |
Map incoming packet priority. Not defined(8) |
snAgAclDscpMarking | 1.3.6.1.4.1.1991.1.2.2.15.2.1.28 | integer | read-write |
Mark packets with given DSCP value. Not defined(64) |
snAgAclDscpMapping | 1.3.6.1.4.1.1991.1.2.2.15.2.1.29 | integer | read-write |
Map incoming DSCP value. Not defined(64) |
snAgAclIcmpCode | 1.3.6.1.4.1.1991.1.2.2.15.2.1.30 | integer | read-write |
ICMP Message Code value. Used in combination with ICMP Message Type (use snAgAclSourceOperand2) to setup an ICMP filter. This object is not used with any other protocol. 0 means NA. Supported values Type: Echo reply -------------- 1 = Echo reply Type: Destination unreachable ------------------------- 1 = Network unreachable 2 = Host unreachable 3 = Protocol unreachable 4 = Port unreachable 5 = Fragmentation needed by don't fragment bit set 6 = Source route failed 7 = Destination network unknown 8 = Destination host unknown 9 = Source host isolated 10 = Destination network administratively prohibited 11=Destination host administratively prohibited 12=Network unreachable for TOS 13=Host unreachable for TOS 14=Communication administratively prohibited by filter 15=Host precedence violation 16=Precedence cutoff in effect Type: Source quench ------------------ 1 = Source quench Type: Redirect ------------ 1 = Redirect for network 2 = Redirect for host 3 = Redirect for TOS and network 4 = Redirect for TOS and host Type: Echo request ----------------- 1 = Echo request Type: Router advertisement ------------------------ 1 = Router advertisement Type: Router solicitation --------------------- 1 = Router solicitation Type: Time exceeded ------------------ 1 = Time to live equals 0 during transmit 2 = Time to live equals 0 during reassembly Type: Parameter problem --------------------- 1 = IP header bad (catchall error) 2 = Required option missing Type: Timestamp request ---------------------- 1 = Timestamp request Type: Timestamp reply ------------------- 1 = Timestamp reply Type: Information request ---------------------- 1 = Information request Type: Information reply -------------------- 1 = Information reply Type: Address mask request ------------------------ 1 = Address mask request Type: Address mask reply ---------------------- 1 = Address mask reply |
snAgAclParameters | 1.3.6.1.4.1.1991.1.2.2.15.2.1.31 | bits | read-write |
This mask represents multiple parameters configured for this ACL. Bit 0 specified in the BITS construct is the MS bit of the first octet. Bit 0: Match fragmented IP packets Bit 1: Match non-fragmented IP packets Bit 2: Match only TCP packets with SYN Bit set. Valid only if snAgAclSourceOperator or snAgAclDestinationOperator is set to TCP. Bit 3: Permit packets that fail RPF check Bit 4: Mirror packets matching ACL permit clause Bit 5: Send packets matching ACL permit clause to sFlow collector Bit 6: Set dscp-mapping. The value is given by snAgAclDscpMarking Bit 7: Set dscp-marking. The value is given by snAgAclDscpMapping Bits: 'mirrorPermitPackets': 4, 'dscpMappingFlagSet': 6, 'dscpMarkingFlagSet': 7, 'sendPermitPacketsToSflowCollector': 5, 'matchFragmentedPackets': 0, 'permitFailedRPFCheckPackets': 3, 'matchTcpSynSetPackets': 2, 'matchNonFragmentedPackets': 1. |
snAgAclVlanId | 1.3.6.1.4.1.1991.1.2.2.15.2.1.32 | fdryvlanidornonetc | read-only |
Optional VLAN ID to match against that of the incoming packet. By default, the VLAN ID field is ignored during the match. In this case, value 0 is returned. |
snAgAclClauseString | 1.3.6.1.4.1.1991.1.2.2.15.2.1.33 | displaystring | read-only |
Returns the equivalent filter clause string. |
snAgAclBindToPortTable | 1.3.6.1.4.1.1991.1.2.2.15.3 | no-access |
Table of ACL binding to port for router |
|
1.3.6.1.4.1.1991.1.2.2.15.3.1 | no-access |
An entry in the ACL-binding-to-port table. |
||
snAgAclPortNum | 1.3.6.1.4.1.1991.1.2.2.15.3.1.1 | integer32 | read-only |
Binding-to port num, either physical port or virtual interface. |
snAgAclPortBindDirection | 1.3.6.1.4.1.1991.1.2.2.15.3.1.2 | direction | read-only |
ACL port direction, inbound or outbound |
snAgAclNum | 1.3.6.1.4.1.1991.1.2.2.15.3.1.3 | integer32 | read-write |
Defined ACL number |
snAgAclNameString | 1.3.6.1.4.1.1991.1.2.2.15.3.1.4 | displaystring | read-write |
Defined ACL name |
snAgBindPortListInVirtualInterface | 1.3.6.1.4.1.1991.1.2.2.15.3.1.5 | octet string | read-write |
Port list for binding virtual interface |
snAgAclPortRowStatus | 1.3.6.1.4.1.1991.1.2.2.15.3.1.6 | snrowstatus | read-write |
To create or delete a ACL port entry. |
snAgAclIfBindTable | 1.3.6.1.4.1.1991.1.2.2.15.4 | no-access |
Table of ACL binding to port for router |
|
1.3.6.1.4.1.1991.1.2.2.15.4.1 | no-access |
An entry in the ACL-binding-to-port table. |
||
snAgAclIfBindIndex | 1.3.6.1.4.1.1991.1.2.2.15.4.1.1 | interfaceindex | read-only |
Binding-to port num, either physical port or virtual interface. |
snAgAclIfBindDirection | 1.3.6.1.4.1.1991.1.2.2.15.4.1.2 | direction | read-only |
ACL port direction, inbound or outbound |
snAgAclIfBindNum | 1.3.6.1.4.1.1991.1.2.2.15.4.1.3 | integer | read-only |
The id of the IPv4 ACL bound to this Interface (0 represents named ACL) |
snAgAclIfBindName | 1.3.6.1.4.1.1991.1.2.2.15.4.1.4 | displaystring | read-only |
The name of the IPv4 ACL name bound to this Interface |
snAgAclIfBindVifPortList | 1.3.6.1.4.1.1991.1.2.2.15.4.1.5 | octet string | read-only |
This object specifies the port list for binding virtual interface. Each port index is an ifIndex, if there are consecutive 4 or more ifIndex then, they will be encoded like below. Encoding and decoding scheme is range based: Each range prefix with 0000 (2 octets) where 0000 is not valid ifIndex. Next 2 octets indicates lower range ifIndex, followed by 2 octets of higher range ifIndex. Individual(non range) ones will be displayed as it is. Ex: port list: 0001..0005 0015 0032..0047 Port list in PDU: 0000 0001 0005 000f 0000 0020 002f. |
snAgAclIfBindRowStatus | 1.3.6.1.4.1.1991.1.2.2.15.4.1.6 | snrowstatus | read-only |
To create or delete a ACL port entry. |
snAgAclIfBindDenyLogging | 1.3.6.1.4.1.1991.1.2.2.15.4.1.7 | integer | read-only |
Enable or disable deny logging. Enumeration: 'enable': 1, 'disable': 0. |
snAgAclIfIpv6BindName | 1.3.6.1.4.1.1991.1.2.2.15.4.1.8 | displaystring | read-only |
The name of the IPv6 ACL name bound to this Interface |
agAclAccntTable | 1.3.6.1.4.1.1991.1.2.2.15.5 | no-access |
Table of ACL Accounting Statistics for router |
|
1.3.6.1.4.1.1991.1.2.2.15.5.1 | no-access |
An entry in the ACL-binding-to-port table. |
||
agAclAccntKind | 1.3.6.1.4.1.1991.1.2.2.15.5.1.1 | integer | no-access |
Kind of ACL Accounting statistics needed. ipv4PolicyBasedRouting(2) and ipv6PolicyBasedRouting(6) are implemented in brcdPbrAclAccntTable. Agent will fail for GET on ipv4PolicyBasedRouting(2) and ipv6PolicyBasedRouting(6) wheresas for GET_NEXT it will skip these. The enum value ipv6ReceiveAcl(7) is not supported on CES/CER devices. Enumeration: 'rateLimit': 3, 'receiveAcl': 4, 'l2': 1, 'ipv4': 0, 'ipv6': 5, 'ipv6ReceiveAcl': 7. |
agAclAccntIfIndex | 1.3.6.1.4.1.1991.1.2.2.15.5.1.2 | interfaceindex | no-access |
Physical or virtual interface on which ACL accounting is desired. For Receive ACL, we use the lowest port of the management module as value for this object. |
agAclAccntDirection | 1.3.6.1.4.1.1991.1.2.2.15.5.1.3 | direction | no-access |
ACL port direction, inbound or outbound. For receive-acl kind, direction cannot be outbound. |
agAclAccntAclNumber | 1.3.6.1.4.1.1991.1.2.2.15.5.1.4 | aclnumber | no-access |
The access-list number for this entry. |
agAclAccntFilterId | 1.3.6.1.4.1.1991.1.2.2.15.5.1.5 | unsigned32 | no-access |
FilterId within a given ACL. This is a zero based value. |
agAclAccntAclName | 1.3.6.1.4.1.1991.1.2.2.15.5.1.6 | aclnamestring | read-only |
ACL name for an entry, if applicable. Otherwise, null string is returned. |
agAclAccntOneSecond | 1.3.6.1.4.1.1991.1.2.2.15.5.1.7 | counter64 | read-only |
Last one second accounting data. |
agAclAccntOneMinute | 1.3.6.1.4.1.1991.1.2.2.15.5.1.8 | counter64 | read-only |
Last one minute accounting data. |
agAclAccntFiveMinute | 1.3.6.1.4.1.1991.1.2.2.15.5.1.9 | counter64 | read-only |
Last five minute accounting data. |
agAclAccntCumulative | 1.3.6.1.4.1.1991.1.2.2.15.5.1.10 | counter64 | read-only |
Cummulative accounting data since the ACL was installed. |
agAclAccntRaclDropCnt | 1.3.6.1.4.1.1991.1.2.2.15.5.1.11 | counter64 | read-only |
Receive-ACL drop counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL. |
agAclAccntRaclFwdCnt | 1.3.6.1.4.1.1991.1.2.2.15.5.1.12 | counter64 | read-only |
Receive-ACL forward counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL. |
agAclAccntRaclRemarkCnt | 1.3.6.1.4.1.1991.1.2.2.15.5.1.13 | counter64 | read-only |
Receive-ACL remark counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL. |
agAclAccntRaclTotalCnt | 1.3.6.1.4.1.1991.1.2.2.15.5.1.14 | counter64 | read-only |
Receive-ACL total counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL. |
agAclAccntRaclTotalSWHitCountCnt | 1.3.6.1.4.1.1991.1.2.2.15.5.1.15 | counter64 | read-only |
Receive-ACL cumulative software hit counter. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL. |
fdryL2AclNextClauseTable | 1.3.6.1.4.1.1991.1.2.2.15.6 | no-access |
This read-only table contains the list of next lowest available clause index that can be used for creating a new instance in the fdryL2AclTable. The clause index values will not change as a result of switchovers or hitless upgrades, but may change as a result of a device reload (though the relative order of persistent entries would remain the same). |
|
1.3.6.1.4.1.1991.1.2.2.15.6.1 | no-access |
An entry specifying the next lowest available clause index for this ACL number. |
||
fdryL2AclNextClauseIndex | 1.3.6.1.4.1.1991.1.2.2.15.6.1.1 | fdryclauseindextc | read-only |
The next lowest available clause index for a given ACL number. The maximum value of this object is the configured maximum number of clauses for a L2 ACL. |
fdryL2AclTable | 1.3.6.1.4.1.1991.1.2.2.15.7 | no-access |
Table of Layer 2 Access Control Lists. Layer 2 ACLs filter traffic based on any of the following fields: - Source MAC address and source MAC mask - Destination MAC address and destination MAC mask - VLAN ID - Ethernet type. For a given ACL number, one can have 64 (default) to 256 clauses. The clause index values will not change as a result of switchovers or hitless upgrades, but may change as a result of a device reload (though the relative order of persistent entries would remain the same). |
|
1.3.6.1.4.1.1991.1.2.2.15.7.1 | no-access |
An entry in the L2 Access Control List table. |
||
fdryL2AclNumber | 1.3.6.1.4.1.1991.1.2.2.15.7.1.1 | aclnumber | no-access |
The access-list number for this entry. For L2ACL, the valid values are between 400 and 599. |
fdryL2AclClauseIndex | 1.3.6.1.4.1.1991.1.2.2.15.7.1.2 | fdryclauseindextc | no-access |
The index of the clause within a given ACL number. During row creation, the clause index value should match with the next available clause index for a given ACL number. It is advisable to first do a Get operation on the fdryL2AclNextClauseTable for a given ACL number, and use the value of fdryL2AclNextClauseIndex returned by the agent. |
fdryL2AclAction | 1.3.6.1.4.1.1991.1.2.2.15.7.1.3 | action | read-only |
Action to take if the ingress L2 packet matches this ACL. |
fdryL2AclSourceMac | 1.3.6.1.4.1.1991.1.2.2.15.7.1.4 | macaddress | read-only |
Optional Source MAC address. By default, it matches with any source MAC within a packet. |
fdryL2AclSourceMacMask | 1.3.6.1.4.1.1991.1.2.2.15.7.1.5 | macaddress | read-only |
Optional Source MAC address mask. For Set operation, this object can only be used in conjunction with fdryL2AclSourceMac. By default, it matches with any source MAC within a packet. it matches with any source MAC within a packet. To match on the first two bytes of the address aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all source MAC addresses that contain 'aabb' as the first two bytes and any values in the remaining bytes of the MAC address. |
fdryL2AclDestinationMac | 1.3.6.1.4.1.1991.1.2.2.15.7.1.6 | macaddress | read-only |
Optional destination MAC address. By default, it matches with any destination MAC within a packet. |
fdryL2AclDestinationMacMask | 1.3.6.1.4.1.1991.1.2.2.15.7.1.7 | macaddress | read-only |
Optional destination MAC address mask. For Set operation, this object can only be used in conjunction with fdryL2AclDestinationMac. By default, it matches with any destination MAC within a packet. To match on the first two bytes of the address aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all destination MAC addresses that contain 'aabb' as the first two bytes and any values in the remaining bytes of the MAC address. |
fdryL2AclVlanId | 1.3.6.1.4.1.1991.1.2.2.15.7.1.8 | fdryvlanidornonetc | read-only |
Optional VLAN ID to match against that of the incoming packet. By default, the VLAN ID field is ignored during the match. In this case, value 0 is returned. |
fdryL2AclEthernetType | 1.3.6.1.4.1.1991.1.2.2.15.7.1.9 | fdryenettypeorzerotc | read-only |
Optional Ethernet Type to match against the etype field of the incoming packet. By default, etype field is ignored during the match. |
fdryL2AclDot1pPriority | 1.3.6.1.4.1.1991.1.2.2.15.7.1.10 | portqostc | read-only |
The priority option assigns traffic that matches the ACL to a hardware forwarding queue. In addition to changing the internal forwarding priority, if the outgoing interface is an 802.1q interface, this option maps the specified priority to its equivalent 802.1p (QoS) priority and marks the packet with the new 802.1p priority. This option is applicable for inbound ACLs only. This object is not supported in RX, where it always returns enum value invalid. NOTE: fdryL2AclDot1pPriority following fdryL2AclDot1pPriorityForce cannot be used together in an ACL entry. |
fdryL2AclDot1pPriorityForce | 1.3.6.1.4.1.1991.1.2.2.15.7.1.11 | portqostc | read-only |
The priority-force option assigns packets of outgoing traffic that match the ACL to a specific hardware forwarding queue, even though the incoming packet may be assigned to another queue. This option is applicable for inbound ACLs only. This object is not supported in RX, where it always returns enum value invalid. NOTE: fdryL2AclDot1pPriority following fdryL2AclDot1pPriorityForce cannot be used together in an ACL entry. |
fdryL2AclDot1pPriorityMapping | 1.3.6.1.4.1.1991.1.2.2.15.7.1.12 | portqostc | read-only |
The priority-mapping option matches on the packets 802.1p value. This option does not change the packets forwarding priority through the device or mark the packet. This keyword is applicable for both inbound and outbound ACLs. This object is not supported in RX, where it always returns enum value invalid. |
fdryL2AclMirrorPackets | 1.3.6.1.4.1.1991.1.2.2.15.7.1.13 | truthvalue | read-only |
Mirror packets matching ACL permit clause. |
fdryL2AclLogEnable | 1.3.6.1.4.1.1991.1.2.2.15.7.1.14 | truthvalue | read-only |
Optional parameter to enable logging only when deny clause is specified. Note that traffic denied by implicit deny mechanism is not subject to logging. The implicit deny kicks in when the traffic does not match any of the clauses and there is no 'permit any any' clause specified at the end. |
fdryL2AclRowStatus | 1.3.6.1.4.1.1991.1.2.2.15.7.1.15 | rowstatus | read-only |
The row status variable, used according to installation and removal conventions for conceptual rows. Setting this object to active(1) or createAndGo(4) results in the addition of a L2 ACL filter in the router. Duplicate entry will be rejected during row creation. As part of row creation, we support only appending to this table. Row insertion may not be supported. Setting this object to destroy(6) removes the associated filter from the router. Other values in the enumeration are not used. |
fdryL2AclIfBindTable | 1.3.6.1.4.1.1991.1.2.2.15.8 | no-access |
Table of L2 ACL binding to port. - One cannot bind Layer 2 ACLs and Layer 3 ACLs to the same port. However, one can configure a port to use Layer 2 ACLs, and another port on the same device to use Layer 3 ACLs. - In general, Layer 2 ACLs cannot be bound to virtual interfaces, unlike L3 ACLs. - One cannot modify an existing Layer 2 ACL clause. For that, one must unbind the ACL, delete it and make a new clause. |
|
1.3.6.1.4.1.1991.1.2.2.15.8.1 | no-access |
An entry in the L2ACL binding table which lists the ACL bindings to a port. |
||
fdryL2AclIfBindDirection | 1.3.6.1.4.1.1991.1.2.2.15.8.1.1 | direction | no-access |
Direction in which this ACL should be applied on this port. |
fdryL2AclIfBindAclNumber | 1.3.6.1.4.1.1991.1.2.2.15.8.1.2 | unsigned32 | read-only |
The ACL number that is to be bound to given physical interface. The valid values for L2 numbered ACLs are between 400 and 599. |
fdryL2AclIfBindRowStatus | 1.3.6.1.4.1.1991.1.2.2.15.8.1.3 | rowstatus | read-only |
The row status variable, used according to installation and removal conventions for conceptual rows. Setting this object to active(1) or createAndGo(4) results in the binding of a L2 ACL with a given physical port. Setting this object to destroy(6) unbinds this L2 ACL from the port. Other values in the enumeration are not used. |
brcdPbrAclAccntTable | 1.3.6.1.4.1.1991.1.2.2.15.9 | no-access |
Table of PBR ACL Accounting Statistics for router. |
|
1.3.6.1.4.1.1991.1.2.2.15.9.1 | no-access |
An entry in the PBR ACL-binding-to-port table. |
||
brcdPbrAclAccntKind | 1.3.6.1.4.1.1991.1.2.2.15.9.1.1 | integer | no-access |
Kind of PBR ACL Accounting statistics needed. Enumeration: 'ipv4PolicyBasedRouting': 1, 'ipv6PolicyBasedRouting': 2. |
brcdPbrAclAccntIfIndex | 1.3.6.1.4.1.1991.1.2.2.15.9.1.2 | interfaceindex | no-access |
Physical or virtual interface on which ACL accounting is desired |
brcdPbrSerialNumber | 1.3.6.1.4.1.1991.1.2.2.15.9.1.3 | integer | no-access |
This is a running number and may change if an acl or routemap is modified |
brcdPbrAclAccntAclInfo | 1.3.6.1.4.1.1991.1.2.2.15.9.1.4 | displaystring | read-only |
This contains ACL Number, ACL Name, ACL Filter Id, last five minutes and cumulative accounting data since the ACL was installed. Each field is separated by a pipe character i.e. 5MIN|CUMULATIVE|ACL Number|ACL Filter Id|ACL Name |