polAclServer |
.1.3.6.1.4.1.52.2501.1.12.1 |
This is true when Access Control Lists (ACLs) are defined by a
Policy Server else false.
At boot, this value is false. After the first valid set of any
policy object, the value changes to true.
|
polAclNumber |
.1.3.6.1.4.1.52.2501.1.12.2 |
The number of Layer 3 Access Control Lists defined in the SSR.
|
polAclLastChanged |
.1.3.6.1.4.1.52.2501.1.12.3 |
The time the Access Control List were last changed.
|
polAclEntry |
.1.3.6.1.4.1.52.2501.1.12.4.1 |
A record containing a Access Control List.
|
polAclServiceNumber |
.1.3.6.1.4.1.52.2501.1.12.5 |
The number of Layer 3 Access Control Lists in service in the SSR.
|
polAclServiceLastChanged |
.1.3.6.1.4.1.52.2501.1.12.6 |
The time the ACLs in service were last changed.
|
polAclServiceEntry |
.1.3.6.1.4.1.52.2501.1.12.7.1 |
A record containing a Access Control Lists applied to Interfaces.
|
polAclRemoteAllowed |
.1.3.6.1.4.1.52.2501.1.12.9 |
Remote Policy Configuration is allowed when true only
local (to SSR) policy may be applied.
|
polAclInterfaceNumber |
.1.3.6.1.4.1.52.2501.1.12.10 |
The number of Layer 3 Interfaces in service in the SSR.
|
polAclInterfaceLastChanged |
.1.3.6.1.4.1.52.2501.1.12.11 |
The time the Interfaces in service were last changed with regard to policy.
|
polAclInterfaceEntry |
.1.3.6.1.4.1.52.2501.1.12.12.1 |
A record containing a Access Control Lists applied to Interfaces.
|
polL2FilterNumber |
.1.3.6.1.4.1.52.2501.1.16.1 |
The number of Layer 3 Access Control Lists defined in the SSR.
|
polL2FilterLastChanged |
.1.3.6.1.4.1.52.2501.1.16.2 |
The time the Access Control List were last changed.
|
polL2FilterEntry |
.1.3.6.1.4.1.52.2501.1.16.3.1 |
An entry containing a layer 2 filter.
|
polL2Dot1qVlanStaticEntry |
.1.3.6.1.4.1.52.2501.1.16.4.1 |
An entry containing additional hardware
specific objects for a dot1qVlanStaticEntry.
|
polL4PolicyBasedRoutingEnabled |
.1.3.6.1.4.1.52.2501.1.15.1 |
The state of Policy Based Routing on this network element.
|
polL4NumRouters |
.1.3.6.1.4.1.52.2501.1.15.5 |
The number of next hop routers currently available.
|
polL4NextHopTableLastChange |
.1.3.6.1.4.1.52.2501.1.15.10 |
The value of sysUpTime when a row was last added
or deleted from polL4NextHopTable.
|
polL4NextHopEntry |
.1.3.6.1.4.1.52.2501.1.15.20.1 |
An entry contains the status of a next hop router.
|
polL4lowControlTableLastChange |
.1.3.6.1.4.1.52.2501.1.15.25 |
The value of sysUpTime when a row was last added or deleted from polL4lowControlTable.
|
polL4NumPolicies |
.1.3.6.1.4.1.52.2501.1.15.26 |
The number of policies currently available.
|
polL4lowControlEntry |
.1.3.6.1.4.1.52.2501.1.15.30.1 |
This table is an ordered collection of route policies. For SSR, this maps
to the command: ip-policy Name [permit|deny] acl acl-list
|
polL4lowLostRouters |
.1.3.6.1.4.1.52.2501.1.15.35.1 |
The count of times routers were disabled from NextHopTable due to lost contact.
|
polL4lowControlTableActivates |
.1.3.6.1.4.1.52.2501.1.15.35.2 |
The count of successful activations of flow control policies made.
|
polL4lowControlTableActivateFails |
.1.3.6.1.4.1.52.2501.1.15.35.3 |
The count of unsuccessful flow control policies made.
|
polL4lowArpMappingChanges |
.1.3.6.1.4.1.52.2501.1.15.35.4 |
The count of mac to next hop IP address mapping changes
affecting policy based route tables.
|
polL4lowIcmpRedirects |
.1.3.6.1.4.1.52.2501.1.15.35.16 |
The count of next hop route redirects received that
match a policy in the polL4lowControlTable.
This can help to determine if bad route policies are in effect.
|
polL4lowMatchAttempts |
.1.3.6.1.4.1.52.2501.1.15.35.17 |
The count of total number of policy based flow lookups
made against policy based route table.
|
polAclName |
.1.3.6.1.4.1.52.2501.1.12.4.1.1 |
The administratively assigned name to this static route entry.
|
polAclItem |
.1.3.6.1.4.1.52.2501.1.12.4.1.2 |
This row's unique identifier within a given ACL set. Member of the ACL set
are numbered from 1 to 256. If Item is set to 0, and rowStatus is destroy,
all rows for this set are destroyed.
|
polAclRestriction |
.1.3.6.1.4.1.52.2501.1.12.4.1.3 |
The permissions/restrictions given to this static route entry.
|
polAclProtocol |
.1.3.6.1.4.1.52.2501.1.12.4.1.4 |
The IETF protocol this ACL applies to.
|
polAclSrcIp |
.1.3.6.1.4.1.52.2501.1.12.4.1.5 |
The source L3 IP Address this ACL applies to.
|
polAclSrcMask |
.1.3.6.1.4.1.52.2501.1.12.4.1.6 |
The source L3 IP Mask this ACL Applies to.
|
polAclDstIp |
.1.3.6.1.4.1.52.2501.1.12.4.1.7 |
The source L3 IP Address this ACL applies to.
|
polAclDstMask |
.1.3.6.1.4.1.52.2501.1.12.4.1.8 |
The source L3 IP Mask this ACL Applies to.
|
polAclTOS |
.1.3.6.1.4.1.52.2501.1.12.4.1.9 |
The source L3 IP Type of Service field.
|
polAclSrcPort |
.1.3.6.1.4.1.52.2501.1.12.4.1.10 |
The source L3 IP source port/socket ACL applies to.
|
polAclDstPort |
.1.3.6.1.4.1.52.2501.1.12.4.1.11 |
The source L3 IP destination port/socket ACL applies to.
|
polAclSrcOperator |
.1.3.6.1.4.1.52.2501.1.12.4.1.12 |
polAclSrcPort is compared using this operator.
|
polAclDstOperator |
.1.3.6.1.4.1.52.2501.1.12.4.1.13 |
polAclDstPort is compared using this operator.
|
polAclSrcHighRange |
.1.3.6.1.4.1.52.2501.1.12.4.1.14 |
The high range source L3 IP port. Used
only when SrcOperator == range. polAclSrcPort is
used as the lower bounds of the range.
|
polAclDstHighRange |
.1.3.6.1.4.1.52.2501.1.12.4.1.15 |
The high range destination L3 IP port. Used
only when SrcOperator == range. polAclDstPort is
used as the lower bounds of the range.
|
polAclAuditTrail |
.1.3.6.1.4.1.52.2501.1.12.4.1.16 |
Flows matching this ACL are logged for Accounting when true.
|
polAclCheckpoint |
.1.3.6.1.4.1.52.2501.1.12.4.1.17 |
How long to keep flow at which point a checkpoint should be done.
A checkpoint may trigger earlier than this time should the maximum
batch size be reached.
|
polAclRowStatus |
.1.3.6.1.4.1.52.2501.1.12.4.1.18 |
SNMP V2 RowStatus control for this table.
|
polAclServiceIfIndex |
.1.3.6.1.4.1.52.2501.1.12.7.1.1 |
The ifIndex of the IP Interface the ACL is applied to.
An SSR IP Interface has ifType 142
|
polAclName2 |
.1.3.6.1.4.1.52.2501.1.12.7.1.2 |
The name of the ACL applied to the particular port.
|
polAclServiceDirection |
.1.3.6.1.4.1.52.2501.1.12.7.1.3 |
The direction the ACL is applied to the particular port.
|
polAclServiceRowStatus |
.1.3.6.1.4.1.52.2501.1.12.7.1.6 |
SNMP V2 RowStatus control for this table.
|
polAclInterfaceIfIndex |
.1.3.6.1.4.1.52.2501.1.12.12.1.1 |
The ifIndex of the IP Interface the ACL is applied to.
|
polAclInterfaceDirection |
.1.3.6.1.4.1.52.2501.1.12.12.1.2 |
The direction the ACL is applied to the particular port.
|
polAclPolicyStatus |
.1.3.6.1.4.1.52.2501.1.12.12.1.3 |
Rules for what type of management can apply ACLs to a particular interface. If set to remote,
then a Policy Manager via SNMP may change dynamically the ACLs applied to an interface. Note,
ACLs applied dynamically are not maintained across system reboot. Use local ACLs to setup the basic
rules then apply dynamic rules as necessary.
|
polL2FilterIndex |
.1.3.6.1.4.1.52.2501.1.16.3.1.1 |
A unique index into the table representing a single filter entry. This value
will remain unique and the relationship between the index and the underlying filter
is valid until the next reboot.
|
polL2FilterDesc |
.1.3.6.1.4.1.52.2501.1.16.3.1.2 |
A string used to describe the filter. It should contain
the creator IP address, and other descriptive information about the filter.
It is recommended that names be unique within a given filter type.
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterType |
.1.3.6.1.4.1.52.2501.1.16.3.1.3 |
The types of filters, as explained below.
static-entry
Based on the restrictions and the presence of
source, destination MAC address they can be of
three types :
source-static-entry - All frames with a source
address equal to srcMAC, coming through any of
the inPorts will be allowed/disallowed to go
to any port that is a member of the outPorts
list.
destination-static-entry - All frames with a
destination address equal to dstMAC, coming
through any of the inPorts will be allowed/
disallowed/forced to go to any port that is a
member of the outPorts list.
flow-static-entry - All frames with a source
address equal to srcMAC and a destination address
equal to dstMAC, coming through any of the inPorts
list will be allowed/disallowed to go to any port
that is a member of the outPorts list. Ports
must be in flow-bridging mode in order to use
filters with both src and dst mac specified.
address-filter
Based on the restrictions and the presence of
source, destination MAC address they can be of
three types :
source-address-filter - All frames with a source
address equal to srcMAC, coming through any of
the inPorts will be filtered out.
destination-address-filter - All frames with a
destination address equal to dstMAC, coming through
any of the inPorts will be filtered out.
flow-filter - All frames with a source address equal
to srcMAC and a destination address equal to dstMAC,
coming through any of the inPorts list will be
filtered out. Ports must be in flow mode in order
to set a filter using both source and destination
address.
port-address-lock
This locks a source address to a port. It allows
learning of srcMAC addresses only on any of the ports
in inPorts. The following objects are mandatory
and must be set by mgmt station to activate a row:
polL2FilterDesc, polL2FilterSrcMacAddr, polL2FilterInPorts
secure-port
This blocks all traffic in a given direction to a port.
Used with static entries, it is effective in allowing only
certain well defined source/destination mac addresses.
The following objects must be set by mgmt station to
activate an entry:
polL2FilterDesc, r, polL2FilterInPorts
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterRestrictions |
.1.3.6.1.4.1.52.2501.1.16.3.1.4 |
The first 3 restrictions, allow, disallow, force apply when the filterType
is static-entry. When polL2FilterType is addressFilter or portAddressLock,
this object does not apply. For securePort, the blockIngress, blockEgress
values apply.
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterSrcMacAddr |
.1.3.6.1.4.1.52.2501.1.16.3.1.5 |
The source MAC address, which is present in case
of a Flow, that has been learned by the switch.
|
polL2FilterDstMacAddr |
.1.3.6.1.4.1.52.2501.1.16.3.1.6 |
The destination MAC address which has been learned.
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterVlanId |
.1.3.6.1.4.1.52.2501.1.16.3.1.7 |
The VLAN the destination MAC address belongs to. The default VLAN
is id 1 on SSR.
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterInPorts |
.1.3.6.1.4.1.52.2501.1.16.3.1.8 |
The set of Ports to which this filter applies on input.
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterOutPorts |
.1.3.6.1.4.1.52.2501.1.16.3.1.9 |
The set of ports to which this filter applies on output.
This object may not be modified if the associated.
polL2FilterStatus object is equal to active(1).
|
polL2FilterCreationTime |
.1.3.6.1.4.1.52.2501.1.16.3.1.10 |
The value of sysUpTime when this filter was made active(1).
|
polL2FilterStatus |
.1.3.6.1.4.1.52.2501.1.16.3.1.11 |
SMIv2 RowStatus control for this table. Use createAndWait or createAndGo
to create a filter, use destroy to remove an entry or notInService to
disengage a filter without destroying it. A row in the notReady state has
not had all the mandatory objects set.
|
polL2Dot1qVlanStaticProtocols |
.1.3.6.1.4.1.52.2501.1.16.4.1.1 |
Specifies the types of traffic that will be forwarded on this VLAN.
Protocols not set in this definition will be filtered. The types of protocols
supported on this VLAN corresponds to the type option in the CLI command
vlan create <vlan name> <type>. If no protocols are specified, all
protocols are forwarded. This corresponds to the port-based CLI
option.
reserved(0) - this bit is reserved and has no defined behavior.
bridged-protocols(1) - this VLAN supports all bridged protocols
excluding IP and IPX. Includes appletalk(4), dec(5), sna(6), and
ipv6(7) if none of these protocols are set. If any are set, only
those that are set are included.
ip(2) - this VLAN supports IP protocol.
ipx(3) - this VLAN supports IPX protocol.
appletalk(4) - this VLAN supports Appletalk protocol.
dec(5) - this VLAN supports DEC protocol.
sna(6) - this VLAN supports SNA protocol.
ipv6(7) - this VLAN supports IPv6 protocol.
|
polL2Dot1qVlanStaticL4Bridging |
.1.3.6.1.4.1.52.2501.1.16.4.1.2 |
If this object has a value of false(2), the L4 Bridging feature is not
enabled on this VLAN. If this object has a value of true(1), the L4 Bridging
feature is enabled for this VLAN. This corresponds to the CLI command
vlan enable l4-bridging.
|
polL4NextHopRouter |
.1.3.6.1.4.1.52.2501.1.15.20.1.1 |
The IP Address of the next hop router flow will be sent to.
|
polL4NextHopState |
.1.3.6.1.4.1.52.2501.1.15.20.1.2 |
The current status of the polL4NextHopRouter.
If no entry found when a policy route is activated,
then arp for the request the state will be waitingForArp(2).
If a reply is found the state will go to macAcquired(3)
else noArpReply(4). If NextHop is not local, mac is actual
nexthop router.
|
polL4NextHopPortOfExit |
.1.3.6.1.4.1.52.2501.1.15.20.1.3 |
IfIndex of port we learned this router on or else zero if not known.
|
polL4NextHopMacAddress |
.1.3.6.1.4.1.52.2501.1.15.20.1.4 |
MAC Address of next hop router learned from ARP.
|
polL4NextHopLastChange |
.1.3.6.1.4.1.52.2501.1.15.20.1.5 |
The value of sysUpTime when this polL4NextHopState changed.
|
polL4PolicyName |
.1.3.6.1.4.1.52.2501.1.15.30.1.1 |
A unique name for this flow policy.
|
polL4PolicySequence |
.1.3.6.1.4.1.52.2501.1.15.30.1.2 |
The evaluation order of this object. When two objects have the same value,
the value of the instance value decides which is evaluated first.
than higher numbers.
|
polL4PolicyInstance |
.1.3.6.1.4.1.52.2501.1.15.30.1.3 |
The sequence of this policy based route. Lower numbers have higher precedence
than higher numbers.
|
polL4PolicyType |
.1.3.6.1.4.1.52.2501.1.15.30.1.4 |
Controls if packets are forwarded or not for this policy.
|
polL4PolicyAction |
.1.3.6.1.4.1.52.2501.1.15.30.1.5 |
Define when this policy should be used during normal packet forwarding process.
|
polL4PolicyMatch |
.1.3.6.1.4.1.52.2501.1.15.30.1.6 |
Up to twenty (20) separate ACLs may be defined to match for this policy.
This object is mandatory. Use active row from polAclTable.
|
polL4PolicyNextHops |
.1.3.6.1.4.1.52.2501.1.15.30.1.7 |
Up to for IpAddresses may be specified to route data to next. Load balancing
If more than one next hop ip address is specified, the default load balancing
scheme is round robin. This object is mandatory. Use objects from polL4NextHopTable.
|
polL4PolicyLoading |
.1.3.6.1.4.1.52.2501.1.15.30.1.8 |
When more than one next hop is defined and available, set loading policy here.
|
polL4PolicyWatch |
.1.3.6.1.4.1.52.2501.1.15.30.1.9 |
When True, use icmp echo to actively maintain status of next hop. This
is useful to prevent data sinks with static routes.
|
polL4lowCreationTime |
.1.3.6.1.4.1.52.2501.1.15.30.1.10 |
The value of sysUpTime when policy went was created then activated.
|
polL4lowActiveGates |
.1.3.6.1.4.1.52.2501.1.15.30.1.11 |
The number of currently active nexthop gateways.
|
polL4lowAppliedTimes |
.1.3.6.1.4.1.52.2501.1.15.30.1.12 |
The number of times this policy was used.
|
polL4lowControlStatus |
.1.3.6.1.4.1.52.2501.1.15.30.1.13 |
Entries in active state cause a flow to remain programmed with the next hop router specified.
If the next hop router goes down, the rowStatus will become inactive. New flows that match this
specification will assume this next hop router over any other route directive.
This assumes polL4PolicyBasedRouteState value is true.
|