FOUNDRY-SN-IP-ACL-MIB: View SNMP OID List / Download MIB

VENDOR: BROCADE


 Home MIB: FOUNDRY-SN-IP-ACL-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 snAgAcl 1.3.6.1.4.1.1991.1.2.2.15
Copyright 1996-2010 Brocade Communications Systems, Inc. All rights reserved. This Brocade Communications Systems SNMP Management Information Base Specification embodies Brocade Communications Systems' confidential and proprietary intellectual property. Brocade Communications Systems retains all title and ownership in the Specification, including any revisions. This Specification is supplied AS IS, and Brocade Communications Systems makes no warranty, either express or implied, as to the use, operation, condition, or performance of the specification, and any unintended consequence it may on the user environment.
       snAgAclGlobal 1.3.6.1.4.1.1991.1.2.2.15.1
           snAgAclGblCurRowIndex 1.3.6.1.4.1.1991.1.2.2.15.1.1 integer32 read-only
The current row index of the ACL table entry.
           snAgAclGblAcctEnable 1.3.6.1.4.1.1991.1.2.2.15.1.2 integer read-write
Specifies the administration status of the ACL accounting. This object is not supported in CES/CER platforms. Enumeration: 'disabled': 0, 'enabled': 1.
           snAgAclGblIfIPv4AcctClear 1.3.6.1.4.1.1991.1.2.2.15.1.3 interfaceindexorzero read-write
Clears the IPv4 ACL accounting information for the given interface. If the value is 0 then it clears IPv4 ACL accounting information for all the interfaces.
           snAgAclGblIfIPv6AcctClear 1.3.6.1.4.1.1991.1.2.2.15.1.4 interfaceindexorzero read-write
Clears the IPv6 ACL accounting information for the given interface. If the value is 0 then it clears IPv6 accounting information for all the interfaces.
           snAgAclGblRebindAclNumber 1.3.6.1.4.1.1991.1.2.2.15.1.5 aclnumber read-write
The access-list number for rebind
           snAgAclGblRebindAclName 1.3.6.1.4.1.1991.1.2.2.15.1.6 displaystring read-write
The access-list name for rebind.
           brcdPbrAclAccntFilterAclName 1.3.6.1.4.1.1991.1.2.2.15.1.7 displaystring read-write
This object can be used to control the content of brcdPbrAclAccntTable. Any ACL filter that has a full or partial match with ACL name will not be returned in the brcdPbrAclAccntTable. If not specified, the default value is null and all ACL filters will be returned by the table.
           brcdPbrAclAccntCounterType 1.3.6.1.4.1.1991.1.2.2.15.1.8 integer read-write
This contains ACL Number, ACL Name, ACL Filter Id, last five minutes and cumulative accounting data since the ACL was installed. Each field is separated by a pipe character i.e. 5MIN|CUMULATIVE|ACL Number|ACL Filter Id|ACL Name Depending on the value of brcdPbrAclAccntCounterType the corresponding counter will have the value while the other is zero. Enumeration: 'cumulative': 1, 'last5min': 2.
       snAgAclTable 1.3.6.1.4.1.1991.1.2.2.15.2 no-access
Table of Access Control List
           snAgAclEntry 1.3.6.1.4.1.1991.1.2.2.15.2.1 no-access
An entry in the IP access control list table.
               snAgAclIndex 1.3.6.1.4.1.1991.1.2.2.15.2.1.1 integer32 read-only
The Access control list item number for an entry. This is a unique number that identifies different Access list entries combined with the Access list name and Access list number. This one has to be unique even though the name and number are not unique for a given Access list with same or different source address, subnet mask, destination address and destination mask, protocol type, action (permit/deny) type and the operator (neq, eq, gt and, lt) which makes the index a unique tuple (name, number, itemnumber).
               snAgAclNumber 1.3.6.1.4.1.1991.1.2.2.15.2.1.2 aclnumber read-write
The access-list number for this entry.
               snAgAclName 1.3.6.1.4.1.1991.1.2.2.15.2.1.3 displaystring read-write
ACL name for an entry.
               snAgAclAction 1.3.6.1.4.1.1991.1.2.2.15.2.1.4 action read-write
Action to take if the ip packet matches with this access control list.
               snAgAclProtocol 1.3.6.1.4.1.1991.1.2.2.15.2.1.5 ipprotocol read-write
Transport protocol. Valid values for the IP protocol are: 0 = any IP protocol 1 = ICMP 2 = IGMP 3 = ggp 4 = ipencap 5 = st2 6 = TCP 7 = cbt 8 = egp 9 = igp 10 = bbn_rcc 11 = nvp 12 = pup 13 = argus 14 = emcon 15 = xnet 16 = chaos 17 = UDP 18 = mux 19 = dcn 20 = hmp 21 = prm 22 = xns_idp 23 = trunk1 24 = trunk2 25 = leaf1 26 = leaf2 27 = rdp 28 = irtp 29 = iso_tp4 30 = netblt 31 = mfe_nsp 32 = merit_inp 33 = sep 34 = threepc 35 = idpr 36 = xtp 37 = ddp 38 = idpr_cmtp 39 = tppp 40 = il 41 = ipv6 42 = sdrp 43 = ipv6_route 44 = ipv6_frag 45 = idrp 46 = rsvp 47 = gre 48 = mhrp 49 = bna 50 = esp 51 = ahp 52 = inlsp 53 = swipe 54 = narp 55 = mobile 56 = tlsp 57 = skip 58 = ipv6_icmp 59 = ipv6_nonxt 60 = ipv6_opts 62 = cftp 64 = sat_expak 65 = kryptolan 66 = rvd 67 = ippc 69 = sat_mon 70 = visa 71 = ipcv 72 = cpnx 73 = cphb 74 = wsn 75 = pvp 76 = br_sat_mon 77 = sun_nd 78 = wb_mon 79 = wb_expak 80 = iso_ip 81 = vmtp 82 = secure_vmtp 83 = vines 84 = ttp 85 = nsfnet_igp 86 = dgp 87 = tcf 88 = IGRP 89 = OSPF 90 = sprite_rpc 91 = larp 92 = mtp 93 = ax25 94 = ipip 95 = micp 96 = scc_sp 97 = etherip 98 = encap 100 = gmtp 101 = ifmp 102 = pnni 103 = pim 104 = aris 105 = scps 106 = qnx 107 = an 108 = ipcomp 109 = snp 110 = compaq_peer 111 = ipxinip 112 = vrrp 113 = pgm 115 = l2tp 116 = ddx 117 = iatp 118 = st 119 = srp 120 = uti 121 = smp 122 = sm 123 = ptp 124 = isis 125 = fire 126 = crtp 127 = crdup 128 = sscopmce 129 = iplt 130 = sps 131 = pipe 132 = sctp 133 = fc 134 = rsvp_e2e_ignore 135 = mobility_header 136 = udplite 137 = mpls_in_ip 138 = manet 139 = hip 140 = shim6 254 = divert
               snAgAclSourceIp 1.3.6.1.4.1.1991.1.2.2.15.2.1.6 ipaddress read-write
Source IP address.
               snAgAclSourceMask 1.3.6.1.4.1.1991.1.2.2.15.2.1.7 ipaddress read-write
Source IP subnet mask.
               snAgAclSourceOperator 1.3.6.1.4.1.1991.1.2.2.15.2.1.8 operator read-write
Type of comparison to perform. For now, this only applys to tcp or udp to compare the port number
               snAgAclSourceOperand1 1.3.6.1.4.1.1991.1.2.2.15.2.1.9 integer read-write
For now this only refers to transport protocol port number. 0 means NA
               snAgAclSourceOperand2 1.3.6.1.4.1.1991.1.2.2.15.2.1.10 integer read-write
For now this only refers to transport protocol port number. Used in ICMP Protocol to convey the ICMP Type value. 0 means NA. Valid values for ICMP Type: 1 = Echo reply 4 = Destination unreachable 5 = Source quench 6 = Redirect 9 = Echo request 10=Router advertisement 11=Router solicitation 12=Time exceeded 13=Parameter problem 14=Timestamp request 15=Timestamp reply 16=Information request 17=Information reply 18=Address mask request 19=Address mask reply.
               snAgAclDestinationIp 1.3.6.1.4.1.1991.1.2.2.15.2.1.11 ipaddress read-write
Destination IP address.
               snAgAclDestinationMask 1.3.6.1.4.1.1991.1.2.2.15.2.1.12 ipaddress read-write
Destination IP subnet mask.
               snAgAclDestinationOperator 1.3.6.1.4.1.1991.1.2.2.15.2.1.13 operator read-write
Type of comparison to perform. For now, this only applys to tcp or udp to compare the port number
               snAgAclDestinationOperand1 1.3.6.1.4.1.1991.1.2.2.15.2.1.14 integer read-write
For now this only refers to transport protocol port number. 0 means NA
               snAgAclDestinationOperand2 1.3.6.1.4.1.1991.1.2.2.15.2.1.15 integer read-write
For now this only refers to transport protocol port number. 0 means NA
               snAgAclPrecedence 1.3.6.1.4.1.1991.1.2.2.15.2.1.16 precedencevalue read-write
This refers to IP precedence value in the range <0-7> critical(5), flash(3), flash-override(4), immediate(2), internet(6), network(7), priority(1), routine(0)
               snAgAclTos 1.3.6.1.4.1.1991.1.2.2.15.2.1.17 tosvalue read-write
This refers to the IP type of service value in range <0-15>, which is the sum of numeric vlaues of the following options - match packets with maximum reliability TOS (2) match packets with maximum throughput TOS (4) match packets with minimum delay (8) match packets with minimum monetary cost TOS (1) match packets with normal TOS (0)
               snAgAclEstablished 1.3.6.1.4.1.1991.1.2.2.15.2.1.18 rtrstatus read-write
Enable/Disable the filtering of established TCP packets of which the ACK or RESET flag is on. This additional filter only applies to TCP transport protocol.
               snAgAclLogOption 1.3.6.1.4.1.1991.1.2.2.15.2.1.19 truthval read-write
Log flag
               snAgAclStandardFlag 1.3.6.1.4.1.1991.1.2.2.15.2.1.20 truthval read-write
Return whether the ACL is standard or extended, 1 for standard ACL
               snAgAclRowStatus 1.3.6.1.4.1.1991.1.2.2.15.2.1.21 snrowstatus read-write
To create or delete a access list entry.
               snAgAclFlowCounter 1.3.6.1.4.1.1991.1.2.2.15.2.1.22 counter64 read-only
Approximate count of flows matching individual ACL entry.
               snAgAclPacketCounter 1.3.6.1.4.1.1991.1.2.2.15.2.1.23 counter64 read-only
Accurate count of packets matching individual ACL entry.
               snAgAclComments 1.3.6.1.4.1.1991.1.2.2.15.2.1.24 displaystring read-write
Remark description of individual ACL entry.
               snAgAclIpPriority 1.3.6.1.4.1.1991.1.2.2.15.2.1.25 integer read-write
QoS priority option for IP ACL entry.
               snAgAclPriorityForce 1.3.6.1.4.1.1991.1.2.2.15.2.1.26 integer read-write
Force packet outgoing priority. Not defined(4)
               snAgAclPriorityMapping 1.3.6.1.4.1.1991.1.2.2.15.2.1.27 integer read-write
Map incoming packet priority. Not defined(8)
               snAgAclDscpMarking 1.3.6.1.4.1.1991.1.2.2.15.2.1.28 integer read-write
Mark packets with given DSCP value. Not defined(64)
               snAgAclDscpMapping 1.3.6.1.4.1.1991.1.2.2.15.2.1.29 integer read-write
Map incoming DSCP value. Not defined(64)
               snAgAclIcmpCode 1.3.6.1.4.1.1991.1.2.2.15.2.1.30 integer read-write
ICMP Message Code value. Used in combination with ICMP Message Type (use snAgAclSourceOperand2) to setup an ICMP filter. This object is not used with any other protocol. 0 means NA. Supported values Type: Echo reply -------------- 1 = Echo reply Type: Destination unreachable ------------------------- 1 = Network unreachable 2 = Host unreachable 3 = Protocol unreachable 4 = Port unreachable 5 = Fragmentation needed by don't fragment bit set 6 = Source route failed 7 = Destination network unknown 8 = Destination host unknown 9 = Source host isolated 10 = Destination network administratively prohibited 11=Destination host administratively prohibited 12=Network unreachable for TOS 13=Host unreachable for TOS 14=Communication administratively prohibited by filter 15=Host precedence violation 16=Precedence cutoff in effect Type: Source quench ------------------ 1 = Source quench Type: Redirect ------------ 1 = Redirect for network 2 = Redirect for host 3 = Redirect for TOS and network 4 = Redirect for TOS and host Type: Echo request ----------------- 1 = Echo request Type: Router advertisement ------------------------ 1 = Router advertisement Type: Router solicitation --------------------- 1 = Router solicitation Type: Time exceeded ------------------ 1 = Time to live equals 0 during transmit 2 = Time to live equals 0 during reassembly Type: Parameter problem --------------------- 1 = IP header bad (catchall error) 2 = Required option missing Type: Timestamp request ---------------------- 1 = Timestamp request Type: Timestamp reply ------------------- 1 = Timestamp reply Type: Information request ---------------------- 1 = Information request Type: Information reply -------------------- 1 = Information reply Type: Address mask request ------------------------ 1 = Address mask request Type: Address mask reply ---------------------- 1 = Address mask reply
               snAgAclParameters 1.3.6.1.4.1.1991.1.2.2.15.2.1.31 bits read-write
This mask represents multiple parameters configured for this ACL. Bit 0 specified in the BITS construct is the MS bit of the first octet. Bit 0: Match fragmented IP packets Bit 1: Match non-fragmented IP packets Bit 2: Match only TCP packets with SYN Bit set. Valid only if snAgAclSourceOperator or snAgAclDestinationOperator is set to TCP. Bit 3: Permit packets that fail RPF check Bit 4: Mirror packets matching ACL permit clause Bit 5: Send packets matching ACL permit clause to sFlow collector Bit 6: Set dscp-mapping. The value is given by snAgAclDscpMarking Bit 7: Set dscp-marking. The value is given by snAgAclDscpMapping Bits: 'mirrorPermitPackets': 4, 'dscpMappingFlagSet': 6, 'dscpMarkingFlagSet': 7, 'sendPermitPacketsToSflowCollector': 5, 'matchFragmentedPackets': 0, 'permitFailedRPFCheckPackets': 3, 'matchTcpSynSetPackets': 2, 'matchNonFragmentedPackets': 1.
               snAgAclVlanId 1.3.6.1.4.1.1991.1.2.2.15.2.1.32 fdryvlanidornonetc read-only
Optional VLAN ID to match against that of the incoming packet. By default, the VLAN ID field is ignored during the match. In this case, value 0 is returned.
               snAgAclClauseString 1.3.6.1.4.1.1991.1.2.2.15.2.1.33 displaystring read-only
Returns the equivalent filter clause string.
       snAgAclBindToPortTable 1.3.6.1.4.1.1991.1.2.2.15.3 no-access
Table of ACL binding to port for router
           snAgAclBindToPortEntry 1.3.6.1.4.1.1991.1.2.2.15.3.1 no-access
An entry in the ACL-binding-to-port table.
               snAgAclPortNum 1.3.6.1.4.1.1991.1.2.2.15.3.1.1 integer32 read-only
Binding-to port num, either physical port or virtual interface.
               snAgAclPortBindDirection 1.3.6.1.4.1.1991.1.2.2.15.3.1.2 direction read-only
ACL port direction, inbound or outbound
               snAgAclNum 1.3.6.1.4.1.1991.1.2.2.15.3.1.3 integer32 read-write
Defined ACL number
               snAgAclNameString 1.3.6.1.4.1.1991.1.2.2.15.3.1.4 displaystring read-write
Defined ACL name
               snAgBindPortListInVirtualInterface 1.3.6.1.4.1.1991.1.2.2.15.3.1.5 octet string read-write
Port list for binding virtual interface
               snAgAclPortRowStatus 1.3.6.1.4.1.1991.1.2.2.15.3.1.6 snrowstatus read-write
To create or delete a ACL port entry.
       snAgAclIfBindTable 1.3.6.1.4.1.1991.1.2.2.15.4 no-access
Table of ACL binding to port for router
           snAgAclIfBindEntry 1.3.6.1.4.1.1991.1.2.2.15.4.1 no-access
An entry in the ACL-binding-to-port table.
               snAgAclIfBindIndex 1.3.6.1.4.1.1991.1.2.2.15.4.1.1 interfaceindex read-only
Binding-to port num, either physical port or virtual interface.
               snAgAclIfBindDirection 1.3.6.1.4.1.1991.1.2.2.15.4.1.2 direction read-only
ACL port direction, inbound or outbound
               snAgAclIfBindNum 1.3.6.1.4.1.1991.1.2.2.15.4.1.3 integer read-only
The id of the IPv4 ACL bound to this Interface (0 represents named ACL)
               snAgAclIfBindName 1.3.6.1.4.1.1991.1.2.2.15.4.1.4 displaystring read-only
The name of the IPv4 ACL name bound to this Interface
               snAgAclIfBindVifPortList 1.3.6.1.4.1.1991.1.2.2.15.4.1.5 octet string read-only
This object specifies the port list for binding virtual interface. Each port index is an ifIndex, if there are consecutive 4 or more ifIndex then, they will be encoded like below. Encoding and decoding scheme is range based: Each range prefix with 0000 (2 octets) where 0000 is not valid ifIndex. Next 2 octets indicates lower range ifIndex, followed by 2 octets of higher range ifIndex. Individual(non range) ones will be displayed as it is. Ex: port list: 0001..0005 0015 0032..0047 Port list in PDU: 0000 0001 0005 000f 0000 0020 002f.
               snAgAclIfBindRowStatus 1.3.6.1.4.1.1991.1.2.2.15.4.1.6 snrowstatus read-only
To create or delete a ACL port entry.
               snAgAclIfBindDenyLogging 1.3.6.1.4.1.1991.1.2.2.15.4.1.7 integer read-only
Enable or disable deny logging. Enumeration: 'enable': 1, 'disable': 0.
               snAgAclIfIpv6BindName 1.3.6.1.4.1.1991.1.2.2.15.4.1.8 displaystring read-only
The name of the IPv6 ACL name bound to this Interface
       agAclAccntTable 1.3.6.1.4.1.1991.1.2.2.15.5 no-access
Table of ACL Accounting Statistics for router
           agAclAccntEntry 1.3.6.1.4.1.1991.1.2.2.15.5.1 no-access
An entry in the ACL-binding-to-port table.
               agAclAccntKind 1.3.6.1.4.1.1991.1.2.2.15.5.1.1 integer no-access
Kind of ACL Accounting statistics needed. ipv4PolicyBasedRouting(2) and ipv6PolicyBasedRouting(6) are implemented in brcdPbrAclAccntTable. Agent will fail for GET on ipv4PolicyBasedRouting(2) and ipv6PolicyBasedRouting(6) wheresas for GET_NEXT it will skip these. The enum value ipv6ReceiveAcl(7) is not supported on CES/CER devices. Enumeration: 'rateLimit': 3, 'receiveAcl': 4, 'l2': 1, 'ipv4': 0, 'ipv6': 5, 'ipv6ReceiveAcl': 7.
               agAclAccntIfIndex 1.3.6.1.4.1.1991.1.2.2.15.5.1.2 interfaceindex no-access
Physical or virtual interface on which ACL accounting is desired. For Receive ACL, we use the lowest port of the management module as value for this object.
               agAclAccntDirection 1.3.6.1.4.1.1991.1.2.2.15.5.1.3 direction no-access
ACL port direction, inbound or outbound. For receive-acl kind, direction cannot be outbound.
               agAclAccntAclNumber 1.3.6.1.4.1.1991.1.2.2.15.5.1.4 aclnumber no-access
The access-list number for this entry.
               agAclAccntFilterId 1.3.6.1.4.1.1991.1.2.2.15.5.1.5 unsigned32 no-access
FilterId within a given ACL. This is a zero based value.
               agAclAccntAclName 1.3.6.1.4.1.1991.1.2.2.15.5.1.6 aclnamestring read-only
ACL name for an entry, if applicable. Otherwise, null string is returned.
               agAclAccntOneSecond 1.3.6.1.4.1.1991.1.2.2.15.5.1.7 counter64 read-only
Last one second accounting data.
               agAclAccntOneMinute 1.3.6.1.4.1.1991.1.2.2.15.5.1.8 counter64 read-only
Last one minute accounting data.
               agAclAccntFiveMinute 1.3.6.1.4.1.1991.1.2.2.15.5.1.9 counter64 read-only
Last five minute accounting data.
               agAclAccntCumulative 1.3.6.1.4.1.1991.1.2.2.15.5.1.10 counter64 read-only
Cummulative accounting data since the ACL was installed.
               agAclAccntRaclDropCnt 1.3.6.1.4.1.1991.1.2.2.15.5.1.11 counter64 read-only
Receive-ACL drop counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL.
               agAclAccntRaclFwdCnt 1.3.6.1.4.1.1991.1.2.2.15.5.1.12 counter64 read-only
Receive-ACL forward counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL.
               agAclAccntRaclRemarkCnt 1.3.6.1.4.1.1991.1.2.2.15.5.1.13 counter64 read-only
Receive-ACL remark counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL.
               agAclAccntRaclTotalCnt 1.3.6.1.4.1.1991.1.2.2.15.5.1.14 counter64 read-only
Receive-ACL total counter used for rate limiting. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL.
               agAclAccntRaclTotalSWHitCountCnt 1.3.6.1.4.1.1991.1.2.2.15.5.1.15 counter64 read-only
Receive-ACL cumulative software hit counter. Not used for other ACL kind. The value returned is per ACL, instead of per filter within the ACL.
       fdryL2AclNextClauseTable 1.3.6.1.4.1.1991.1.2.2.15.6 no-access
This read-only table contains the list of next lowest available clause index that can be used for creating a new instance in the fdryL2AclTable. The clause index values will not change as a result of switchovers or hitless upgrades, but may change as a result of a device reload (though the relative order of persistent entries would remain the same).
           fdryL2AclNextClauseEntry 1.3.6.1.4.1.1991.1.2.2.15.6.1 no-access
An entry specifying the next lowest available clause index for this ACL number.
               fdryL2AclNextClauseIndex 1.3.6.1.4.1.1991.1.2.2.15.6.1.1 fdryclauseindextc read-only
The next lowest available clause index for a given ACL number. The maximum value of this object is the configured maximum number of clauses for a L2 ACL.
       fdryL2AclTable 1.3.6.1.4.1.1991.1.2.2.15.7 no-access
Table of Layer 2 Access Control Lists. Layer 2 ACLs filter traffic based on any of the following fields: - Source MAC address and source MAC mask - Destination MAC address and destination MAC mask - VLAN ID - Ethernet type. For a given ACL number, one can have 64 (default) to 256 clauses. The clause index values will not change as a result of switchovers or hitless upgrades, but may change as a result of a device reload (though the relative order of persistent entries would remain the same).
           fdryL2AclEntry 1.3.6.1.4.1.1991.1.2.2.15.7.1 no-access
An entry in the L2 Access Control List table.
               fdryL2AclNumber 1.3.6.1.4.1.1991.1.2.2.15.7.1.1 aclnumber no-access
The access-list number for this entry. For L2ACL, the valid values are between 400 and 599.
               fdryL2AclClauseIndex 1.3.6.1.4.1.1991.1.2.2.15.7.1.2 fdryclauseindextc no-access
The index of the clause within a given ACL number. During row creation, the clause index value should match with the next available clause index for a given ACL number. It is advisable to first do a Get operation on the fdryL2AclNextClauseTable for a given ACL number, and use the value of fdryL2AclNextClauseIndex returned by the agent.
               fdryL2AclAction 1.3.6.1.4.1.1991.1.2.2.15.7.1.3 action read-only
Action to take if the ingress L2 packet matches this ACL.
               fdryL2AclSourceMac 1.3.6.1.4.1.1991.1.2.2.15.7.1.4 macaddress read-only
Optional Source MAC address. By default, it matches with any source MAC within a packet.
               fdryL2AclSourceMacMask 1.3.6.1.4.1.1991.1.2.2.15.7.1.5 macaddress read-only
Optional Source MAC address mask. For Set operation, this object can only be used in conjunction with fdryL2AclSourceMac. By default, it matches with any source MAC within a packet. it matches with any source MAC within a packet. To match on the first two bytes of the address aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all source MAC addresses that contain 'aabb' as the first two bytes and any values in the remaining bytes of the MAC address.
               fdryL2AclDestinationMac 1.3.6.1.4.1.1991.1.2.2.15.7.1.6 macaddress read-only
Optional destination MAC address. By default, it matches with any destination MAC within a packet.
               fdryL2AclDestinationMacMask 1.3.6.1.4.1.1991.1.2.2.15.7.1.7 macaddress read-only
Optional destination MAC address mask. For Set operation, this object can only be used in conjunction with fdryL2AclDestinationMac. By default, it matches with any destination MAC within a packet. To match on the first two bytes of the address aabb.ccdd.eeff, use the mask ffff.0000.0000. In this case, the clause matches all destination MAC addresses that contain 'aabb' as the first two bytes and any values in the remaining bytes of the MAC address.
               fdryL2AclVlanId 1.3.6.1.4.1.1991.1.2.2.15.7.1.8 fdryvlanidornonetc read-only
Optional VLAN ID to match against that of the incoming packet. By default, the VLAN ID field is ignored during the match. In this case, value 0 is returned.
               fdryL2AclEthernetType 1.3.6.1.4.1.1991.1.2.2.15.7.1.9 fdryenettypeorzerotc read-only
Optional Ethernet Type to match against the etype field of the incoming packet. By default, etype field is ignored during the match.
               fdryL2AclDot1pPriority 1.3.6.1.4.1.1991.1.2.2.15.7.1.10 portqostc read-only
The priority option assigns traffic that matches the ACL to a hardware forwarding queue. In addition to changing the internal forwarding priority, if the outgoing interface is an 802.1q interface, this option maps the specified priority to its equivalent 802.1p (QoS) priority and marks the packet with the new 802.1p priority. This option is applicable for inbound ACLs only. This object is not supported in RX, where it always returns enum value invalid. NOTE: fdryL2AclDot1pPriority following fdryL2AclDot1pPriorityForce cannot be used together in an ACL entry.
               fdryL2AclDot1pPriorityForce 1.3.6.1.4.1.1991.1.2.2.15.7.1.11 portqostc read-only
The priority-force option assigns packets of outgoing traffic that match the ACL to a specific hardware forwarding queue, even though the incoming packet may be assigned to another queue. This option is applicable for inbound ACLs only. This object is not supported in RX, where it always returns enum value invalid. NOTE: fdryL2AclDot1pPriority following fdryL2AclDot1pPriorityForce cannot be used together in an ACL entry.
               fdryL2AclDot1pPriorityMapping 1.3.6.1.4.1.1991.1.2.2.15.7.1.12 portqostc read-only
The priority-mapping option matches on the packets 802.1p value. This option does not change the packets forwarding priority through the device or mark the packet. This keyword is applicable for both inbound and outbound ACLs. This object is not supported in RX, where it always returns enum value invalid.
               fdryL2AclMirrorPackets 1.3.6.1.4.1.1991.1.2.2.15.7.1.13 truthvalue read-only
Mirror packets matching ACL permit clause.
               fdryL2AclLogEnable 1.3.6.1.4.1.1991.1.2.2.15.7.1.14 truthvalue read-only
Optional parameter to enable logging only when deny clause is specified. Note that traffic denied by implicit deny mechanism is not subject to logging. The implicit deny kicks in when the traffic does not match any of the clauses and there is no 'permit any any' clause specified at the end.
               fdryL2AclRowStatus 1.3.6.1.4.1.1991.1.2.2.15.7.1.15 rowstatus read-only
The row status variable, used according to installation and removal conventions for conceptual rows. Setting this object to active(1) or createAndGo(4) results in the addition of a L2 ACL filter in the router. Duplicate entry will be rejected during row creation. As part of row creation, we support only appending to this table. Row insertion may not be supported. Setting this object to destroy(6) removes the associated filter from the router. Other values in the enumeration are not used.
       fdryL2AclIfBindTable 1.3.6.1.4.1.1991.1.2.2.15.8 no-access
Table of L2 ACL binding to port. - One cannot bind Layer 2 ACLs and Layer 3 ACLs to the same port. However, one can configure a port to use Layer 2 ACLs, and another port on the same device to use Layer 3 ACLs. - In general, Layer 2 ACLs cannot be bound to virtual interfaces, unlike L3 ACLs. - One cannot modify an existing Layer 2 ACL clause. For that, one must unbind the ACL, delete it and make a new clause.
           fdryL2AclIfBindEntry 1.3.6.1.4.1.1991.1.2.2.15.8.1 no-access
An entry in the L2ACL binding table which lists the ACL bindings to a port.
               fdryL2AclIfBindDirection 1.3.6.1.4.1.1991.1.2.2.15.8.1.1 direction no-access
Direction in which this ACL should be applied on this port.
               fdryL2AclIfBindAclNumber 1.3.6.1.4.1.1991.1.2.2.15.8.1.2 unsigned32 read-only
The ACL number that is to be bound to given physical interface. The valid values for L2 numbered ACLs are between 400 and 599.
               fdryL2AclIfBindRowStatus 1.3.6.1.4.1.1991.1.2.2.15.8.1.3 rowstatus read-only
The row status variable, used according to installation and removal conventions for conceptual rows. Setting this object to active(1) or createAndGo(4) results in the binding of a L2 ACL with a given physical port. Setting this object to destroy(6) unbinds this L2 ACL from the port. Other values in the enumeration are not used.
       brcdPbrAclAccntTable 1.3.6.1.4.1.1991.1.2.2.15.9 no-access
Table of PBR ACL Accounting Statistics for router.
           brcdPbrAclAccntEntry 1.3.6.1.4.1.1991.1.2.2.15.9.1 no-access
An entry in the PBR ACL-binding-to-port table.
               brcdPbrAclAccntKind 1.3.6.1.4.1.1991.1.2.2.15.9.1.1 integer no-access
Kind of PBR ACL Accounting statistics needed. Enumeration: 'ipv4PolicyBasedRouting': 1, 'ipv6PolicyBasedRouting': 2.
               brcdPbrAclAccntIfIndex 1.3.6.1.4.1.1991.1.2.2.15.9.1.2 interfaceindex no-access
Physical or virtual interface on which ACL accounting is desired
               brcdPbrSerialNumber 1.3.6.1.4.1.1991.1.2.2.15.9.1.3 integer no-access
This is a running number and may change if an acl or routemap is modified
               brcdPbrAclAccntAclInfo 1.3.6.1.4.1.1991.1.2.2.15.9.1.4 displaystring read-only
This contains ACL Number, ACL Name, ACL Filter Id, last five minutes and cumulative accounting data since the ACL was installed. Each field is separated by a pipe character i.e. 5MIN|CUMULATIVE|ACL Number|ACL Filter Id|ACL Name