The default behavior for (bridged) packets that do not match IP
filters is defined by docsDevFilterIpDefault.
If set to discard(1), all packets not matching an IP filter
will be discarded. If set to accept(2), all packets not
matching an IP filter will be accepted for further processing
(e.g., bridging).
At initial system startup, this object returns accept(2).
Parsed from file DOCS-CABLE-DEVICE-MIB.mib
Module: DOCS-CABLE-DEVICE-MIB
The default behavior for (bridged) packets that do not
match IP filters (or Internet filters, if implemented)
is defined by docsDevFilterIpDefault.
If set to discard(1), all packets not matching an IP
filter in docsDevFilterIpTable will be discarded. If
set to accept(2), all packets not matching an IP filter
or an Internet filter will be accepted for further
processing (e.g., bridging).
docsDevFilterIpDefault OBJECT-TYPE
SYNTAX INTEGER {
discard(1),
accept(2)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"If set to discard(1), all packets not matching an IP filter
will be discarded. If set to accept(2), all packets not
matching an IP filter will be accepted for further
processing (e.g., bridging).
At initial system startup, this object returns accept(2)."
View at oid-info.com
The default behavior for (bridged) packets that do not
match IP filters (or Internet filters, if implemented)
is defined by docsDevFilterIpDefault.
If set to discard(1), all packets not matching an IP
filter in docsDevFilterIpTable will be discarded. If
set to accept(2), all packets not matching an IP filter
or an Internet filter will be accepted for further
processing (e.g., bridging).
Parsed from file rfc4639-DOCSIS-Cable-Device.mib.txt
Company: None
Module: DOCS-CABLE-DEVICE-MIB
The default behavior for (bridged) packets that do not
match IP filters (or Internet filters, if implemented)
is defined by docsDevFilterIpDefault.
If set to discard(1), all packets not matching an IP
filter in docsDevFilterIpTable will be discarded. If
set to accept(2), all packets not matching an IP filter
or an Internet filter will be accepted for further
processing (e.g., bridging).
docsDevFilterIpDefault OBJECT-TYPE SYNTAX INTEGER { discard(1), accept(2) } MAX-ACCESS read-write STATUS current DESCRIPTION "The default behavior for (bridged) packets that do not match IP filters is defined by docsDevFilterIpDefault. If set to discard(1), all packets not matching an IP filter will be discarded. If set to accept(2), all packets not matching an IP filter will be accepted for further processing (e.g., bridging). At initial system startup, this object returns accept(2)." ::= { docsDevFilter 3 }
docsDevFilterIpDefault OBJECT-TYPE SYNTAX INTEGER { discard(1), accept(2) } ACCESS read-write STATUS deprecated DESCRIPTION "The default behavior for (bridged) packets that do not match IP filters (or Internet filters, if implemented) is defined by docsDevFilterIpDefault. If set to discard(1), all packets not matching an IP filter in docsDevFilterIpTable will be discarded. If set to accept(2), all packets not matching an IP filter or an Internet filter will be accepted for further processing (e.g., bridging)." DEFVAL { accept } ::= { docsDevFilter 3 }
Automatically extracted from RFC2669
docsDevFilterIpDefault OBJECT-TYPE SYNTAX INTEGER { discard(1), accept(2) } MAX-ACCESS read-write STATUS deprecated DESCRIPTION "The default behavior for (bridged) packets that do not match IP filters (or Internet filters, if implemented) is defined by docsDevFilterIpDefault. If set to discard(1), all packets not matching an IP filter in docsDevFilterIpTable will be discarded. If set to accept(2), all packets not matching an IP filter or an Internet filter will be accepted for further processing (e.g., bridging)." DEFVAL { accept } ::= { docsDevFilter 3 }
docsDevFilterIpDefault OBJECT-TYPE SYNTAX INTEGER { discard(1), accept(2) } MAX-ACCESS read-write STATUS deprecated DESCRIPTION "The default behavior for (bridged) packets that do not match IP filters (or Internet filters, if implemented) is defined by docsDevFilterIpDefault. If set to discard(1), all packets not matching an IP filter in docsDevFilterIpTable will be discarded. If set to accept(2), all packets not matching an IP filter or an Internet filter will be accepted for further processing (e.g., bridging)." DEFVAL { accept } ::= { docsDevFilter 3 }
Internet Assigned Numbers Authority
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.2.1.69.1.6.3.0 | docsDevFilterIpDefault | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.2.1.69.1.6.1 | docsDevFilterLLCUnmatchedAction | 1 | 1 | LLC (Link Level Control) filters can be defined on an inclusive or exclusive basis: CMs can be configured to forward only packets… |
1.3.6.1.2.1.69.1.6.2 | docsDevFilterLLCTable | 1 | 9 | A list of filters to apply to (bridged) LLC traffic. The filters in this table are applied to incoming traffic on the appropriate… |
1.3.6.1.2.1.69.1.6.4 | docsDevFilterIpTable | 1 | 23 | An ordered list of filters or classifiers to apply to IP traffic. Filter application is ordered by the filter index, rather than … |
1.3.6.1.2.1.69.1.6.5 | docsDevFilterPolicyTable | 1 | 7 | A Table which maps between a policy group ID and a set of policies to be applied. All rows with the same docsDevFilterPolicyId a… |
1.3.6.1.2.1.69.1.6.6 | docsDevFilterTosTable | 1 | 5 | Table used to describe Type of Service (TOS) bits processing. This table is an adjunct to the docsDevFilterIpTable, and the docsDe… |
1.3.6.1.2.1.69.1.6.7 | docsDevFilterIpV6AuxTable | 1 | 6 | This table augments docsDevIpFilterTable with objects that allow filtering of IPv6 packets. The objects in this table exactly mir… |