Reference record for OID 1.3.6.1.4.1.4526.10.3.2.4.1



parent
1.3.6.1.4.1.4526.10.3.2.4 (aclRuleTable)
node code
1
node name
aclRuleEntry
dot oid
1.3.6.1.4.1.4526.10.3.2.4.1
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) netgear(4526) ng7000managedswitch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) netgear(4526) ng7000Switch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • ...skipped...
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) netgear(4526) ng7000managedswitch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) netgear(4526) ng7000Switch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) netgear(4526) ng7000managedswitch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) netgear(4526) ng7000Switch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • ...skipped...
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) netgear(4526) ng7000managedswitch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) netgear(4526) ng7000Switch(10) agentQOS(3) agentQOSACL(2) aclRuleTable(4) aclRuleEntry(1)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/netgear/ng7000managedswitch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • /iso/identified-organization/dod/internet/private/enterprise/netgear/ng7000Switch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • ...skipped...
  • /iso/org/dod/internet/private/enterprise/netgear/ng7000managedswitch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • /iso/org/dod/internet/private/enterprise/netgear/ng7000Switch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • /iso/org/dod/internet/private/enterprises/netgear/ng7000managedswitch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • /iso/org/dod/internet/private/enterprises/netgear/ng7000Switch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • ...skipped...
  • /iso/iso-identified-organization/dod/internet/private/enterprises/netgear/ng7000managedswitch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • /iso/iso-identified-organization/dod/internet/private/enterprises/netgear/ng7000Switch/agentQOS/agentQOSACL/aclRuleTable/aclRuleEntry
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/4526/10/3/2/4/1

    Description by circitor

    A table of IP ACL Classification Rules

    Parsed from file NETGEAR-QOS-ACL-MIB.mib
    Module: NETGEAR-QOS-ACL-MIB

    Information by oid_info

    Vendor: Netgear
    Module: NETGEAR-QOS-ACL-MIB

    [Automatically extracted from oidview.com]

    Information by circitor

    aclRuleEntry OBJECT-TYPE SYNTAX AclRuleEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A table of IP ACL Classification Rules" INDEX { aclIndex, aclRuleIndex } ::= { aclRuleTable 1 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.4526)

    Michael Shields

    Children (21)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.4526.10.3.2.4.1.1 aclRuleIndex 0 0 The index of this rule instance within an IP ACL.
    1.3.6.1.4.1.4526.10.3.2.4.1.2 aclRuleAction 0 0 The type of action this rule should perform.
    1.3.6.1.4.1.4526.10.3.2.4.1.3 aclRuleProtocol 0 0 icmp - 1
    igmp - 2
    ip - 4
    tcp - 6
    udp - 17
    All values from 1 to 255 are valid.
    1.3.6.1.4.1.4526.10.3.2.4.1.4 aclRuleSrcIpAddress 0 0 The Source IP Address used in the ACL Classification.
    1.3.6.1.4.1.4526.10.3.2.4.1.5 aclRuleSrcIpMask 0 0 The Source IP Mask used in the ACL Classification.
    This mask is expressed using wild-card notation,which
    is the 1's compliment of…
    1.3.6.1.4.1.4526.10.3.2.4.1.6 aclRuleSrcL4Port 0 0 The Source Port Number (Layer 4) used in the ACL Classification.
    1.3.6.1.4.1.4526.10.3.2.4.1.7 aclRuleSrcL4PortRangeStart 0 0 The Source Port Number(Layer 4) range start.
    1.3.6.1.4.1.4526.10.3.2.4.1.8 aclRuleSrcL4PortRangeEnd 0 0 The Source Port Number(Layer 4) range end.
    1.3.6.1.4.1.4526.10.3.2.4.1.9 aclRuleDestIpAddress 0 0 The Destination IP Address used in the ACL Classification.
    1.3.6.1.4.1.4526.10.3.2.4.1.10 aclRuleDestIpMask 0 0 The Destination IP Mask used in the ACL Classification.
    This mask is expressed using wild-card notation,which
    is the 1's compl…
    1.3.6.1.4.1.4526.10.3.2.4.1.11 aclRuleDestL4Port 0 0 The Destination Port (Layer 4) used in ACl classification.
    1.3.6.1.4.1.4526.10.3.2.4.1.12 aclRuleDestL4PortRangeStart 0 0 The Destination Port (Layer 4) starting range used in ACL classification.
    1.3.6.1.4.1.4526.10.3.2.4.1.13 aclRuleDestL4PortRangeEnd 0 0 The Destination Port (Layer 4) ending range used in ACL classification.
    1.3.6.1.4.1.4526.10.3.2.4.1.14 aclRuleIPDSCP 0 0 The Differentiated Services Code Point value.
    1.3.6.1.4.1.4526.10.3.2.4.1.15 aclRuleIpPrecedence 0 0 The Type of Service (TOS) IP Precedence value.
    1.3.6.1.4.1.4526.10.3.2.4.1.16 aclRuleIpTosBits 0 0 The Type of Service (TOS) Bits value.
    1.3.6.1.4.1.4526.10.3.2.4.1.17 aclRuleIpTosMask 0 0 The Type of Service (TOS) Mask value.
    1.3.6.1.4.1.4526.10.3.2.4.1.18 aclRuleStatus 0 0 Status of this instance.

    active(1) - this ACL Rule is active
    createAndGo(4) - set to this value to create an instance
    destro…
    1.3.6.1.4.1.4526.10.3.2.4.1.19 aclRuleAssignQueueId 0 0 Queue identifier to which all inbound packets matching this
    ACL rule are directed. This object defaults to the standard
    queue as…
    1.3.6.1.4.1.4526.10.3.2.4.1.20 aclRuleRedirectIntf 0 0 A non-zero value indicates the external ifIndex to which all
    inbound packets matching this ACL rule are directed. A
    value of zer…
    1.3.6.1.4.1.4526.10.3.2.4.1.21 aclRuleMatchEvery 0 0 Flag to indicate that the acl rule is defined to match on every IP packet,
    regardless of content.