Reference record for OID 1.3.6.1.4.1.9.9.179.1.2.3.1.1



parent
1.3.6.1.4.1.9.9.179.1.2.3.1 (caqIfSecurityAclConfigEntry)
node code
1
node name
caqIfSecurityAclBase
dot oid
1.3.6.1.4.1.9.9.179.1.2.3.1.1
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoCatOSAclQosMIB(179) ciscoCatOSAclQosMIBObjects(1) caqInterfaceObjects(2) caqIfSecurityAclConfigTable(3) caqIfSecurityAclConfigEntry(1) caqIfSecurityAclBase(1)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoCatOSAclQosMIB(179) ciscoCatOSAclQosMIBObjects(1) caqInterfaceObjects(2) caqIfSecurityAclConfigTable(3) caqIfSecurityAclConfigEntry(1) caqIfSecurityAclBase(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoCatOSAclQosMIB(179) ciscoCatOSAclQosMIBObjects(1) caqInterfaceObjects(2) caqIfSecurityAclConfigTable(3) caqIfSecurityAclConfigEntry(1) caqIfSecurityAclBase(1)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoCatOSAclQosMIB(179) ciscoCatOSAclQosMIBObjects(1) caqInterfaceObjects(2) caqIfSecurityAclConfigTable(3) caqIfSecurityAclConfigEntry(1) caqIfSecurityAclBase(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoCatOSAclQosMIB(179) ciscoCatOSAclQosMIBObjects(1) caqInterfaceObjects(2) caqIfSecurityAclConfigTable(3) caqIfSecurityAclConfigEntry(1) caqIfSecurityAclBase(1)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoCatOSAclQosMIB(179) ciscoCatOSAclQosMIBObjects(1) caqInterfaceObjects(2) caqIfSecurityAclConfigTable(3) caqIfSecurityAclConfigEntry(1) caqIfSecurityAclBase(1)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoCatOSAclQosMIB/ciscoCatOSAclQosMIBObjects/caqInterfaceObjects/caqIfSecurityAclConfigTable/caqIfSecurityAclConfigEntry/caqIfSecurityAclBase
  • /iso/identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoCatOSAclQosMIB/ciscoCatOSAclQosMIBObjects/caqInterfaceObjects/caqIfSecurityAclConfigTable/caqIfSecurityAclConfigEntry/caqIfSecurityAclBase
  • /iso/org/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoCatOSAclQosMIB/ciscoCatOSAclQosMIBObjects/caqInterfaceObjects/caqIfSecurityAclConfigTable/caqIfSecurityAclConfigEntry/caqIfSecurityAclBase
  • /iso/org/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoCatOSAclQosMIB/ciscoCatOSAclQosMIBObjects/caqInterfaceObjects/caqIfSecurityAclConfigTable/caqIfSecurityAclConfigEntry/caqIfSecurityAclBase
  • /iso/iso-identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoCatOSAclQosMIB/ciscoCatOSAclQosMIBObjects/caqInterfaceObjects/caqIfSecurityAclConfigTable/caqIfSecurityAclConfigEntry/caqIfSecurityAclBase
  • /iso/iso-identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoCatOSAclQosMIB/ciscoCatOSAclQosMIBObjects/caqInterfaceObjects/caqIfSecurityAclConfigTable/caqIfSecurityAclConfigEntry/caqIfSecurityAclBase
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/9/9/179/1/2/3/1/1

    Description by circitor

    The security ACL configuration mode for an interface.

    Setting this variable to the value port(1) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    interface to be filtered based on the ACL mapped to that
    interface.

    Setting this variable to the value vlan(2) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    access interface to be filtered based on two ACL(the router's
    ACL and the ACL of the VLAN to which the interface belongs).
    If it is a trunking interface, the vlan-tag packets will be
    filtered based on the ACL of the tag-vlan.

    Setting this variable to the value merge(3) will merge the
    physical interface ACL, the VLAN ACL and the router ACL
    together to emulate the logical serial model shown below.

    L3 only
    Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
    physical ingress ingress egress egress
    interface

    Parsed from file CISCO-CATOS-ACL-QOS-MIB.mib
    Module: CISCO-CATOS-ACL-QOS-MIB

    Description by cisco_v1

    The security ACL configuration mode for an interface.

    Setting this variable to the value port(1) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    interface to be filtered based on the ACL mapped to that
    interface.

    Setting this variable to the value vlan(2) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    access interface to be filtered based on two ACL(the router's
    ACL and the ACL of the VLAN to which the interface belongs).
    If it is a trunking interface, the vlan-tag packets will be
    filtered based on the ACL of the tag-vlan.

    Setting this variable to the value merge(3) will merge the
    physical interface ACL, the VLAN ACL and the router ACL
    together to emulate the logical serial model shown below.

    L3 only
    Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
    physical ingress ingress egress egress
    interface

    Description by mibdepot

    The security ACL configuration mode for an interface.

    Setting this variable to the value port(1) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    interface to be filtered based on the ACL mapped to that
    interface.

    Setting this variable to the value vlan(2) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    access interface to be filtered based on two ACL(the router's
    ACL and the ACL of the VLAN to which the interface belongs).
    If it is a trunking interface, the vlan-tag packets will be
    filtered based on the ACL of the tag-vlan.

    Setting this variable to the value merge(3) will merge the
    physical interface ACL, the VLAN ACL and the router ACL
    together to emulate the logical serial model shown below.

    L3 only
    Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
    physical ingress ingress egress egress
    interface

    Parsed from file CISCO-CATOS-ACL-QOS-MIB.my.txt
    Company: None
    Module: CISCO-CATOS-ACL-QOS-MIB

    Description by cisco

    The security ACL configuration mode for an interface.

    Setting this variable to the value port(1) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    interface to be filtered based on the ACL mapped to that
    interface.

    Setting this variable to the value vlan(2) will cause the
    packets (L3 forwarded packets and L2 packets) arriving at that
    access interface to be filtered based on two ACL(the router's
    ACL and the ACL of the VLAN to which the interface belongs).
    If it is a trunking interface, the vlan-tag packets will be
    filtered based on the ACL of the tag-vlan.

    Setting this variable to the value merge(3) will merge the
    physical interface ACL, the VLAN ACL and the router ACL
    together to emulate the logical serial model shown below.

    L3 only
    Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
    physical ingress ingress egress egress
    interface

    Information by circitor

    caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }

    Information by cisco_v1

    caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } ACCESS read-write STATUS mandatory DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }

    Information by oid_info

    Vendor: Cisco
    Module: CISCO-CATOS-ACL-QOS-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }

    Information by cisco

    caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Greg Satz

    Current Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Cisco Systems, Inc.