The security ACL configuration mode for an interface.
Setting this variable to the value port(1) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
interface to be filtered based on the ACL mapped to that
interface.
Setting this variable to the value vlan(2) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
access interface to be filtered based on two ACL(the router's
ACL and the ACL of the VLAN to which the interface belongs).
If it is a trunking interface, the vlan-tag packets will be
filtered based on the ACL of the tag-vlan.
Setting this variable to the value merge(3) will merge the
physical interface ACL, the VLAN ACL and the router ACL
together to emulate the logical serial model shown below.
L3 only
Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
physical ingress ingress egress egress
interface
Parsed from file CISCO-CATOS-ACL-QOS-MIB.mib
Module: CISCO-CATOS-ACL-QOS-MIB
The security ACL configuration mode for an interface.
Setting this variable to the value port(1) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
interface to be filtered based on the ACL mapped to that
interface.
Setting this variable to the value vlan(2) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
access interface to be filtered based on two ACL(the router's
ACL and the ACL of the VLAN to which the interface belongs).
If it is a trunking interface, the vlan-tag packets will be
filtered based on the ACL of the tag-vlan.
Setting this variable to the value merge(3) will merge the
physical interface ACL, the VLAN ACL and the router ACL
together to emulate the logical serial model shown below.
L3 only
Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
physical ingress ingress egress egress
interface
The security ACL configuration mode for an interface.
Setting this variable to the value port(1) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
interface to be filtered based on the ACL mapped to that
interface.
Setting this variable to the value vlan(2) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
access interface to be filtered based on two ACL(the router's
ACL and the ACL of the VLAN to which the interface belongs).
If it is a trunking interface, the vlan-tag packets will be
filtered based on the ACL of the tag-vlan.
Setting this variable to the value merge(3) will merge the
physical interface ACL, the VLAN ACL and the router ACL
together to emulate the logical serial model shown below.
L3 only
Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
physical ingress ingress egress egress
interface
Parsed from file CISCO-CATOS-ACL-QOS-MIB.my.txt
Company: None
Module: CISCO-CATOS-ACL-QOS-MIB
The security ACL configuration mode for an interface.
Setting this variable to the value port(1) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
interface to be filtered based on the ACL mapped to that
interface.
Setting this variable to the value vlan(2) will cause the
packets (L3 forwarded packets and L2 packets) arriving at that
access interface to be filtered based on two ACL(the router's
ACL and the ACL of the VLAN to which the interface belongs).
If it is a trunking interface, the vlan-tag packets will be
filtered based on the ACL of the tag-vlan.
Setting this variable to the value merge(3) will merge the
physical interface ACL, the VLAN ACL and the router ACL
together to emulate the logical serial model shown below.
L3 only
Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
physical ingress ingress egress egress
interface
caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }
caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } ACCESS read-write STATUS mandatory DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }
Vendor: Cisco
Module: CISCO-CATOS-ACL-QOS-MIB
[Automatically extracted from oidview.com]
caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }
caqIfSecurityAclBase OBJECT-TYPE SYNTAX INTEGER { port(1), vlan(2), merge(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The security ACL configuration mode for an interface. Setting this variable to the value port(1) will cause the packets (L3 forwarded packets and L2 packets) arriving at that interface to be filtered based on the ACL mapped to that interface. Setting this variable to the value vlan(2) will cause the packets (L3 forwarded packets and L2 packets) arriving at that access interface to be filtered based on two ACL(the router's ACL and the ACL of the VLAN to which the interface belongs). If it is a trunking interface, the vlan-tag packets will be filtered based on the ACL of the tag-vlan. Setting this variable to the value merge(3) will merge the physical interface ACL, the VLAN ACL and the router ACL together to emulate the logical serial model shown below. L3 only Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL physical ingress ingress egress egress interface" ::= { caqIfSecurityAclConfigEntry 1 }