Cisco Active Network Abstraction Reference Guide, 3.7.2
Access Control Lists

Table Of Contents

Access Control Lists

Technology Description

Information Model Objects (IMOs)

Access List Traffic Descriptor

Access List Entry

Vendor-Specific Inventory and IMOs

Service Alarms


Access Control Lists


This chapter describes the level of support that Cisco ANA provides for Access Control Lists (ACLs), as follows:

Technology Description

Information Model Objects (IMOs)

Vendor-Specific Inventory and IMOs

Service Alarms

Please see Part 1: Cisco VNEs in this guide for information about which devices support the various technologies.

Technology Description

An ACL is a group of statements. Each defines a pattern of data that can be found in an IP packet. As each packet comes through an interface with an associated ACL, the ACL is scanned from top to bottom, in the exact order in which it was entered, for a pattern that matches the incoming packet. A permit or deny rule associated with each pattern determines that packet's fate. A mask (similar to a wild card) can also be used to determine how much of an IP source or destination address to use when matching against the pattern. The pattern statement can also include a TCP or UDP port.

Note that Cisco ANA currently supports IP ACLs only. MAC ACLs are not supported.

Information Model Objects (IMOs)

This section describes the following IMOs:

Access List Traffic Descriptor (IAccessList)

Access List Entry (IAccessListEntry)

Access List Traffic Descriptor

The Access List Traffic Descriptor, with its Access List Entry objects, describes an access list of a single type (Unknown, Standard, Extended, or Rate Limit). It is aggregated by a Traffic Descriptor Container object (see Common Components).

Table 34-1 Access List Traffic Descriptor (IAccessList)  

Attribute Name
Attribute Description
Scheme
Polling Interval

Type

Access list type (Unknown, Standard, Extended, Rate Limit)

Any

Configuration

Access List Entries Table

Array of instances of Access List Entry

Any

Configuration

Name or ID

Traffic descriptor name or identifier

Any

Configuration

Index

Traffic descriptor index

Any

Configuration


Access List Entry

Table 34-2 Access List Entry (IAccessListEntry) 

Attribute Name
Attribute Description
Scheme
Polling Interval

Entry Identification

Entry identifier.

Any

Configuration

Action Logic

Action logic (Unknown, Permit, Deny).

Any

Configuration

Source and Destination Address

Source and destination IP address.

Any

Configuration

Source and Destination Wildcard

Source and destination IP wildcard.

Any

Configuration

Protocol Type

Internet Assigned Numbers Authority (IANA) type of the protocol (HOPORT, ICMP, IGMP, GGP, IP in IP, ST, TCP, CBT, EGP, IGP, and so on).

Any

Configuration

Source and Destination Ports Ranges

Source and destination TCP/UDP port ranges.

Any

Configuration

Source and Destination Port Action

Source and destination port action (Null, Equal, Not Equal, Greater Than, Less Than, Range).

Any

Configuration

Protocol Specific Info

Protocol specific information.

Any

Configuration

Differential Services Code Points

Differential Services Code Points (DSCP).

Any

Configuration

Type of Service

Type of Service (ToS) (Normal [0], Min Cost [1], Max Reliability [2], 3, Max Throughput [4], 5, 6, 7, Min Delay [8], 9, 10, 11, 12, 13, 14, 15).

Any

Configuration

Precedence

Precedence (Routine [0], Priority [1], Immediate [2], Flash [3], Flash Override [4], Critical [5], Internet [6], Network [7]).

Any

Configuration

Matches

The number of matches made.

Any

Configuration


Vendor-Specific Inventory and IMOs

There are no vendor-specific inventory or IMOs for this technology.

Service Alarms

There are no faults or alarms associated with this technology.