Table Of Contents
Access Control Lists
Technology Description
Information Model Objects (IMOs)
Access List Traffic Descriptor
Access List Entry
Vendor-Specific Inventory and IMOs
Service Alarms
Access Control Lists
This chapter describes the level of support that Cisco ANA provides for Access Control Lists (ACLs), as follows:
•Technology Description
•Information Model Objects (IMOs)
•Vendor-Specific Inventory and IMOs
•Service Alarms
Please see Part 1: Cisco VNEs in this guide for information about which devices support the various technologies.
Technology Description
An ACL is a group of statements. Each defines a pattern of data that can be found in an IP packet. As each packet comes through an interface with an associated ACL, the ACL is scanned from top to bottom, in the exact order in which it was entered, for a pattern that matches the incoming packet. A permit or deny rule associated with each pattern determines that packet's fate. A mask (similar to a wild card) can also be used to determine how much of an IP source or destination address to use when matching against the pattern. The pattern statement can also include a TCP or UDP port.
Note that Cisco ANA currently supports IP ACLs only. MAC ACLs are not supported.
Information Model Objects (IMOs)
This section describes the following IMOs:
•Access List Traffic Descriptor (IAccessList)
•Access List Entry (IAccessListEntry)
Access List Traffic Descriptor
The Access List Traffic Descriptor , with its Access List Entry objects, describes an access list of a single type (Unknown, Standard, Extended, or Rate Limit ). It is aggregated by a Traffic Descriptor Container object (see Common Components ).
Table 34-1 Access List Traffic Descriptor (IAccessList)
Attribute Name
Attribute Description
Scheme
Polling Interval
Type
Access list type (Unknown, Standard, Extended, Rate Limit )
Any
Configuration
Access List Entries Table
Array of instances of Access List Entry
Any
Configuration
Name or ID
Traffic descriptor name or identifier
Any
Configuration
Index
Traffic descriptor index
Any
Configuration
Access List Entry
Table 34-2 Access List Entry (IAccessListEntry)
Attribute Name
Attribute Description
Scheme
Polling Interval
Entry Identification
Entry identifier.
Any
Configuration
Action Logic
Action logic (Unknown, Permit, Deny ).
Any
Configuration
Source and Destination Address
Source and destination IP address.
Any
Configuration
Source and Destination Wildcard
Source and destination IP wildcard.
Any
Configuration
Protocol Type
Internet Assigned Numbers Authority (IANA) type of the protocol (HOPORT, ICMP, IGMP, GGP, IP in IP, ST, TCP, CBT, EGP, IGP , and so on).
Any
Configuration
Source and Destination Ports Ranges
Source and destination TCP/UDP port ranges.
Any
Configuration
Source and Destination Port Action
Source and destination port action (Null, Equal, Not Equal, Greater Than, Less Than, Range ).
Any
Configuration
Protocol Specific Info
Protocol specific information.
Any
Configuration
Differential Services Code Points
Differential Services Code Points (DSCP).
Any
Configuration
Type of Service
Type of Service (ToS) (Normal [0], Min Cost [1], Max Reliability [2], 3, Max Throughput [4], 5, 6, 7, Min Delay [8], 9, 10, 11, 12, 13, 14, 15 ).
Any
Configuration
Precedence
Precedence (Routine [0], Priority [1], Immediate [2], Flash [3], Flash Override [4], Critical [5], Internet [6], Network [7] ).
Any
Configuration
Matches
The number of matches made.
Any
Configuration
Vendor-Specific Inventory and IMOs
There are no vendor-specific inventory or IMOs for this technology.
Service Alarms
There are no faults or alarms associated with this technology.