Enterasys SecureStack C2 C2G170-24 Configuration Manual page 333

Stackable switches
Hide thumbs Also See for SecureStack C2 C2G170-24:
Table of Contents

Advertisement

Mode
Switch command, read‐only.
Usage
Use this command to display detailed policy classification capabilities supported by your 
SecureStack C2 device. The output of this command shows a table listing classifiable traffic 
attributes and the type of actions, by rule type, that can be executed relative to each attribute. 
Above the table is a list of all the actions possible on this device.
The left‐most column of the table lists all possible classifiable traffic attributes. The next two 
columns from the left indicate how policy profiles may be assigned, either administratively or 
dynamically. The next four columns from the left indicate the actions that may be performed. The 
last three columns indicate auditing options.
An x in an action column for a traffic attribute row indicates that your system has the capability to 
perform that action for traffic classified by that attribute.
Example
This example shows how to display the device's policy classification capabilities. Refer to "set 
policy rule" on page 11‐10 for a description of the parameters displayed: 
C2(su)->show policy capability
The following supports related to policy are supported in this device:
VLAN Forwarding
Deny
Rule-Use Notification
=============================================================
|
|
|
|
|
|
| SUPPORTED RULE TYPES
=============================================================
|MAC source address
|MAC destination address
|IPX source address
|IPX destination address
|IPX source socket
|IPX destination socket
|IPX transmission control |
|IPX type field
|IPv6 source address
|IPv6 destination address |
|IPv6 flow label
|IP source address
|IP destination address
|IP fragmentation
|UDP port source
|UDP port destination
|TCP port source
|TCP port destination
|ICMP packet type
|TTL
|IP type of service
|IP proto
Priority
Precedence Reordering
Longest Prefix Rules
| D |
|
|
|
| Y |
|
|
|
| N | A |
|
|
| A | D | V |
| D | W | S | T | A |
| M | M | L | C | R | A | L | R | B |
| I | I | A | O | O | R | O | A | L |
| C | N | N | S | P | D | G | P | E |
|
|
|
| X | X | X |
|
|
|
| X | X | X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| X | X | X |
|
|
|
| X | X | X |
|
|
|
|
|
|
|
|
| X | X | X |
|
|
|
| X | X | X |
|
|
|
| X | X | X |
|
|
|
| X | X | X |
|
|
|
| X | X | X |
|
|
|
|
|
|
|
|
| X | X | X |
|
|
|
| X | X | X |
Permit
Rules Table
| F |
|
| D |
| O | S |
| I |
| R | Y |
| S |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SecureStack C2 Configuration Guide 11-9
show policy capability

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2h124-24Securestack c2

Table of Contents