EasyManua.ls Logo

Enterasys SecureStack C2 C2G170-24

Enterasys SecureStack C2 C2G170-24
698 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
show policy capability
SecureStack C2 Configuration Guide 11-9
Mode
Switchcommand,readonly.
Usage
Usethiscommandtodisplaydetailedpolicyclassificationcapabilitiessupportedbyyour
SecureStackC2device.Theoutputofthiscommandshowsatablelistingclassifiabletraffic
attributesandthetypeofactions,byruletype,thatcanbeexecutedrelativetoeachattribute.
Abovethetableisalistofall
theactionspossibleonthisdevice.
Theleftmostcolumnofthetablelistsallpossibleclassifiabletrafficattributes.Thenexttwo
columnsfromtheleftindicatehowpolicyprofilesmaybeassigned,eitheradministrativelyor
dynamically.Thenextfourcolumnsfromtheleftindicate theactionsthatmaybeperformed.
The
lastthreecolumnsindicateauditingoptions.
Anxinanactioncolumnforatrafficattributerowindicatesthatyoursystemhasthecapabilityto
performthatactionfortrafficclassifiedbythatattribute.
Example
Thisexampleshowshowtodisplaythedevice’spolicyclassificationcapabilities. Refertoset
policyruleonpage 1110for adescriptionoftheparametersdisplayed:
C2(su)->show policy capability
The following supports related to policy are supported in this device:
VLAN Forwarding Priority Permit
Deny Precedence Reordering Rules Table
Rule-Use Notification Longest Prefix Rules
=============================================================
| | D | | | | | F | | | D |
| | Y | | | | | O | S | | I |
| | N | A | | | | R | Y | | S |
| | A | D | V | | D | W | S | T | A |
| | M | M | L | C | R | A | L | R | B |
| | I | I | A | O | O | R | O | A | L |
| SUPPORTED RULE TYPES | C | N | N | S | P | D | G | P | E |
=============================================================
|MAC source address | | | | X | X | X | | | |
|MAC destination address | | | | X | X | X | | | |
|IPX source address | | | | | | | | | |
|IPX destination address | | | | | | | | | |
|IPX source socket | | | | | | | | | |
|IPX destination socket | | | | | | | | | |
|IPX transmission control | | | | | | | | | |
|IPX type field | | | | | | | | | |
|IPv6 source address | | | | | | | | | |
|IPv6 destination address | | | | | | | | | |
|IPv6 flow label | | | | | | | | | |
|IP source address | | | | X | X | X | | | |
|IP destination address | | | | X | X | X | | | |
|IP fragmentation | | | | | | | | | |
|UDP port source | | | | X | X | X | | | |
|UDP port destination | | | | X | X | X | | | |
|TCP port source | | | | X | X | X | | | |
|TCP port destination | | | | X | X | X | | | |
|ICMP packet type | | | | X | X | X | | | |
|TTL | | | | | | | | | |
|IP type of service | | | | X | X | X | | | |
|IP proto | | | | X | X | X | | | |

Table of Contents

Other manuals for Enterasys SecureStack C2 C2G170-24

Related product manuals