Use this command to assign a list of traffic rules that can be applied to the admin profile for one or more ports.
port-string | Specifies port(s) on which to apply traffic rules. |
traffic-rule rule-list | Specifies traffic rules to be allowed. This is a numeric value displayed in the show policy allowed-type output (show policy allowed-type). Entering “none” means that no traffic rules will be allowed on this port. |
append | clear | (Optional) Appends traffic rule(s) to the port(s) current rules, or clears specified rules. |
If append or clear is not specified, rule(s) will be appended to the port‘s current list.
All command modes.
Each port supports a set of traffic rule types. Supported traffic rule types for a given port can also be administratively allowed or disallowed. The set policy allowed-type command allows you to either disallow (clear) or allow traffic rule types for the specified port(s). When allowing traffic rule types, all traffic types not specified are cleared unless the append option is specified. The append option allows the specified traffic types, leaving all unspecified traffic types unchanged.
Clearing allowed traffic types using the set policy allowed-type clear command, disallows only the specified traffic types, leaving all unspecified traffic types unchanged.
The show policy allowed-type command output displays supported traffic rule types and whether a traffic type is allowed for the specified port
This example:
System(rw)->set policy allowed-type ge.3.5 traffic-rule 1-2 System(rw)->show policy allowed-type ge.3.5 SUPPORTED AND ALLOWED TRAFFIC RULE TYPES o Means Traffic Rule Type is supported on this bridge port * Means Traffic Rule Type is supported and allowed on this bridge port ====================================================================== | | TRAFFIC RULE TYPES | +--------------+---+-----------+-----+-----+---+---+-+-----+---+---+-+ | | | | | | | | | | | | | | |MAC| IPX |IPv6 | IP |UDP|TCP| | IP | | | | | | | | | | | | | | | | | | | | S D | | | | | | |E | | | | | | S S T| F| F| | |I| T|N |V |P| | |S D|S D O O C Y|S D L|S D R|S D|S D|C|T T Y|E L|L T|O| | |R S|R S C C O P|R S O|C S A|R S|R S|M|T O P|T L|A C|R| | |C T|C T K K S E|C T W|R T G|C T|C T|P|L S E|2 C|N I|T| | |---+-----------+-----+-----+---+---+-+-----+---+---+-+ | | | | 1 1|1 1 1|1 1|1 1|1|2 2 2|2 2|2 2|3| | Port |1 2|3 4 5 6 7 8|9 0 1|2 3 4|5 6|7 8|9|0 1 2|5 6|7 8|1| ====================================================================== | ge.3.5 |* *|o o o o o o| |o o o|o o|o o|o| o o|o o|o o|o|
This example:
System(rw)->set policy allowed-type ge.3.5 traffic-rule 27 clear System(rw)->show policy allowed-type ge.3.5 SUPPORTED AND ALLOWED TRAFFIC RULE TYPES o Means Traffic Rule Type is supported on this bridge port * Means Traffic Rule Type is supported and allowed on this bridge port ====================================================================== | | TRAFFIC RULE TYPES | +--------------+---+-----------+-----+-----+---+---+-+-----+---+---+-+ | | | | | | | | | | | | | | |MAC| IPX |IPv6 | IP |UDP|TCP| | IP | | | | | | | | | | | | | | | | | | | | S D | | | | | | |E | | | | | | S S T| F| F| | |I| T|N |V |P| | |S D|S D O O C Y|S D L|S D R|S D|S D|C|T T Y|E L|L T|O| | |R S|R S C C O P|R S O|C S A|R S|R S|M|T O P|T L|A C|R| | |C T|C T K K S E|C T W|R T G|C T|C T|P|L S E|2 C|N I|T| | |---+-----------+-----+-----+---+---+-+-----+---+---+-+ | | | | 1 1|1 1 1|1 1|1 1|1|2 2 2|2 2|2 2|3| | Port |1 2|3 4 5 6 7 8|9 0 1|2 3 4|5 6|7 8|9|0 1 2|5 6|7 8|1| ====================================================================== | ge.3.5 |* *|* * * * * *| |* * *|* *|* *|*| * *|* *|o *|*|