show policy allowed-type

Use this command to display a list of currently supported traffic rules applied to the administrative profile for one or more ports.

Syntax

show policy allowed-type port-string [-verbose]

Parameters

port-string Specifies port(s) for which to display traffic rules.
-verbose (Optional) Displays detailed information.

Defaults

If -verbose is not specified, summary information will be displayed.

Mode

All command modes.

Usage

The show policy allowed-type command output displays traffic rule types in attribute ID order (1 - 31) from left to right. Traffic rule type precedence defaults to the attribute ID order. See the table in Policy Capabilities in the S-, K-, and 7100 Series Configuration Guide for a listing and description of each traffic classification type. On the S- and K-Series, traffic rule type precedence can be changed using the precedence option of the set policy profile command. The current precedence attribute ID order can be displayed using the show policy profile command.

The show policy allowed-type command specifies two categories of traffic rule type: supported and allowed. Supported indicates whether the specified port supports the traffic rule type. Allowed is an administrative function. By default, all supported traffic rule types are allowed on the port. On the S- and K-Series, traffic rule types for a port can be disallowed using set policy allowed-type (S-, K-Series).

Example

7100-Series

This example displays the allowed traffic types for ports tg.1.1 through tg.1.5:

System(rw)->show policy allowed-type tg.1.1-5
              SUPPORTED AND ALLOWED TRAFFIC RULE TYPES
 o Means Traffic Rule Type is supported on this bridge port
 * Means Traffic Rule Type is supported and allowed on this bridge port
==========================================================================
|              |   TRAFFIC  RULE  TYPES                                |E|
+              |---+-----------+-----+-----+---+---+-+-----+-+---+---+-|g|
|              |   |           |     |     |   |   | |     | |   |   | |r|
|              |MAC|   IPX     |IPv6 | IP  |UDP|TCP| | IP  | |   |   | |e|
|              |   |           |     |     |   |   | |     |I|   |   | |s|
|              |   |    S D    |     |     |   |   | |     |C|E  |   | |s|
|              |   |    S S   T|    F|    F|   |   |I|    T|M|N  |V  |P| |
|              |S D|S D O O C Y|S D L|S D R|S D|S D|C|T T Y|P|E L|L T|O|E|
|              |R S|R S C C O P|R S O|C S A|R S|R S|M|T O P|v|T L|A C|R|n|
|              |C T|C T K K S E|C T W|R T G|C T|C T|P|L S E|6|2 C|N I|T|a|
|              |---+-----------+-----+-----+---+---+-+-----+-+---+---+-|b|
|              |   |           |  1 1|1 1 1|1 1|1 1|1|2 2 2|2|2 2|2 2|3|l|
|     Port     |1 2|3 4 5 6 7 8|9 0 1|2 3 4|5 6|7 8|9|0 1 2|3|5 6|7 8|1|e|
==========================================================================
| tg.1.1       |* *|           |  *  |* * *|* *|* *| |* * *| |*  |   |*| |
| tg.1.2       |* *|           |  *  |* * *|* *|* *| |* * *| |*  |   |*| |
| tg.1.3       |* *|           |  *  |* * *|* *|* *| |* * *| |*  |   |*| |
| tg.1.4       |* *|           |  *  |* * *|* *|* *| |* * *| |*  |   |*| |
| tg.1.5       |* *|           |  *  |* * *|* *|* *| |* * *| |*  |   |*| |
System(rw)->

This example displays the verbose level of allowed traffic types information for ports tg.1.1:

show policy allowed-type tg.1.1 -verbose
     Port        Supported And Allowed Traffic Rule Types
======================================================================
  tg.1.1       : Allowed traffic rule types = 1-2,10,12-18,20-22,25,27-28,31
               : MAC source address        (01) is supported and allowed
               : MAC destination address   (02) is supported and allowed
               : IPv6 destination address  (10) is supported and allowed
               : IP source address         (12) is supported and allowed
               : IP destination address    (13) is supported and allowed
               : IP fragmentation          (14) is supported and allowed
               : UDP port source           (15) is supported and allowed
               : UDP port destination      (16) is supported and allowed
               : TCP port source           (17) is supported and allowed
               : TCP port destination      (18) is supported and allowed
               : TTL                       (20) is supported and allowed
               : IP type of service        (21) is supported and allowed
               : IP proto                  (22) is supported and allowed
               : Ether II packet type      (25) is supported and allowed
               : Port string               (31) is supported and allowed
======================================================================

S- and K-Series

This example:

  • Disallows traffic rule index 7 (IPX CoS) on port ge.3.1 using the set policy allowed-type command
  • Displays the allowed traffic rule types for port ge.3.1 (index 7 is now supported but no longer allowed)
  • Allows traffic rule type index 7 on port ge.3.1
  • Displays the allowed traffic types for port ge.3.1 (index 7 is now both supported and allowed)
System(rw)->set policy allowed-type ge.3.1 traffic-rule 7 clear
System(rw)->show policy allowed-type ge.3.1
              SUPPORTED AND ALLOWED TRAFFIC RULE TYPES
 o Means Traffic Rule Type is supported on this bridge port
 * Means Traffic Rule Type is supported and allowed on this bridge port
============================================================================
|              |   TRAFFIC  RULE  TYPES                                  |E|
|              |---+-----------+-----+-----+---+---+-+-----+-+---+---+--+|g|
|              |   |           |     |     |   |   | |     | |   |   | | |r|
|              |MAC|   IPX     |IPv6 | IP  |UDP|TCP| | IP  | |   |   |A| |e|
|              |   |           |     |     |   |   | |     |I|   |   |P| |s|
|              |   |    S D    |     |     |   |   | |     |C|E  |   |P| |s|
|              |   |    S S   T|    F|    F|   |   |I|    T|M|N  |V  |L|P| |
|              |S D|S D O O C Y|S D L|S D R|S D|S D|C|T T Y|P|E L|L T|I|O|E|
|              |R S|R S C C O P|R S O|R S A|R S|R S|M|T O P|v|T L|A C|C|R|n|
|              |C T|C T K K S E|C T W|C T G|C T|C T|P|L S E|6|2 C|N I|.|T|a|
|              |---+-----------+-----+-----+---+---+-+-----+-+---+---+-+-|b|
|              |   |           |  1 1|1 1 1|1 1|1 1|1|2 2 2|2|2 2|2 2|2|3|l|
|     Port     |1 2|3 4 5 6 7 8|9 0 1|2 3 4|5 6|7 8|9|0 1 2|3|5 6|7 8|9|1|e|
============================================================================
| ge.3.1       |* *|* * * * o *|* * *|* * *|* *|* *|*|* * *|*|* *|* *|*|*| |
System(rw)->set policy allowed-type ge.3.1 traffic-rule 7 append
System(rw)->>show policy allowed-type ge.3.1
              SUPPORTED AND ALLOWED TRAFFIC RULE TYPES
 o Means Traffic Rule Type is supported on this bridge port
 * Means Traffic Rule Type is supported and allowed on this bridge port
============================================================================
|              |   TRAFFIC  RULE  TYPES                                  |E|
|              |---+-----------+-----+-----+---+---+-+-----+-+---+---+--+|g|
|              |   |           |     |     |   |   | |     | |   |   | | |r|
|              |MAC|   IPX     |IPv6 | IP  |UDP|TCP| | IP  | |   |   |A| |e|
|              |   |           |     |     |   |   | |     |I|   |   |P| |s|
|              |   |    S D    |     |     |   |   | |     |C|E  |   |P| |s|
|              |   |    S S   T|    F|    F|   |   |I|    T|M|N  |V  |L|P| |
|              |S D|S D O O C Y|S D L|S D R|S D|S D|C|T T Y|P|E L|L T|I|O|E|
|              |R S|R S C C O P|R S O|R S A|R S|R S|M|T O P|v|T L|A C|C|R|n|
|              |C T|C T K K S E|C T W|C T G|C T|C T|P|L S E|6|2 C|N I|.|T|a|
|              |---+-----------+-----+-----+---+---+-+-----+-+---+---+-+-|b|
|              |   |           |  1 1|1 1 1|1 1|1 1|1|2 2 2|2|2 2|2 2|2|3|l|
|     Port     |1 2|3 4 5 6 7 8|9 0 1|2 3 4|5 6|7 8|9|0 1 2|3|5 6|7 8|9|1|e|
============================================================================
| ge.1.1       |* *|* * * * * *|* * *|* * *|* *|* *|*|* * *|*|* *|* *|*|*| |System(rw)->