This command to display all policy classification capabilities supported by your device.
This command has no arguments or variables.
N/A.
The output of this command shows a table listing classifiable traffic attributes and the type of actions, by rule type, that can be executed relative to each attribute. Above the table is a list of all the actions possible on this device.
The following example displays all policy classification capabilities supported by the device:
# show policy capability Priority Permit Deny Precedence Reordering TCI Overwrite Rules Table Rule-Use Accounting Rule-Use Notification CoS Table Longest Prefix Rules Port Disable Action Auto Clear Interval RFC 3580 Map Policy Enable Mirror Action Web Redirect Authentication Override NSI Access List =========================================================================== | | D | | | | | F | | | D | T | | Q | | | Y | | | | | O | S | | I | C | M | U | | | N | A | | | | R | Y | | S | I | I | A | | | A | D | V | | D | W | S | T | A | O | R | R | | | M | M | L | C | R | A | L | R | B | V | R | A | | | I | I | A | O | O | R | O | A | L | E | O | N | | SUPPORTED RULE TYPES | C | N | N | S | P | D | G | P | E | R | R | T | =========================================================================== |MAC source address | X | X | | X | X | X | X | X | X | | X | | |MAC destination address | | | | X | X | X | X | X | X | | X | | |IPX source address | | | | | | | | | | | | | |IPX destination address | | | | | | | | | | | | | |IPX source socket | | | | | | | | | | | | | |IPX destination socket | | | | | | | | | | | | | |IPX transmission control | | | | | | | | | | | | | |IPX type field | | | | | | | | | | | | | |IPv6 source address | | | | | | | | | | | | | |IPv6 destination address | | | | X | X | X | X | X | X | | X | | |IPv6 flow label | | | | | | | | | | | | | |IP source address | | | | X | X | X | X | X | X | | X | | |IP destination address | | | | X | X | X | X | X | X | | X | | |IP fragmentation | | | | X | X | X | X | X | X | | X | | |UDP port source | | | | X | X | X | X | X | X | | X | | |UDP port destination | | | | X | X | X | X | X | X | | X | | |TCP port source | | | | X | X | X | X | X | X | | X | | |TCP port destination | | | | X | X | X | X | X | X | | X | | |ICMP packet type | | | | X | X | X | X | X | X | | X | | |TTL | | | | X | X | X | X | X | X | | X | | |IP type of service | | | | X | X | X | X | X | X | | X | | |IP proto | | | | X | X | X | X | X | X | | X | | |ICMPv6 packet type | | | | X | X | X | X | X | X | | X | | |Ether II packet type | | | | X | X | X | X | X | X | | X | | |LLC DSAP/SSAP/CTRL | | | | | | | | | | | | | |VLAN tag | | | | | | | | | | | | | |Replace TCI | | | | | | | | | | | | | |Application Layer | | | | | | | X | X | X | | X | | |Access Control List | | | | | | | X | X | X | | X | | |Port string | X | X | | X | X | X | X | X | X | | X | | ===========================================================================
This command was first available in ExtremeXOS 16.1.
The authentication override status was added in ExtremeXOS 22.2
Mirror action was added in ExtremeXOS 30.2.
ACL Style Policy support was added in ExtremeXOS 30.5.
This command is available on all Universal switches supported in this document.