Classification Rules

Classification rules associate specific traffic classifications or policy behaviors with the policy role. There are two aspects of classification rule configuration:
  • The association of a traffic classification with a policy role by assigning the traffic classification to an administrative profile.
  • The assignment of policy rules that define desired policy behaviors for the specified traffic classification type.

Both the administrative profile and policy rules are associated with the policy role by specifying the admin-pid option, in the case of an administrative profile, or a profile-index value, in the case of the policy rule. Administrative profiles and policy rules are configured using the configure policy rule command.

The administrative profile assigns a traffic classification to a policy role by using the admin-profile option of the configure policy rule command.

Note

Note

Standard policy supports the VLAN (Virtual LAN) tag traffic classification for administrative profiles. All other traffic classifications are enhanced policy in an administrative profile context.
Note

Note

When both admin-profile port and macsource rule are configured on the same port, macsource rule takes precedence and the VLAN classification and rules applicable to macsource are applied to the port.

Policy rules are based on traffic classifications. Administrative Policy and Policy Rule Traffic Classifications provides the supported policy rule traffic classification command options and definitions. All other traffic classifications are supported by standard policy.

A detailed discussion of supported traffic classifications is available in the “Traffic Classification Rules” section of the Extreme Management Center Policy Manager online help.

Click to expand in new window

Administrative Policy and Policy Rule Traffic Classifications

Traffic Classification Description Attribute ID Enhanced Rule
macsource Classifies based on MAC source address. 1  
macdest Classifies based on MAC destination address. 2  
ipsourcesocket Classifies based on source IP address. 12  
ipdestsocket Classifies based on destination IP address. 13  
ip6dest Classifies based on destination IPv6 address. 10  
ipttl Classifies based on TTL. 20  
ip frag Classifies based on IP fragmentation value. 14  
udpsourceportip Classifies based on UDP source port and optional post-fix IP address. 15  
udpdestportip Classifies based on UDP destination port and optional post-fix IP address. 16  
tcpsourceportip Classifies based on TCP source port and optional post-fix IP address. 17  
tcpdestportip Classifies based on TCP destination port and optional post-fix IP address. 18  
icmp Classifies based on ICMP type code. 19  
iptos Classifies based on Type of Service field in IP packet. 21  
ipproto Classifies based on protocol field in IP packet. 22  
icmp6 Classifies based on ICMPv6 type code. 23  
ether Classifies based on type field in Ethernet II packet. 25  
port Classifies based on port-string. 31  

A data value is associated with most traffic classifications to identify the specific network element for that classification. For data value and associated mask details, see the “Syntax Description” table in the configure policy rule profile_index [ether ether | icmp6type icmp6type | icmptype icmptype | ip6dest ip6dest |ipdestsocket ipdestsocket | ipfrag | ipproto ipproto | ipsourcesocket ipsourcesocket | iptos iptos | ipttl ipttl | macdest macdest | macsource macsource | port port | tcpdestportIP tcpdestportIP | tcpsourceportIP tcpsourceportIP | udpdestportIP udpdestportIP | udpsourceportIP udpsourceportIP ] {mask mask } {port-string [ port_string | all]} {storage-type [non-volatile | volatile]} {drop | forward} {cos cos } command in the ExtremeXOS 22.7 Command Reference Guide.