Class fabric:ProtoPol (ABSTRACT)

Class ID:695
Encrypted: false - Exportable: true - Persistent: true - Configurable: true - Subject to Quota: Disabled
Write Access: []
Read Access: [admin]
Creatable/Deletable: derived (see Container Mos for details)
Possible Semantic Scopes: EPG, Infra, Fabric,
Semantic Scope Evaluation Rule: Subclasses
Monitoring Policy Source: Parent
Monitoring Flags : [ IsObservable: false, HasStats: false, HasFaults: false, HasHealth: false, HasEventRules: false ]

A base class for protocol policies.

Naming Rules


DN FORMAT: 

                


Diagram

Super Mo: pol:Def,
Sub Mos: fabric:IntfPol, fabric:L2ProtoPol, fabric:L3ProtoPol, fabric:ProtoDomPol, fabric:ProtoIfPol, fabric:ProtoInstPol, lbp:Pol,


Inheritance
[V] naming:NamedObject An abstract base class for an object that contains a name.
 ├
[V] pol:Obj Represents a generic policy object.
 
 ├
[V] pol:Def Represents self-contained policy document.
 
 
 ├
[V] fabric:ProtoPol A base class for protocol policies.
 
 
 
 ├
[V] fabric:IntfPol An abstraction of the interface policy.
 
 
 
 
 ├
[V] fabric:HIfPol The host interface policy specifies the layer 1 parameters of host facing ports.
 
 
 
 ├
[V] fabric:L2ProtoPol A base class for layer 2 protocol policies.
 
 
 
 ├
[V] fabric:L3ProtoPol A base class for layer 3 protocol policies.
 
 
 
 
 ├
[V] bgp:APeerPfxPol The abstraction of a peer prefix policy.
 
 
 
 
 
 ├
[V] bgp:PeerPfxPol The peer prefix policy defines how many prefixes can be received from a neighbor and the action to take when the number of allowed prefixes is exceeded. This feature is commonly used for external BGP peers, but can also be applied to internal BGP peers.
 
 
 
 
 ├
[V] bgp:ARtTarget  Abstraction of BGP Route Target
 
 
 
 
 
 ├
[V] bgp:RtTarget  BGP Route Target
 
 
 
 
 
 ├
[V] bgp:RtTargetDef  BGP Route Target Definition
 
 
 
 
 ├
[V] bgp:ARtTargetInstrP  Abstracttion of BGP Route Target Instrumentation Profile
 
 
 
 
 
 ├
[V] bgp:RtTargetInstrP  BGP Route Target Instrumentation Profile
 
 
 
 
 
 ├
[V] bgp:RtTargetInstrPDef  BGP Route Target Instrumentation Profile Definition
 
 
 
 
 ├
[V] bgp:ARtTargetP  Abstraction of BGP Route Target Profile
 
 
 
 
 
 ├
[V] bgp:AutoRtTargetPDef  BGP Automatic Route Target Profile Definition
 
 
 
 
 
 ├
[V] bgp:RtTargetP  BGP Route Target Profile
 
 
 
 
 
 ├
[V] bgp:RtTargetPDef  BGP Route Target Profile Definition
 
 
 
 
 ├
[V] coop:Pol The COOP policy contains groups of Oracles nodes and COOP repositories.
 
 
 
 
 ├
[V] l3ext:AFabricExtRoutingP  Abstraction of Fabric External Routing Profile
 
 
 
 
 
 ├
[V] l3ext:FabricExtRoutingP  Fabric External Routing Profile
 
 
 
 
 
 ├
[V] l3ext:FabricExtRoutingPDef  Fabric External Routing Profile Definition
 
 
 
 
 ├
[V] l3ext:ARouteTagPol The route tag policy.
 
 
 
 
 
 ├
[V] l3ext:RouteTagDef Definition of Route Tag Policy
 
 
 
 
 
 ├
[V] l3ext:RouteTagPol A route tag is used to assign a number to identify the policy.
 
 
 
 ├
[V] fabric:ProtoDomPol A base class for context-level protocol policies.
 
 
 
 
 ├
[V] fabric:L2DomPol A base class for layer 2 context-level policies.
 
 
 
 
 
 ├
[V] fv:AEpRetPol Abstract of an endpoint retention policy.
 
 
 
 
 
 
 ├
[V] fv:EpRetDef An endpoint retention definition.
 
 
 
 
 
 
 ├
[V] fv:EpRetPol The endpoint retention policy provides the parameters for the lifecycle of the endpoints.
 
 
 
 
 
 ├
[V] igmp:ASnoopPol Restricts flooding of multicast traffic by sending multicast traffic only to the bridge domains that are subscribed to a particular multicast group.
 
 
 
 
 
 
 ├
[V] igmp:SnoopDef The process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams.
 
 
 
 
 
 
 ├
[V] igmp:SnoopPol The IGMP snooping policy streamlines multicast traffic handling for VLANs. By examining (snooping) IGMP membership report messages from interested hosts, multicast traffic is limited to the subset of VLAN interfaces on which the hosts reside.
 
 
 
 
 ├
[V] fabric:L3DomPol A base class for layer 3 context-level policies.
 
 
 
 
 
 ├
[V] fabric:L3CtxPol A base class for layer 3 context-level policies.
 
 
 
 
 
 
 ├
[V] bgp:ACtxAfPol The BGP address family context policy.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxAfDef The BGP address family context definition.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxAfPol 
 
 
 
 
 
 
 ├
[V] bgp:ACtxPol The context-level BGP policy.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxDef An internal object for the BGP context-level policy definition.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxPol The BGP timers policy uses timers to control periodic activities such as the frequency keepalive messages that are sent to its peer, the amount of time the system waits to declare a peer dead after keepalive messages stop being received, and the amount of time before restarting a dead peer. The BGP timer policy enables you to specify the intervals for the periodic activities and supplies two options for graceful restart control: the graceful rest...
 
 
 
 
 
 
 
 ├
[V] bgp:NodeCtxDef  Node-level bgp definition
 
 
 
 
 
 
 ├
[V] eigrp:ACtxAfPol The abstraction of the context-level EIGRP policy, which contains the configuration for an address family on a context on the node. The EIGRP policy is configured under the tenant protocol policies and can be applied to one or more contexts (private domains) under the tenant. The EIGRP context policy can be enabled on a context through a relation in the context per address family. If there is no relation to a given address family, or the EIGRP c...
 
 
 
 
 
 
 
 ├
[V] eigrp:CtxAfDef The context-level EIGRP address family definition.
 
 
 
 
 
 
 
 ├
[V] eigrp:CtxAfPol An EIGRP context policy can be applied on one or more contexts under the tenant. EIGRP context policies can be enabled on a context through a relation in the context per address family. If there is no relation to a given address family such as IPv6 or the EIGRP context policy mentioned in the relation doesn't exist, then the default context policy created under Tenant Common will be used for that address family.
 
 
 
 
 
 
 ├
[V] hsrp:AGroupPol  hsrp group abstraction policy
 
 
 
 
 
 
 
 ├
[V] hsrp:GroupPol  Hsrp Group Policy
 
 
 
 
 
 
 ├
[V] ipmc:ACtxPol  Abstraction of Context-level Routed Multicast policy
 
 
 
 
 
 
 
 ├
[V] igmp:CtxDef  Context-level IGMP definition
 
 
 
 
 
 
 
 ├
[V] igmp:CtxP  Context-level IGMP policy
 
 
 
 
 
 
 ├
[V] ospf:ACtxPol The OSPF policy information.
 
 
 
 
 
 
 
 ├
[V] ospf:CtxDef The context-level OSPF definition.
 
 
 
 
 
 
 
 ├
[V] ospf:CtxDefAf The context-level OSPF definition per address family.
 
 
 
 
 
 
 
 ├
[V] ospf:CtxPol The context-level OSPF timer policy provides the Hello timer and Dead timer intervals configuration.
 
 
 
 
 
 
 ├
[V] rtdmc:ACtxPol  Abstraction of Context-level Routed Multicast policy
 
 
 
 
 
 
 
 ├
[V] pim:CtxDef Context-level PIM definition.
 
 
 
 
 
 
 
 ├
[V] pim:CtxP Context-level PIM policy.
 
 
 
 
 
 ├
[V] isis:DomPol The domain policy is used to configure IS-IS domain specific properties.
 
 
 
 ├
[V] fabric:ProtoIfPol A base class for interface-level protocol policies.
 
 
 
 
 ├
[V] fabric:L1IfPol 
 
 
 
 
 
 ├
[V] stormctrl:IfPol The storm control interface policy. A traffic storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. You can use the traffic storm control feature to prevent disruptions on ports by a broadcast, multicast, or unknown unicast traffic storm on physical interfaces.
 
 
 
 
 ├
[V] fabric:L2IfPol A base class for layer 2 interface-level policies.
 
 
 
 
 
 ├
[V] cdp:AIfPol The CDP Interface Policy parameters. CDP is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. CDP can also be used to display information about the interfaces your router uses. CDP is media- and protocol-independent, and runs on all Cisco-manufactured equipment including routers, bridges, access servers, and switches.
 
 
 
 
 
 
 ├
[V] cdp:IfPol The CDP interface policy, which is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. CDP can also be used to display information about the interfaces your router uses. CDP is media- and protocol-independent, and runs on all Cisco-manufactured equipment including routers, bridges, access servers, and switches.
 
 
 
 
 
 
 ├
[V] cdp:IfPolDef The read only copy of CDP interface policy.
 
 
 
 
 
 ├
[V] copp:IfPol  Per interface per protocol CoPP policy
 
 
 
 
 
 ├
[V] copp:ProtoClassP 
 
 
 
 
 
 ├
[V] fc:IfPol  interface FC policy
 
 
 
 
 
 ├
[V] l2:IfPol 
 
 
 
 
 
 ├
[V] l2:LoadBalancePol 
 
 
 
 
 
 ├
[V] l2:PortAuthPol 
 
 
 
 
 
 ├
[V] lacp:ALagPol The abstract LACP policy definition.
 
 
 
 
 
 
 ├
[V] lacp:LagPol The PortChannel policy enables you to bundle several physical ports together to form a single port channel. LACP enables a node to negotiate an automatic bundling of links by sending LACP packets to the peer node.
 
 
 
 
 
 
 ├
[V] lacp:LagPolDef Read-only copy of LACP policy.
 
 
 
 
 
 ├
[V] lacp:IfPol The PortChannel interface policy defines a common configuration that will apply to one or more LACP interfaces.
 
 
 
 
 
 ├
[V] lldp:AIfPol A summary of the interface policy. We recommend you include information about where and when the policy should be used. The abstraction can be up to 128 characters.
 
 
 
 
 
 
 ├
[V] lldp:IfPol The LLDP interface policy, which defines a common configuration that will apply to one or more LLDP interfaces. LLDP uses the logical link control (LLC) services to transmit and receive information to and from other LLDP agents.
 
 
 
 
 
 
 ├
[V] lldp:IfPolDef Read-only copy of the LLDP interface policy.
 
 
 
 
 
 ├
[V] mcp:AIfPol 
 
 
 
 
 
 
 ├
[V] mcp:IfPol 
 
 
 
 
 
 ├
[V] netflow:AFabExporterPol Abstarct Fabric Netflow Exporter
 
 
 
 
 
 
 ├
[V] netflow:AExporterPol  Abstract Netflow Exporter
 
 
 
 
 
 
 
 ├
[V] netflow:ExporterPol  Exporter information for bootstrapping the netflow Collection agent
 
 
 
 
 
 
 
 ├
[V] netflow:ExporterPolDef  Define the Netflow Exporter Policy MO which contains internal information needed to program the leaf
 
 
 
 
 
 
 ├
[V] netflow:VmmExporterPol 
 
 
 
 
 
 
 ├
[V] netflow:VmmExporterPolDef  Read only copy of VMM Netflow Exporter policy
 
 
 
 
 
 ├
[V] netflow:AMonitorPol 
 
 
 
 
 
 
 ├
[V] netflow:MonitorPol 
 
 
 
 
 
 
 ├
[V] netflow:MonitorPolDef  Define the Netflow Monitor Policy MO which contains internal information needed to program the leaf
 
 
 
 
 
 ├
[V] netflow:ARecordPol  Abstract Flow Record
 
 
 
 
 
 
 ├
[V] netflow:RecordPol  Flow Record
 
 
 
 
 
 
 ├
[V] netflow:RecordPolDef  Define the Netflow Record Policy MO which contains internal information needed to program the leaf
 
 
 
 
 
 ├
[V] poe:AIfPol  Abstraction of POE Interface Policy
 
 
 
 
 
 
 ├
[V] poe:IfPol  POE Interface Policy
 
 
 
 
 
 ├
[V] qos:ADppPol  Define a Data Plane Policing policy. User is supposed to use this in scenarios where the incoming traffic need to be policed to certain levels
 
 
 
 
 
 
 ├
[V] qos:DppPol  Define a Data Plane Policing policy. User is supposed to use this in scenarios where the incoming traffic need to be policed to certain levels
 
 
 
 
 
 
 ├
[V] qos:DppPolDef  Define the Data Plane Policing MO which contains internal information needed to program the leaf
 
 
 
 
 
 ├
[V] stp:AIfPol An abstraction of an spanning-tree protocol interface policy. This is applicable to leaf ports and n1000v distributed virtual switches. Extended chassis ports have BPDU guard filter enabled by default.
 
 
 
 
 
 
 ├
[V] stp:IfPol The Spanning-Tree Protocol (STP) interface policy defines a common configuration that will apply to one or more interfaces. STP prevents loops from being formed when the interfaces are interconnected via multiple paths. Spanning-Tree Protocol implements the 802.1D IEEE algorithm by exchanging BPDU messages with other switches to detect loops, and then removes the loop by shutting down selected bridge interfaces. This algorithm guarantees that th...
 
 
 
 
 
 
 ├
[V] stp:IfPolDef The read-only copy of the spanning-tree protocol interface policy.
 
 
 
 
 ├
[V] fabric:L2PortSecurityPol 
 
 
 
 
 
 ├
[V] l2:PortSecurityPol  Port Security Policy
 
 
 
 
 
 ├
[V] l2:PortSecurityPolDef  Port Security Policy
 
 
 
 
 ├
[V] fabric:L3IfPol A base class for layer 3 interface-level policies.
 
 
 
 
 
 ├
[V] bfd:AIfPol  Interface-level bfd abstraction policy
 
 
 
 
 
 
 ├
[V] bfd:IfPol  Interface-level bfd policy
 
 
 
 
 
 ├
[V] eigrp:IfPol The EIGRP interface policy, which defines a common configuration that will apply to one or more EIGRP interfaces.
 
 
 
 
 
 ├
[V] hsrp:AIfPol  Interface-level hsrp abstraction policy
 
 
 
 
 
 
 ├
[V] hsrp:IfPol  Interface-level hsrp policy
 
 
 
 
 
 ├
[V] ipmc:AIfPol  Interface-level ipmc policy
 
 
 
 
 
 
 ├
[V] igmp:IfDef 
 
 
 
 
 
 
 ├
[V] igmp:IfPol  Interface-level IGMP policy
 
 
 
 
 
 ├
[V] nd:AIfPol The neighbor discovery interface policy defines a common configuration that will apply to one or more neighbor discovery interfaces.
 
 
 
 
 
 
 ├
[V] nd:IfPol The neighbor discovery interface policy defines a common configuration that will apply to one or more neighbor discovery interfaces.
 
 
 
 
 
 
 ├
[V] nd:IfPolDef The read only copy of the neighbor discovery interface policy.
 
 
 
 
 
 ├
[V] nd:APfxPol The neighbor discovery prefix policy.
 
 
 
 
 
 
 ├
[V] nd:PfxPol The neighbor discovery prefix policy.
 
 
 
 
 
 
 ├
[V] nd:PfxPolDef The neighbor discovery prefix policy definition.
 
 
 
 
 
 ├
[V] ospf:IfPol The OSPF interface-level policy information.
 
 
 
 
 
 ├
[V] rtdmc:AIfPol  Interface-level rtdmc-SM policy
 
 
 
 
 
 
 ├
[V] pim:IfDef PIM interface definition.
 
 
 
 
 
 
 ├
[V] pim:IfPol Interface-level PIM-SM (sparse mode) policy.
 
 
 
 
 
 ├
[V] rtdmc:AIfPolCont  Interface-level rtdmc
 
 
 
 
 
 
 ├
[V] rtdmc:McastIfDefCont  Interface Policy Container
 
 
 
 
 
 ├
[V] rtdmc:ARtMapPol  Route Map Policy
 
 
 
 
 
 
 ├
[V] pim:RouteMapDef PIM route map definition
 
 
 
 
 
 
 ├
[V] pim:RouteMapPol PIM route map policy
 
 
 
 
 ├
[V] fabric:L4IfPol 
 
 
 
 
 
 ├
[V] nws:AFwPol  Firewall Policy Definition
 
 
 
 
 
 
 ├
[V] nws:FwPol 
 
 
 
 
 
 
 ├
[V] nws:FwPolDef  read only copy of lacp policy
 
 
 
 
 ├
[V] fabric:QinqIfPol 
 
 
 
 ├
[V] fabric:ProtoInstPol A base class for instance-level protocol policies.
 
 
 
 
 ├
[V] dns:AProfile The DNS Profile.
 
 
 
 
 
 ├
[V] dns:Prof The DNS instance information.
 
 
 
 
 
 ├
[V] dns:Profile The DNS profile defines a set of DNS providers and can be deployed to a switch for tenant contexts. To deploy a DNS profile on a switch, the appropriate label has to be defined for the context deployed on switch.
 
 
 
 
 ├
[V] dnsepg:ADomain  DNS Abstract Domain
 
 
 
 
 
 ├
[V] dnsepg:Domain  DNS Domain
 
 
 
 
 ├
[V] dnsepg:ZoneDB  DNS Zone DB
 
 
 
 
 ├
[V] dnsepg:ZoneEntry  DNS Zone Entry
 
 
 
 
 ├
[V] fabric:L2InstPol A base class for layer 2 interface-level policies.
 
 
 
 
 
 ├
[V] cdp:InstPol Specifies the node-level CDP policy.
 
 
 
 
 
 ├
[V] edr:ErrDisRecoverPol The error disabled recovery policy specifies the policy for re-enabling a port that was disabled due to one or more pre-defined error conditions.
 
 
 
 
 
 ├
[V] ep:ControlP  Endpoint Control Policy
 
 
 
 
 
 ├
[V] ep:IpAgingP 
 
 
 
 
 
 ├
[V] ep:LoopProtectP The endpoint loop protection policy specifies how loops detected by frequent mac moves are handled.
 
 
 
 
 
 ├
[V] fc:FabricPol 
 
 
 
 
 
 ├
[V] fc:InstPol 
 
 
 
 
 
 ├
[V] l2:AInstPol A fabric-wide L2 policy.
 
 
 
 
 
 
 ├
[V] l2:InstPol The Layer 2 instance policy is used for configuring fabric-wide layer 2 settings. Currently, this policy contains only fabric MTU and management MTU configuration.
 
 
 
 
 
 
 ├
[V] l2:InstPolDef A read-only copy of the fabric MTU policy.
 
 
 
 
 
 ├
[V] l2:NodeAuthPol 
 
 
 
 
 
 ├
[V] lldp:InstPol The node level LLDP policy.
 
 
 
 
 
 ├
[V] mcp:InstPol 
 
 
 
 
 
 ├
[V] poe:InstPol  Node level poe policy
 
 
 
 
 
 ├
[V] span:ADest The abstraction of an SPAN destination. The SPAN destination is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a port or an endpoint group...
 
 
 
 
 
 
 ├
[V] span:AVDest The abstraction of a VSPAN destination. The VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of VSPAN sources and destinations. The destination can be either a port or an endpoint...
 
 
 
 
 
 
 
 ├
[V] span:VDest The VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (tenant, access, or fabric) determines the allowed types of VSPAN sources and destinations. The destination can be either a port or an endpoint group. If the destination is a port, it...
 
 
 
 
 
 
 
 ├
[V] span:VDestDef The VLAN-based SPAN (VSPAN) destination definition.
 
 
 
 
 
 
 ├
[V] span:Dest The SPAN destination is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a port or an endpoint group. If the destination is a port, it shoul...
 
 
 
 
 
 ├
[V] span:ASrcGrp The abstraction of a SPAN source group. The SPAN source group can contain a group of SPAN sources, which is where network traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source group and a SPAN destination. The type of session (Tenan...
 
 
 
 
 
 
 ├
[V] span:SrcGrp The SPAN source group can contain a group of SPAN sources. A SPAN source is where network traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source group and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines...
 
 
 
 
 
 
 ├
[V] span:SrcGrpDef The SPAN source group definitions. The SPAN source is where traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (access SPAN), a Layer 2 bridge domain, or a Layer 3 context (fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access or fabric) determines the allowed types of SPAN sources an...
 
 
 
 
 
 ├
[V] span:AVDestGrp The abstraction of a VSPAN destination group. The VSPAN destination group can contain a group of VSPAN destinations. A VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of VSPAN so...
 
 
 
 
 
 
 ├
[V] span:VDestGrp The VSPAN destination group contains a group of VSPAN destinations. A VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (tenant, access, or fabric) determines the allowed types of VSPAN sources and destinations. The destination can be ei...
 
 
 
 
 
 
 ├
[V] span:VDestGrpDef VSPAN destination group used for configuring VSPAN source group definitions.
 
 
 
 
 
 ├
[V] span:AVSrcGrp The abstraction of a VSPAN source group. The VSPAN source group can contain a group of VSPAN sources. A VSPAN source is where network traffic is sampled. A VSPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access VSPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric VSPAN). When you create a traffic monitoring session, you must select a VSPAN source group and a VSPAN destination. The type ...
 
 
 
 
 
 
 ├
[V] span:VSrcGrp The VSPAN source group can contain a group of VSPAN sources. A VSPAN source is where network traffic is sampled. A VSPAN source can be an endpoint group (EPG), one or more ports; or port traffic filtered by an EPG (access VSPAN), a Layer 2 bridge domain, or a Layer 3 context (fabric VSPAN). When you create a traffic monitoring session, you must select a VSPAN source group and a VSPAN destination. The type of session (tenant, access, or fabric) de...
 
 
 
 
 
 
 ├
[V] span:VSrcGrpDef The VSPAN source group definition.
 
 
 
 
 
 ├
[V] span:DestGrp The SPAN destination group contains a group of SPAN destinations. A SPAN destination is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a p...
 
 
 
 
 
 ├
[V] span:SpanProv The SPAN destination provider is used for configuring SPAN destination provider parameters.
 
 
 
 
 
 ├
[V] span:SrcTargetShadow The SPAN source to EPG information.
 
 
 
 
 
 ├
[V] span:SrcTargetShadowBD The SPAN source to bridge domain (BD) information.
 
 
 
 
 
 ├
[V] span:SrcTargetShadowCtx The SPAN source to Ctx information.
 
 
 
 
 
 ├
[V] span:TaskParam The SPAN source to EPG task information.
 
 
 
 
 
 ├
[V] span:VSpanProv The VSPAN destination provider is used for configuring VSPAN destination provider parameters.
 
 
 
 
 
 ├
[V] stp:InstPol The spanning Tree Protocol (STP) instance policy, which enables you to set the bridge protocol data unit (BPDU) guard policy or filter. BDPUs are packets that run the STP protocol. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. Loops are deadly to a network.
 
 
 
 
 
 ├
[V] vpc:InstPol The node-level vPC domain policy, which is used to specify a vPC domain and is applied to both vPC peer devices, the vPC peer keepalive link, the vPC peer link, and all the PortChannels in the vPC domain connected to the downstream device. You can have only one vPC domain ID on each device.
 
 
 
 
 ├
[V] fabric:L3InstPol A base class for layer 3 instance-level policies.
 
 
 
 
 
 ├
[V] bfd:AInstPol  Global BFD policy
 
 
 
 
 
 
 ├
[V] bfd:Ipv4InstPol 
 
 
 
 
 
 
 ├
[V] bfd:Ipv6InstPol 
 
 
 
 
 
 ├
[V] bgp:InstPol The BGP Instance level policy is used to configure MP-BGP policies inside the fabric.
 
 
 
 
 
 ├
[V] dhcp:ARelayP The abstract DHCP Relay profile, which is used for configuring relay parameters per bridge domain (BD).
 
 
 
 
 
 
 ├
[V] dhcp:RelayP The DHCP relay profile, with one or more helper addresses in it, configures a DHCP relay agent for forwarding DHCP packets to a remote server.
 
 
 
 
 ├
[V] fabric:UtilInstPol A base class for policies.
 
 
 
 
 
 ├
[V] psu:InstPol The power redundancy policy is for all power supply units on the fabric nodes (leaves and spines) that are consuming the power supply policy through their respective selector profile policy.
 
 
 
 
 ├
[V] fabric:VxlanInstPol 
 
 
 
 
 
 ├
[V] l4:AVxlanInstPol 
 
 
 
 
 
 
 ├
[V] l4:VxlanInstPol 
 
 
 
 
 
 
 ├
[V] l4:VxlanInstPolDef 
 
 
 
 ├
[V] lbp:Pol The load balancing policy options for balancing traffic among the available uplink ports. Static hash load balancing is the traditional load balancing mechanism used in networks where each flow is allocated to an uplink based on a hash of its 5-tuple. This load balancing gives a distribution of flows across the available links that is roughly even. Usually, with a large number of flows, the even distribution of flows results in an even distributi...


Events
                


Faults
                


Fsms
                


Properties Summary
Defined in: pol:Def
naming:Descr
          string:Basic
descr  (pol:Def:descr)
           Specifies a description of the policy definition.
naming:Descr
          string:Basic
ownerKey  (pol:Def:ownerKey)
           The key for enabling clients to own their data for entity correlation.
naming:Descr
          string:Basic
ownerTag  (pol:Def:ownerTag)
           A tag for enabling clients to add their own data. For example, to indicate who created this object.
Defined in: pol:Obj
naming:Name
          string:Basic
name  (pol:Obj:name)
           Overrides:naming:NamedObject:name
           null
Defined in: naming:NamedObject
naming:NameAlias
          string:Basic
nameAlias  (naming:NamedObject:nameAlias)
           NO COMMENTS
Defined in: mo:TopProps
mo:ModificationChildAction
          scalar:Bitmask32
childAction  (mo:TopProps:childAction)
           Delete or ignore. For internal use only.
reference:BinRef dn  (mo:TopProps:dn)
           A tag or metadata is a non-hierarchical keyword or term assigned to the fabric module.
reference:BinRN rn  (mo:TopProps:rn)
           Identifies an object from its siblings within the context of its parent object. The distinguished name contains a sequence of relative names.
mo:ModificationStatus
          scalar:Bitmask32
status  (mo:TopProps:status)
           The upgrade status. This property is for internal use only.
Properties Detail

childAction

Type: mo:ModificationChildAction
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelChildAction
    Comments:
Delete or ignore. For internal use only.
Constants
deleteAll 16384u deleteAll NO COMMENTS
ignore 4096u ignore NO COMMENTS
deleteNonPresent 8192u deleteNonPresent NO COMMENTS
DEFAULT 0 --- This type is used to





descr

Type: naming:Descr
Primitive Type: string:Basic

Like: naming:Described:descr
Units: null
Encrypted: false
Access: admin
Category: TopLevelRegular
Property Validators:
    Range:  min: "0"  max: "128"
        Allowed Chars:
            Regex: [a-zA-Z0-9\\!#$%()*,-./:;@ _{|}~?&+]+
    Comments:
Specifies a description of the policy definition.



dn

Type: reference:BinRef

Units: null
Encrypted: false
Access: implicit
Category: TopLevelDn
    Comments:
A tag or metadata is a non-hierarchical keyword or term assigned to the fabric module.



name

Type: naming:Name
Primitive Type: string:Basic

Overrides:naming:NamedObject:name
Units: null Encrypted: false Access: admin Category: TopLevelRegular Property Validators: Range: min: "0" max: "64" Allowed Chars: Regex: [a-zA-Z0-9_.:-]+
    Comments:
null



nameAlias

Type: naming:NameAlias
Primitive Type: string:Basic

Units: null
Encrypted: false
Access: admin
Category: TopLevelRegular
Property Validators:
    Range:  min: "0"  max: "63"
        Allowed Chars:
            Regex: [a-zA-Z0-9_.-]+
    Comments:
NO COMMENTS



ownerKey

Type: naming:Descr
Primitive Type: string:Basic

Units: null
Encrypted: false
Access: admin
Category: TopLevelRegular
Property Validators:
    Range:  min: "0"  max: "128"
        Allowed Chars:
            Regex: [a-zA-Z0-9\\!#$%()*,-./:;@ _{|}~?&+]+
    Comments:
The key for enabling clients to own their data for entity correlation.



ownerTag

Type: naming:Descr
Primitive Type: string:Basic

Units: null
Encrypted: false
Access: admin
Category: TopLevelRegular
Property Validators:
    Range:  min: "0"  max: "64"
        Allowed Chars:
            Regex: [a-zA-Z0-9\\!#$%()*,-./:;@ _{|}~?&+]+
    Comments:
A tag for enabling clients to add their own data. For example, to indicate who created this object.



rn

Type: reference:BinRN

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRn
    Comments:
Identifies an object from its siblings within the context of its parent object. The distinguished name contains a sequence of relative names.



status

Type: mo:ModificationStatus
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelStatus
    Comments:
The upgrade status. This property is for internal use only.
Constants
created 2u created In a setter method: specifies that an object should be created. An error is returned if the object already exists.
In the return value of a setter method: indicates that an object has been created.
modified 4u modified In a setter method: specifies that an object should be modified
In the return value of a setter method: indicates that an object has been modified.
deleted 8u deleted In a setter method: specifies that an object should be deleted.
In the return value of a setter method: indicates that an object has been deleted.
DEFAULT 0 --- This type controls the life cycle of objects passed in the XML API.

When used in a setter method (such as configConfMo), the ModificationStatus specifies whether an object should be created, modified, deleted or removed.
In the return value of a setter method, the ModificationStatus indicates the actual operation that was performed. For example, the ModificationStatus is set to "created" if the object was created. The ModificationStatus is not set if the object was neither created, modified, deleted or removed.

When invoking a setter method, the ModificationStatus is optional:
If a setter method such as configConfMo is invoked and the ModificationStatus is not set, the system automatically determines if the object should be created or modified.