Class pol:Obj (ABSTRACT)

Class ID:4594
Encrypted: false - Exportable: true - Persistent: true - Configurable: true - Subject to Quota: Disabled - Abstraction Layer: Concrete Model - APIC NX Processing: Disabled
Write Access: []
Read Access: [admin]
Creatable/Deletable: derived (see Container Mos for details)
Possible Semantic Scopes: Common, EPG, Infra, Fabric,
Semantic Scope Evaluation Rule: Subclasses
Monitoring Policy Source: Parent
Monitoring Flags : [ IsObservable: false, HasStats: false, HasFaults: false, HasHealth: false, HasEventRules: false ]

Represents a generic policy object.

Naming Rules


DN FORMAT: 

                


Diagram

Super Mo: naming:NamedObject,
Sub Mos: bgp:CreatedBy, callhome:SmartCallhomeFault, comm:RLTepInfo, comp:Obj, copp:ACustomValues, dc:Policy, dci:CreatedBy, dhcp:AOption, dhcp:Ep, dns:AProv, edm:Obj, fabric:ANodeBlk, fabric:APodBlk, fabric:APortBlk, fabric:SecurityToken, fabric:SecurityTokenHelper, hcloud:ACloudBase, iacl:Entry, infra:FexBlk, l3ext:CtxUpdater, l3ext:EncapRequestor, pol:ADependentOn, pol:Comp, pol:Consumer, pol:Cont, pol:Ctrlr, pol:Def, pol:DependencyCont, pol:DependencyExpression, pol:Instr, pol:RelnHolder, pol:ResCont, pol:ResPolCont, pol:Resolver, qos:DscpTransCont, quota:Conf, rule:Item, shareident:Allocator, snmp:AClientP, snmp:ACtxP, snmp:ATrapFwdServerP, stats:AStatsBase, tag:Obj, telemetry:AFilter, telemetry:FilterPolicy, topoctrl:SecurityToken, vmm:ACapObj, vmm:EpValidatorPol, vmm:HvAvailPol, vmm:HvDesiredSt, vmm:ProtectedVmGroup, vns:VConn, vz:ARuleOwner, vz:ContractCfgReprocessor, vz:ContractHookMarkerCont, vz:CreatedBy, vz:TrCreatedBy,


Inheritance
[V] naming:NamedObject An abstract base class for an object that contains a name.
 ├
[V] pol:Obj Represents a generic policy object.
 
 ├
[V] bgp:CreatedBy 
 
 ├
[V] callhome:SmartCallhomeFault 
 
 ├
[V] comm:RLTepInfo  This object holds TEP address for RemoteLeaf information .
 
 ├
[V] comp:Obj An abstraction of compute objects in the system. This object is generated and used only by internal process.
 
 
 ├
[V] comp:InstPol  L4-L7 device policy for the controller
 
 
 ├
[V] comp:StatsPol The statistics policy for the controller. This object is generated and used internally by the system
 
 
 ├
[V] comp:VNicConf  L4-L7 device interface
 
 ├
[V] copp:ACustomValues  Base Class for all the custom settings a user can apply under a coppAProfile of type custom
 
 
 ├
[V] copp:LeafGen1CustomValues  Configuration of all the protocols burst and rates for LEAF of first generation
 
 
 ├
[V] copp:SpineGen1CustomValues  Configuration of all the protocols burst and rates for SPINE of first generation
 
 ├
[V] dc:Policy  device connector policy
 
 ├
[V] dci:CreatedBy 
 
 ├
[V] dhcp:AOption The DHCP abstract option.
 
 
 ├
[V] dhcp:Option The DHCP option is used to supply DHCP clients with configuration parameters such as a domain, name server, subnet, and network address. DHCP provides a framework for passing configuration information to clients on a TCP/IP network. The configuration parameters, and other control information, are carried in tagged data items that are stored in the options field of a DHCP message. The data items themselves are also called options. You can view, se...
 
 
 ├
[V] dhcp:OptionDef The option definition. Each DHCP option is defined by a unique name, ID, and option data.
 
 ├
[V] dhcp:Ep The DHCP Discovered Endpoint.
 
 ├
[V] dns:AProv Sets the DNS provider parameters. DNS uses a hierarchical scheme for establishing host names for network nodes, which allows local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the hostname of the device into its associated IP address.
 
 
 ├
[V] dns:Prov The DNS provider is a DNS server that uses a hierarchical scheme for establishing host names for network nodes, which local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the hostname of the device into its associated IP address.
 
 
 ├
[V] dns:Provider The DNS provider is a DNS server that uses a hierarchical scheme for establishing host names for network nodes, which local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the hostname of the device into its associated IP address.
 
 ├
[V] edm:Obj 
 
 ├
[V] fabric:ANodeBlk A base class for node blocks. This is a range of nodes. Each node block begins with the first port and ends with the last port.
 
 
 ├
[V] fabric:NodeBlk The node block. This is a range of nodes. Each node block begins with the first port and ends with the last port.
 
 
 ├
[V] infra:ConnNodeBlk The Connectivity Node Block is used for grouping nodes for connecting hosts (such as hypervisor).
 
 
 ├
[V] infra:NodeBlk A node block is a range of nodes. Each node block begins with the first port and ends with the last port.
 
 ├
[V] fabric:APodBlk The definition of a block object that represents selection ranges.
 
 
 ├
[V] fabric:PodBlk A POD block.
 
 
 ├
[V] infra:PodBlk 
 
 ├
[V] fabric:APortBlk An abstraction of the port block.
 
 
 ├
[V] fabric:ASubPortBlk  Abstraction of sub port (breakout) blocks
 
 
 
 ├
[V] fabric:SubPortBlk  Fabric sub port (breakout) block
 
 
 
 ├
[V] infra:SubPortBlk  Access sub port (breakout) block
 
 
 ├
[V] fabric:PortBlk A port block. This represents a range of ports and a range of cards. Each port block starts with the first port and first card and ends with the last port and last card.
 
 
 ├
[V] infra:ConnPortBlk The connectivity port block is used for grouping ports between the node and the host (such as hypervisor).
 
 
 ├
[V] infra:PortBlk The port block enables you to specify a range of interfaces.
 
 ├
[V] fabric:SecurityToken  Holds the internal fabric security token (for various protocols - coop, isis)
 
 ├
[V] fabric:SecurityTokenHelper 
 
 ├
[V] hcloud:ACloudBase 
 
 
 ├
[V] hcloud:AALbStats 
 
 
 
 ├
[V] hcloud:ALbStats 
 
 
 ├
[V] hcloud:AAction 
 
 
 
 ├
[V] hcloud:RuleAction  Action for a rule of a listener
 
 
 ├
[V] hcloud:AEndPoint 
 
 
 
 ├
[V] hcloud:EndPoint 
 
 
 
 ├
[V] hcloud:NetworkInterface 
 
 
 
 ├
[V] hcloud:ScaleSetNicGroup 
 
 
 ├
[V] hcloud:AResource 
 
 
 
 ├
[V] hcloud:ACidr 
 
 
 
 
 ├
[V] hcloud:Cidr 
 
 
 
 ├
[V] hcloud:AFlowLogPol 
 
 
 
 
 ├
[V] hcloud:SubnetFlowLogPol 
 
 
 
 
 ├
[V] hcloud:VpcFlowLogPol 
 
 
 
 ├
[V] hcloud:AInstance 
 
 
 
 
 ├
[V] hcloud:AHostRouter 
 
 
 
 
 
 ├
[V] hcloud:Csr 
 
 
 
 
 ├
[V] hcloud:Instance 
 
 
 
 ├
[V] hcloud:ALogGrpPol 
 
 
 
 
 ├
[V] hcloud:LogGrpPol 
 
 
 
 ├
[V] hcloud:ASecurityGroup 
 
 
 
 
 ├
[V] hcloud:ExtSecurityGroup  Placeholder that indicate a external connection
 
 
 
 
 ├
[V] hcloud:SecurityGroup  Group of endpoint sharing the same security rules
 
 
 
 ├
[V] hcloud:ASgRule 
 
 
 
 
 ├
[V] hcloud:IpEgressRule 
 
 
 
 
 ├
[V] hcloud:IpIngressRule 
 
 
 
 
 ├
[V] hcloud:SgEgressRule 
 
 
 
 
 ├
[V] hcloud:SgIngressRule 
 
 
 
 ├
[V] hcloud:Account 
 
 
 
 ├
[V] hcloud:CertStore 
 
 
 
 ├
[V] hcloud:Certificate 
 
 
 
 ├
[V] hcloud:Cgw 
 
 
 
 ├
[V] hcloud:CloudTrail  Cloud provider service to capture configuration change requests
 
 
 
 ├
[V] hcloud:CloudWatchRule  Rules to filter out the events to watch and monitor
 
 
 
 ├
[V] hcloud:ConfigRecorder  A config recorder captures configuration changes to a specified set of resources
 
 
 
 ├
[V] hcloud:Ctx 
 
 
 
 ├
[V] hcloud:EndpointData 
 
 
 
 ├
[V] hcloud:ExtEPSelectorData 
 
 
 
 ├
[V] hcloud:FilterEntryData 
 
 
 
 ├
[V] hcloud:GarbageCollector  GarbageCollector is deprecated
 
 
 
 ├
[V] hcloud:Igw 
 
 
 
 ├
[V] hcloud:InfraRes  This object contains the hierarcy of the infrastructure resources that the cloud provider offers. Examples are message queues, storage services etc
 
 
 
 ├
[V] hcloud:Listener 
 
 
 
 ├
[V] hcloud:ListenerRule 
 
 
 
 ├
[V] hcloud:MsgQ  Message queue services offered by the provider
 
 
 
 ├
[V] hcloud:Prov  MOs Cloud Provider
 
 
 
 ├
[V] hcloud:ProvAccount  Cloud Provider Account
 
 
 
 ├
[V] hcloud:ProvAcctGC  Provider Account resource policy for garbage collection
 
 
 
 ├
[V] hcloud:ProvMaxEpSecGrp  Provider resource policy to limit SG per Endpoint
 
 
 
 ├
[V] hcloud:Racl 
 
 
 
 ├
[V] hcloud:RaclRule 
 
 
 
 ├
[V] hcloud:Region 
 
 
 
 ├
[V] hcloud:ResourceMap  TODO: remove once stimulus.go is fixed
 
 
 
 ├
[V] hcloud:RouteTable 
 
 
 
 ├
[V] hcloud:RouteTableEntry 
 
 
 
 ├
[V] hcloud:RsRFltAttData 
 
 
 
 ├
[V] hcloud:ScaleSet 
 
 
 
 ├
[V] hcloud:StorageBucket  Cloud provider top level storage unit
 
 
 
 ├
[V] hcloud:Subnet 
 
 
 
 ├
[V] hcloud:TargetGroup 
 
 
 
 ├
[V] hcloud:ToEPgData 
 
 
 
 ├
[V] hcloud:Topic  Topic is the container for the notifications from various resources in the pub sub model
 
 
 
 ├
[V] hcloud:TopicRes 
 
 
 
 ├
[V] hcloud:Vgw 
 
 
 
 ├
[V] hinventory:AAInventory  Objects section
 
 
 
 
 ├
[V] hinventory:AInventory 
 
 
 
 
 
 ├
[V] hinventory:Account 
 
 
 
 
 
 ├
[V] hinventory:ApplicationSecurityGroup 
 
 
 
 
 
 ├
[V] hinventory:AvailZone 
 
 
 
 
 
 ├
[V] hinventory:ComputeInstance 
 
 
 
 
 
 ├
[V] hinventory:ComputeInstanceScaleSet 
 
 
 
 
 
 ├
[V] hinventory:Ctx 
 
 
 
 
 
 ├
[V] hinventory:CtxCidr 
 
 
 
 
 
 ├
[V] hinventory:CustomerGateway 
 
 
 
 
 
 ├
[V] hinventory:EgressRule 
 
 
 
 
 
 ├
[V] hinventory:IngressRule 
 
 
 
 
 
 ├
[V] hinventory:InternetGateway 
 
 
 
 
 
 ├
[V] hinventory:Inventory 
 
 
 
 
 
 ├
[V] hinventory:Listener 
 
 
 
 
 
 ├
[V] hinventory:LoadBalancer 
 
 
 
 
 
 ├
[V] hinventory:NetworkInterface 
 
 
 
 
 
 ├
[V] hinventory:PrivateIP 
 
 
 
 
 
 ├
[V] hinventory:Provider 
 
 
 
 
 
 ├
[V] hinventory:PublicIP 
 
 
 
 
 
 ├
[V] hinventory:Region 
 
 
 
 
 
 ├
[V] hinventory:ResourceGrp 
 
 
 
 
 
 ├
[V] hinventory:RouteTable 
 
 
 
 
 
 ├
[V] hinventory:RouteTableEntry 
 
 
 
 
 
 ├
[V] hinventory:SecurityGroup 
 
 
 
 
 
 ├
[V] hinventory:SqlDb 
 
 
 
 
 
 ├
[V] hinventory:SqlServer 
 
 
 
 
 
 ├
[V] hinventory:StorageAcct 
 
 
 
 
 
 ├
[V] hinventory:Subnet 
 
 
 
 
 
 ├
[V] hinventory:Tag 
 
 
 
 
 
 ├
[V] hinventory:TargetGroup 
 
 
 
 
 
 ├
[V] hinventory:VpnConnection 
 
 
 
 
 
 ├
[V] hinventory:VpnGateway 
 
 
 
 
 ├
[V] hinventory:StaleResource 
 
 
 ├
[V] hcloud:ASelector 
 
 
 
 ├
[V] hcloud:EPSelector 
 
 
 
 ├
[V] hcloud:ExtEPSelector 
 
 
 ├
[V] hcloud:AhcloudDev 
 
 
 
 ├
[V] hcloud:NativeLB 
 
 
 ├
[V] hcloud:AvailZone 
 
 
 ├
[V] hcloud:ConfigTaskDone  [README] Driver's faults must be registered in filter map in file "/bi/common/workflows/cloudopercleanup/opercleanup_res.go"
 
 
 ├
[V] hcloud:CsrReconfiguration 
 
 
 ├
[V] hcloud:CsrSummary 
 
 
 ├
[V] hcloud:EventTaskDone 
 
 
 ├
[V] hcloud:FailedOper 
 
 
 ├
[V] hcloud:FailedOperHolder  Placeholder for orphan operational MOs
 
 
 ├
[V] hcloud:Oper  Super class for every Oper MO
 
 
 
 ├
[V] hcloud:ASgRuleOper 
 
 
 
 
 ├
[V] hcloud:IpEgressRuleOper 
 
 
 
 
 ├
[V] hcloud:IpIngressRuleOper 
 
 
 
 
 ├
[V] hcloud:SgEgressRuleOper 
 
 
 
 
 ├
[V] hcloud:SgIngressRuleOper 
 
 
 
 ├
[V] hcloud:AccountOper 
 
 
 
 ├
[V] hcloud:AvailZoneOper 
 
 
 
 ├
[V] hcloud:AvailabilitySetOper 
 
 
 
 ├
[V] hcloud:AzureInventoryTaskError 
 
 
 
 ├
[V] hcloud:CertificateOper 
 
 
 
 ├
[V] hcloud:CgwOper 
 
 
 
 ├
[V] hcloud:CidrOper 
 
 
 
 ├
[V] hcloud:ConfigTaskError 
 
 
 
 ├
[V] hcloud:CsrSummaryOper 
 
 
 
 ├
[V] hcloud:CtError 
 
 
 
 ├
[V] hcloud:CtxOper 
 
 
 
 ├
[V] hcloud:CtxPeeringOper 
 
 
 
 ├
[V] hcloud:CweError 
 
 
 
 ├
[V] hcloud:DiskOper 
 
 
 
 ├
[V] hcloud:EndPointOper 
 
 
 
 ├
[V] hcloud:EvAlertDeployError 
 
 
 
 ├
[V] hcloud:EvAppDeployError 
 
 
 
 ├
[V] hcloud:EvNsDeployError 
 
 
 
 ├
[V] hcloud:EvRGDeployError 
 
 
 
 ├
[V] hcloud:EventTaskError 
 
 
 
 ├
[V] hcloud:FailedStatDiagOper 
 
 
 
 ├
[V] hcloud:FlowLogOper 
 
 
 
 ├
[V] hcloud:GarbageCollectorError 
 
 
 
 ├
[V] hcloud:GenericError 
 
 
 
 ├
[V] hcloud:IgwOper 
 
 
 
 ├
[V] hcloud:InstanceOper 
 
 
 
 ├
[V] hcloud:InventoryTaskError 
 
 
 
 ├
[V] hcloud:IpOper 
 
 
 
 ├
[V] hcloud:ListenerCertificateOper 
 
 
 
 ├
[V] hcloud:ListenerOper 
 
 
 
 ├
[V] hcloud:ListenerRuleOper 
 
 
 
 ├
[V] hcloud:ListenerRulePriorityOper 
 
 
 
 ├
[V] hcloud:LogGrpOper 
 
 
 
 ├
[V] hcloud:NativeLBOper 
 
 
 
 ├
[V] hcloud:RegionOper 
 
 
 
 ├
[V] hcloud:ResourceGroupOper 
 
 
 
 ├
[V] hcloud:RouteTableEntryOper 
 
 
 
 ├
[V] hcloud:RouteTableOper 
 
 
 
 ├
[V] hcloud:RsEpToSecurityGroupOper 
 
 
 
 ├
[V] hcloud:RsSubnetToRTOper 
 
 
 
 ├
[V] hcloud:RsVpnConnToCgwOper 
 
 
 
 ├
[V] hcloud:S3Error 
 
 
 
 ├
[V] hcloud:SGRuleGroupOper 
 
 
 
 ├
[V] hcloud:SecurityGroupOper 
 
 
 
 ├
[V] hcloud:SqsError 
 
 
 
 ├
[V] hcloud:SubnetOper 
 
 
 
 ├
[V] hcloud:TargetGroupOper 
 
 
 
 ├
[V] hcloud:TargetOper 
 
 
 
 ├
[V] hcloud:VgwOper 
 
 
 
 ├
[V] hcloud:ZoneMappingOper 
 
 
 ├
[V] hcloud:ProvRegion  Managed Cloud Provider Region
 
 
 ├
[V] hcloud:RuleCondition 
 
 
 ├
[V] hinventory:Done 
 
 ├
[V] iacl:Entry  ACL entry of the CoPP Prefilter
 
 ├
[V] infra:FexBlk A fex block.
 
 
 ├
[V] infra:ConnFexBlk A block used for grouping fex for connecting hosts (such as hypervisor).
 
 ├
[V] l3ext:CtxUpdater 
 
 ├
[V] l3ext:EncapRequestor  Represents an Out in a given Context requesting encap
 
 ├
[V] pol:ADependentOn 
 
 
 ├
[V] pol:DependentOn 
 
 
 ├
[V] pol:DependentOnClass 
 
 ├
[V] pol:Comp Represents a policy component. This object is part of the policy definition.
 
 
 ├
[V] callhome:ADest  Dest indentifies a single destination to which a callhome message is sent. Multipe destinations can be configured in a single callhome Group and a called message will be sent to all destinations that are part of that Group (depending on the severity level of the destinations and the message).
 
 
 
 ├
[V] callhome:Dest The Call Home destination profile contains the delivery information for receiving email-based alert notifications of critical system policies. A range of message formats are available for compatibility with pager services or XML-based automated parsing applications. You can use this feature to page a network support engineer, email a Network Operations Center, or use Cisco Smart Call Home services to generate a case with the Technical Assistance...
 
 
 
 ├
[V] callhome:SmartDest 
 
 
 ├
[V] callhome:DestReachState  CallHome Dest state Per Apic Node
 
 
 ├
[V] callhome:DestState 
 
 
 ├
[V] callhome:InvTask 
 
 
 ├
[V] cloud:ALoopbackIfP 
 
 
 
 ├
[V] cloud:LoopbackIfP 
 
 
 
 ├
[V] cloud:LoopbackIfPDef 
 
 
 ├
[V] comm:Comp default port value is 0. All services that have assigned port override port value. 0 indicates that this service does not use a separate port
 
 
 
 ├
[V] comm:Shell SuperClass for shell-based access (Ssh and Telnet) and not directly used for user configuration.
 
 
 
 
 ├
[V] comm:Shellinabox 
 
 
 
 
 ├
[V] comm:Ssh Object that encompasses properties related to Secure Shell access to the APIC, namely admin-state (default=enabled) and port(default=22).
 
 
 
 
 ├
[V] comm:SshInst 
 
 
 
 
 ├
[V] comm:Telnet Telnet
 
 
 
 
 ├
[V] comm:TelnetInst  Service configuration for various services
 
 
 
 ├
[V] comm:Web SuperClass for web based access (HTTP and HTTPS) and not directly used for user configuration.
 
 
 
 
 ├
[V] comm:Http HTTP
 
 
 
 
 ├
[V] comm:Https HTTPS
 
 
 ├
[V] comp:PrimaryEncapDef 
 
 
 ├
[V] compat:Filter Feature filter - software is not compatible when any of the filters evaluates to True
 
 
 
 ├
[V] compat:CompFilter Complex filter - logical grouping of Leaf terms
 
 
 
 ├
[V] compat:LfFilter Leaf term
 
 
 ├
[V] compat:Fw Firmware version
 
 
 
 ├
[V] compat:CtlrFw Controller Firmware
 
 
 
 ├
[V] compat:FexFw Fex Firmware
 
 
 
 ├
[V] compat:LcFw Line card Firmware
 
 
 
 ├
[V] compat:SwitchFw Switch Firmware
 
 
 
 ├
[V] compat:VSwitchFw VSwitch Firmware
 
 
 ├
[V] compat:Hw Hardware model
 
 
 
 ├
[V] compat:CtlrHw Controller hardware
 
 
 
 ├
[V] compat:FexHw Fex hardware
 
 
 
 ├
[V] compat:LcHw Line card hardware
 
 
 
 ├
[V] compat:SwitchHw Switch hardware
 
 
 ├
[V] compat:Sw 
 
 
 
 ├
[V] compat:FvSw 
 
 
 ├
[V] config:Job The configuration job.
 
 
 ├
[V] config:Snapshot 
 
 
 ├
[V] config:SubJob The sub job.
 
 
 ├
[V] cons:Node 
 
 
 ├
[V] cons:Root 
 
 
 ├
[V] cons:SubNode 
 
 
 ├
[V] coop:Rep The COOP repository. The user can only change the associated policy.
 
 
 ├
[V] datetime:ANtpAuthKey This object is a digital signature. The usual data packet plus the key is used to build a non-reversible number that is appended to the packet. The receiver (having the same key) does the same computation and compares the result. If the results match, authentication succeeds.
 
 
 
 ├
[V] datetime:NtpAuth The NTP client authentication configures the device to authenticate the time sources to which the local clock is synchronized. When you enable NTP authentication, the device synchronizes to a time source only if the source carries one of the authentication keys specified by the ntp trusted-key command. The device drops any packets that fail the authentication check and prevents them from updating the local clock. NTP authentication is disabled by...
 
 
 
 ├
[V] datetime:NtpAuthKey The date/time NTP authentication key is used to define a client authentication key if your NTP server requires authentication.
 
 
 ├
[V] datetime:ANtpIFFKey  NTP IFF Key
 
 
 
 ├
[V] datetime:NTPIffKey  NTP Secure Session IFF Key
 
 
 
 ├
[V] datetime:NtpIFFClientKey  NTP Secure Session Key
 
 
 ├
[V] datetime:ANtpProv These user-configured NTP provider names are listed as host names/IP addresses and can be between 1 and 64 alphanumeric characters. These names cannot be changed after the objects have been saved.
 
 
 
 ├
[V] datetime:NtpProv The date/time NTP provider is an NTP server.
 
 
 
 ├
[V] datetime:NtpProvider Represents the date/time NTP provider information for the switch.
 
 
 ├
[V] dbg:ACRulePCommon The atomic counter rule policy common.
 
 
 
 ├
[V] dbg:ACRuleIp The IP match rule policy for atomic counter probe.
 
 
 ├
[V] dbg:AtomicCntrP User-configured flows/match rules for atomic counter probes.
 
 
 ├
[V] dbg:DebugP The debug policy.
 
 
 ├
[V] dhcp:AInfraProvP Abstract class for infrastructure provider profiles.
 
 
 
 ├
[V] dhcp:InfraProvP The infrastructure provider policy.
 
 
 
 ├
[V] dhcp:InfraProvPDef The infrastructure provider definition.
 
 
 ├
[V] dhcp:GwDef 
 
 
 ├
[V] dnsepg:IpAddrBlk 
 
 
 ├
[V] fabric:ANodePEp A base class for node policy endpoint.
 
 
 
 ├
[V] bgp:RRNodePEp The MP-BGP Route Reflector End Point Policy is used to specify Route Reflector Nodes/Spines for the MP-BGP running inside the fabric.
 
 
 
 ├
[V] coop:NodePEp The COOP group member information.
 
 
 
 ├
[V] fabric:NodePEp The node policy endpoint. This is specified by a unique node ID.
 
 
 
 ├
[V] fabric:VpcConsumer 
 
 
 
 ├
[V] pres:RegdNode 
 
 
 
 ├
[V] pres:Resolver This is generated and used only by internal processes.
 
 
 
 ├
[V] pres:ResolverDef This is generated and used only by internal processes.
 
 
 ├
[V] fabric:AnycastMulticastSetupP 
 
 
 ├
[V] fabric:AssociatedSetupP 
 
 
 ├
[V] fabric:ChainCtxP A node proxy IP holder per protection type.
 
 
 ├
[V] fabric:CtrlrIdentP 
 
 
 ├
[V] fabric:Decommission An object for decommissioning a node.
 
 
 ├
[V] fabric:DecommissionJob An internal object for tracking decommission jobs.
 
 
 ├
[V] fabric:ExtRoutableNodeIp 
 
 
 ├
[V] fabric:ExtRoutablePodSubnet 
 
 
 ├
[V] fabric:ExtRoutablePodSubnetCont 
 
 
 ├
[V] fabric:ExtRoutablePool 
 
 
 ├
[V] fabric:ExtRoutableSubnet 
 
 
 ├
[V] fabric:ExtSetupP 
 
 
 ├
[V] fabric:MMUpgrader 
 
 
 ├
[V] fabric:NodeIdentP The node identity profile assigns IDs to the fabric nodes.
 
 
 ├
[V] fabric:PodDhcpServer 
 
 
 ├
[V] fabric:ProtLink The information about a protected link between two fabric nodes.
 
 
 ├
[V] fabric:ProtoComp A base class for protocol policies.
 
 
 
 ├
[V] dns:ADomain Sets the DNS domain parameters.
 
 
 
 
 ├
[V] dns:Dom The DNS domain uses a hierarchical scheme for establishing host names for network nodes and allows local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the hostname of the device into its associated IP address.
 
 
 
 
 ├
[V] dns:Domain The DNS domain uses a hierarchical scheme for establishing host names for network nodes and allows local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the hostname of the device into its associated IP address.
 
 
 
 ├
[V] fabric:L2ProtoComp A base class for layer 2 protocol policies.
 
 
 
 
 ├
[V] edr:EventP The per event recovery policy specifies from which error event a port is allowed to recover. The supported error events are bpdu guard, mcp loop, and ep move.
 
 
 
 
 ├
[V] stp:MstDomPol The MST domain policy enables you to assign two or more VLANs to a spanning tree instance. MST is not the default spanning tree mode; Rapid per VLAN Spanning Tree (Rapid PVST+) is the default mode. MST instances with the same name, revision number, and VLAN-to-instance mapping combine to form an MST region. The MST region appears as a single bridge to spanning tree configurations outside the region. MST fails over to IEEE 802.1D Spanning Tree Pro...
 
 
 
 
 ├
[V] stp:MstRegionPol The MST region policy enables switches to participate in MST instances when you consistently configure the switches with the same MST configuration information. A collection of interconnected switches that have the same MST configuration is an MST region. An MST region is a linked group of MST bridges with the same MST configuration.
 
 
 
 ├
[V] fabric:L3ProtoComp A base class for layer 3 protocol policies.
 
 
 
 
 ├
[V] bfd:AIfP 
 
 
 
 
 
 ├
[V] bfd:AIfDef 
 
 
 
 
 
 
 ├
[V] bfd:IfDef 
 
 
 
 
 
 ├
[V] bfd:IfP 
 
 
 
 
 ├
[V] bgp:AAsP The profile of an autonomous system (AS) is a set of routers under a single technical administration, using an interior gateway protocol (IGP) and common metrics to determine how to route packets within the AS, and using an inter-AS routing protocol to determine how to route packets to other autonomous systems.
 
 
 
 
 
 ├
[V] bgp:AsDef An internal object for the BGP autonomous system profile definition.
 
 
 
 
 
 ├
[V] bgp:AsP The BGP autonomous system profile information.
 
 
 
 
 ├
[V] bgp:AExtP The profile of an external BGP neighbor.
 
 
 
 
 
 ├
[V] bgp:ExtDef An internal object for the BGP external profile definition.
 
 
 
 
 
 ├
[V] bgp:ExtP When created, this profile indicates that IBGP will be configured for the endpoint groups in this external network.
 
 
 
 
 ├
[V] bgp:ALocalAsnP An abstraction of a local autonomous system (AS) information profile.
 
 
 
 
 
 ├
[V] bgp:LocalAsnDef The local autonomous system number (ASN) definition.
 
 
 
 
 
 ├
[V] bgp:LocalAsnP The local autonomous system information pertaining to a peer.
 
 
 
 
 ├
[V] bgp:APeerP The profile for connecting with a BGP peer.
 
 
 
 
 
 ├
[V] bgp:APeerDef  Peer connectivity definition
 
 
 
 
 
 
 ├
[V] bgp:InfraPeerDef  Infra Peer connectivity definition
 
 
 
 
 
 
 ├
[V] bgp:PeerDef An internal object for the BGP peer connectivity definition.
 
 
 
 
 
 ├
[V] bgp:InfraPeerP  Peer connectivity profile
 
 
 
 
 
 ├
[V] bgp:PeerP The BGP peer connectivity profile contains the peer IP address and defines the peer connectivity control settings. These values are for BGP routers, which can only exchange routing information when they establish a peer connection between them.
 
 
 
 
 ├
[V] bgp:ARRP  Abstract Route Reflector Profile
 
 
 
 
 
 ├
[V] bgp:ExtIntersiteRRP  External Intersite Route Reflector Profile
 
 
 
 
 
 ├
[V] bgp:ExtRRP  External Route Reflector Profile
 
 
 
 
 
 ├
[V] bgp:RRP The BGP route reflector profile information.
 
 
 
 
 ├
[V] bgp:RtCtrlDef 
 
 
 
 
 ├
[V] bgp:RtCtrlPolDef 
 
 
 
 
 ├
[V] cloud:ABgpAsP 
 
 
 
 
 
 ├
[V] cloud:BgpAsDef  Autonomous System Profile
 
 
 
 
 
 ├
[V] cloud:BgpAsP  Autonomous System Profile
 
 
 
 
 ├
[V] eigrp:AExtP The abstraction of an EIGRP external profile.
 
 
 
 
 
 ├
[V] eigrp:ExtDef An EIGRP external profile definition.
 
 
 
 
 
 ├
[V] eigrp:ExtP The EIGRP external profile information.
 
 
 
 
 ├
[V] eigrp:AIfP The abstraction of an interface profile.
 
 
 
 
 
 ├
[V] eigrp:IfDef The EIGRP interface definition.
 
 
 
 
 
 ├
[V] eigrp:IfP The EIGRP interface profile, which enables EIGRP on the interface. Optionally, the EIGRP interface profile can have a relation to an EIGRP interface policy for more granular control over interface proprieties.
 
 
 
 
 ├
[V] hsrp:AGroupP  Hsrp Group Profile
 
 
 
 
 
 ├
[V] hsrp:AGroupDef 
 
 
 
 
 
 
 ├
[V] hsrp:GroupDef 
 
 
 
 
 
 ├
[V] hsrp:GroupP  Hsrp Group Profile
 
 
 
 
 ├
[V] hsrp:AIfP 
 
 
 
 
 
 ├
[V] hsrp:AIfDef 
 
 
 
 
 
 
 ├
[V] hsrp:IfDef 
 
 
 
 
 
 ├
[V] hsrp:IfP 
 
 
 
 
 ├
[V] hsrp:ASecVip  Abstract Secondary Address Policy
 
 
 
 
 
 ├
[V] hsrp:SecVip  Secondary Address Policy
 
 
 
 
 
 ├
[V] hsrp:SecVipDef 
 
 
 
 
 ├
[V] isis:LvlComp Per-level IS-IS vrf information.
 
 
 
 
 ├
[V] l3ext:AIp The abstraction of a secondary IP address.
 
 
 
 
 
 ├
[V] l3ext:ForwarderAddr  Forwarding IP Address Policy
 
 
 
 
 
 ├
[V] l3ext:ForwarderAddrDef  Definition of forwarding IP Address Policy
 
 
 
 
 
 ├
[V] l3ext:Ip A secondary IP address policy.
 
 
 
 
 
 ├
[V] l3ext:IpDef The definition of a secondary IP address policy.
 
 
 
 
 ├
[V] mgmt:AIp  Secondary interface connection parameters
 
 
 
 
 
 ├
[V] mgmt:Ip  Secondary interface connection parameters
 
 
 
 
 
 ├
[V] mgmt:IpDef  Secondary interface connection parameters definition
 
 
 
 
 ├
[V] ospf:AExtP An abstraction of the OSPF external profile.
 
 
 
 
 
 ├
[V] ospf:ExtDef The external definition profile.
 
 
 
 
 
 ├
[V] ospf:ExtP The OSPF external profile information.
 
 
 
 
 ├
[V] ospf:AIfP An abstraction of the OSPF interface profile information.
 
 
 
 
 
 ├
[V] ospf:IfDef The OSPF interface definition model.
 
 
 
 
 
 ├
[V] ospf:IfP The OSPF interface profile enables OSPF on the interface. Optionally, the OSPF interface profile can have a relation to an OSPF interface policy for more granular control over interface proprieties.
 
 
 
 
 ├
[V] pim:AIfP 
 
 
 
 
 
 ├
[V] pim:IPV6IfP 
 
 
 
 
 
 ├
[V] pim:IfP PIM interface policy.
 
 
 
 
 ├
[V] rtctrl:AAttrP The abstraction for a Set Action Rule Profile.
 
 
 
 
 
 ├
[V] rtctrl:AttrDef An attribute definition.
 
 
 
 
 
 ├
[V] rtctrl:AttrP The action rule profile, which specifies actions for events that meet a configured action rule.
 
 
 
 
 ├
[V] rtctrl:AMatchRule The abstraction for all match rules.
 
 
 
 
 
 ├
[V] rtctrl:AMatchCommFactor  Abstraction of Match Community Factor
 
 
 
 
 
 
 ├
[V] rtctrl:MatchCommFactor  Match Community Factor
 
 
 
 
 
 
 ├
[V] rtctrl:MatchCommFactorDef  Match Community Factor Definition
 
 
 
 
 
 ├
[V] rtctrl:AMatchCommRegexTerm  Abstraction Match Rule Based on Community Regular Expression
 
 
 
 
 
 
 ├
[V] rtctrl:MatchCommRegexTerm  Match Rule Based Route Regular Expression Community
 
 
 
 
 
 
 ├
[V] rtctrl:MatchCommRegexTermDef  Match Rule Based Route Regular Expression Community Definition
 
 
 
 
 
 ├
[V] rtctrl:AMatchCommTerm  Abstraction of Match Community Term
 
 
 
 
 
 
 ├
[V] rtctrl:MatchCommTerm  Match Community Term
 
 
 
 
 
 
 ├
[V] rtctrl:MatchCommTermDef  Match Community Term Definition
 
 
 
 
 
 ├
[V] rtctrl:AMatchIpRule The abstraction for all IP address based on match rules.
 
 
 
 
 
 
 ├
[V] ip:ARouteP An abstraction of route definitions.
 
 
 
 
 
 
 
 ├
[V] ip:RouteDef The route definitions, which are are used for pushing subnets and static routes to PE. They also push subnets under EpPD to VMMMGR (for configuring external networks in vCD).
 
 
 
 
 
 
 
 ├
[V] ip:RouteP Configure the IP address and next hop IP address for the routed outside network.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtDest The match action rule based on the route destination.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtDestDef The match route destination definition.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtNh Match Rule based Route Next Hope
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtNhDef The match route next hop definition.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtSrc The match rule based on a route source.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtSrcDef The match route source definition.
 
 
 
 
 
 ├
[V] rtctrl:AMatchRtType The abstraction of a match rule based on the route type.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtType The match rule based on a route type.
 
 
 
 
 
 
 ├
[V] rtctrl:MatchRtTypeDef The match route type definition.
 
 
 
 
 ├
[V] rtctrl:ASetASPathASN  Abstraction of AS Path ASN
 
 
 
 
 
 ├
[V] rtctrl:SetASPathASN  AS Path ASN
 
 
 
 
 
 ├
[V] rtctrl:SetASPathASNDef 
 
 
 
 
 ├
[V] rtctrl:ASetRule The abstraction for all set action rules.
 
 
 
 
 
 ├
[V] rtctrl:ASetASPath  Abstraction of Set Action Rule based on AS Path
 
 
 
 
 
 
 ├
[V] rtctrl:SetASPath  Set rule based on AS Path
 
 
 
 
 
 
 ├
[V] rtctrl:SetASPathDef 
 
 
 
 
 
 ├
[V] rtctrl:ASetComm The abstraction of a set action rule based on communities.
 
 
 
 
 
 
 ├
[V] rtctrl:SetAddComm 
 
 
 
 
 
 
 ├
[V] rtctrl:SetAddCommDef 
 
 
 
 
 
 
 ├
[V] rtctrl:SetComm The set action rule based on communities.
 
 
 
 
 
 
 ├
[V] rtctrl:SetCommDef The set community definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetDamp  Set rule for dampening policy
 
 
 
 
 
 
 ├
[V] rtctrl:SetDamp  Set rule based on dampening
 
 
 
 
 
 
 ├
[V] rtctrl:SetDampDef 
 
 
 
 
 
 ├
[V] rtctrl:ASetNh Sets the action rule based on a next hop address.
 
 
 
 
 
 
 ├
[V] rtctrl:SetNh Sets action rule based on the next hop address.
 
 
 
 
 
 
 ├
[V] rtctrl:SetNhDef The set next hop definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetOspfFwdAddr The abstraction of set action rule based on the OSPF forwarding address.
 
 
 
 
 
 
 ├
[V] rtctrl:SetOspfFwdAddr The set rule based on the OSPF forwarding address.
 
 
 
 
 
 
 ├
[V] rtctrl:SetOspfFwdAddrDef The set OSPF forward address definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetOspfNssa The abstraction of a set action rule based on OSPF-NSSA.
 
 
 
 
 
 
 ├
[V] rtctrl:SetOspfNssa The set rule based on the OSPF-NSSA.
 
 
 
 
 
 
 ├
[V] rtctrl:SetOspfNssaDef The set OSPF-NSSA definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetPref Sets the action rule based on preference.
 
 
 
 
 
 
 ├
[V] rtctrl:SetPref The set action rule based on preference.
 
 
 
 
 
 
 ├
[V] rtctrl:SetPrefDef The set preference definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetRtMetric Sets action rule based on a metric value.
 
 
 
 
 
 
 ├
[V] rtctrl:SetRtMetric The set action rule based on metric.
 
 
 
 
 
 
 ├
[V] rtctrl:SetRtMetricDef The set route metric definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetRtMetricType Sets the action rule based on the metric type.
 
 
 
 
 
 
 ├
[V] rtctrl:SetRtMetricType The set action rule based on a metric type.
 
 
 
 
 
 
 ├
[V] rtctrl:SetRtMetricTypeDef The definition for a set action rule based on a metric type.
 
 
 
 
 
 ├
[V] rtctrl:ASetTag The abstraction of a set action rule based on the route tag.
 
 
 
 
 
 
 ├
[V] rtctrl:SetTag The set action rule based on route tag.
 
 
 
 
 
 
 ├
[V] rtctrl:SetTagDef The set tag definition.
 
 
 
 
 
 ├
[V] rtctrl:ASetWeight  Set rule for route weight
 
 
 
 
 
 
 ├
[V] rtctrl:SetWeight  Set rule based on dampening
 
 
 
 
 
 
 ├
[V] rtctrl:SetWeightDef 
 
 
 
 
 ├
[V] rtctrl:ASubnet The abstraction of the external subnet.
 
 
 
 
 
 ├
[V] cloud:ASubnet 
 
 
 
 
 
 
 ├
[V] cloud:CIfDef 
 
 
 
 
 
 
 ├
[V] cloud:Subnet 
 
 
 
 
 
 
 ├
[V] cloud:SubnetDef 
 
 
 
 
 
 ├
[V] extnw:AInstPSubnet An abstraction of the instance profile subnet.
 
 
 
 
 
 
 ├
[V] l2ext:AInstPSubnet An abstraction of an external network instance.
 
 
 
 
 
 
 ├
[V] l3ext:AInstPSubnet An abstract logical node profile. This defines the characteristics to be applied to resources that match with the profile name.
 
 
 
 
 
 
 
 ├
[V] l3ext:Exception The exception from the external subnet.
 
 
 
 
 
 
 
 ├
[V] l3ext:Subnet The network visibility of the domain.
 
 
 
 
 
 
 
 ├
[V] l3ext:SubnetDef An internal object that represents subnets defined under an L3 outside.
 
 
 
 
 
 ├
[V] fv:BDSubnet 
 
 
 
 
 
 ├
[V] fv:ImplSubnet An implied subnet.
 
 
 
 
 
 ├
[V] fv:Subnet A subnet defines the IP address range that can be used within the bridge domain. While a context defines a unique layer 3 space, that space can consist of multiple subnets. These subnets are defined per bridge domain. A bridge domain can contain multiple subnets, but a subnet is contained within a single bridge domain.
 
 
 
 
 
 ├
[V] mgmt:AInstPSubnet The abstract instance profile subnet.
 
 
 
 
 
 
 ├
[V] mgmt:Subnet The external subnet to be imported. The bridge domain context defines a unique IP address space, which can consist of multiple subnets. Those subnets are defined in one or more bridge domains that reference the corresponding context.
 
 
 
 
 
 
 ├
[V] mgmt:SubnetDef The subnet definition.
 
 
 
 
 
 ├
[V] nd:RaSubnet Neighbor Discovery (ND) uses ICMPv6 messages known as Router advertisement (RA) messages, which have a value of 134 in the Type field of the ICMP packet header, are periodically sent out each configured interface of an IPv6 device. For stateless autoconfiguration to work properly, the advertised prefix length in RA messages must always be 64 bits.
 
 
 
 
 
 ├
[V] nd:RaSubnetDef An external subnet.
 
 
 
 
 
 ├
[V] orchs:TnSvcsSubnet  Represents Services Subnet for a VRF
 
 
 
 
 ├
[V] rtdmc:AExtP 
 
 
 
 
 
 ├
[V] pim:ExtDef OSPF external profile definition.
 
 
 
 
 
 ├
[V] pim:ExtP OSPF external profile.
 
 
 ├
[V] fabric:SetupAllocP 
 
 
 ├
[V] fabric:SetupP 
 
 
 ├
[V] fabric:VmmDecommissionJob 
 
 
 ├
[V] file:ARemoteHost Remote host with reachability information
 
 
 
 ├
[V] callhome:SmtpServer The hostname or IP for export destination. Call Home sends email messages to either the IP address or hostname, and the associated port number.
 
 
 
 ├
[V] file:ARemotePath Remote location for data import or export.
 
 
 
 
 ├
[V] file:RemotePath The remote destination path parameters for the data export.
 
 
 
 
 ├
[V] stats:DestP The export policy. The export policy enables you to output statistics collection policy reports in an XML or JSON format. The reports are exported at a specified frequency and to a chosen export destination. Specifying the export destination can require selecting the protocol used when communicating with a remote server and entering a hostname/IP address, a remote path, the username and password the system should use to log in to the remote s...
 
 
 
 ├
[V] snmp:TrapDest A destination to which traps and informs are sent.
 
 
 
 ├
[V] syslog:RemoteDest The syslog remote destination host enables you to specify syslog servers to which messages from the APIC and fabric nodes should be forwarded.
 
 
 
 ├
[V] tacacs:TacacsDest  A destination to send audit logs
 
 
 ├
[V] firmware:Source The firmware source specifications including CCO, and any server (SCP, HTTP, FTP) in which Curl can extract files.
 
 
 
 ├
[V] firmware:CcoSource Cisco.com is the source of images.
 
 
 
 ├
[V] firmware:InternalSource The internal source of firmware images, which contains images that are pre-packaged into the controller.
 
 
 
 ├
[V] firmware:OSource An outside source of images, such as an HTTP or SCP server.
 
 
 
 ├
[V] vns:SvcPkgSource The services device package installer support for the CLI.
 
 
 
 ├
[V] vns:VmmConfigFile 
 
 
 ├
[V] fmcast:NodePEp The root of the multicast tree. Note that only the spine can be the root.
 
 
 ├
[V] fmcast:NumTree The number of multicast trees rooted on the node. For example, the number of multicast tree objects contained by the multicast tree root object .
 
 
 ├
[V] fmcast:TreeEp The multicast tree. This is an internal object that contains the tree number and is used for propagating tree information between the APIC and the nodes.
 
 
 ├
[V] fv:AEpAnycast  Abstract class for EpAnycast
 
 
 
 ├
[V] fv:EpAnycast 
 
 
 
 ├
[V] fv:ImplEpAnycast  represents the Implicit counterpart for fv:EpAnycast. This is not externally configurable and used internally during graph rendering for matching connectors to BD
 
 
 
 ├
[V] ip:EpAnycastDef 
 
 
 ├
[V] fv:AEpNlb  Abstract class for NLB MO
 
 
 
 ├
[V] fv:EpNlb 
 
 
 
 ├
[V] ip:EpNlbDef 
 
 
 ├
[V] fv:AExtRoutableRemoteSitePodSubnet  Abstract class for Remote site's External Routable TEP Pool Definition.
 
 
 
 ├
[V] fv:ExtRoutableRemoteSitePodSubnet  Remote site's External Routable TEP Pool Definition.
 
 
 
 ├
[V] fv:ExtRoutableRemoteSitePodSubnetDef  Remote site's External Routable TEP Pool Definition.
 
 
 ├
[V] fv:AExtRoutes  Used to indicate if Local site can export/import external routes for this VRF from another site
 
 
 
 ├
[V] fv:ExportExtRoutes  Used to indicate if Local site can export external routes for this VRF from another site
 
 
 
 ├
[V] fv:ImportExtRoutes  Used to indicate if Local site can import external routes for this VRF from another site
 
 
 ├
[V] fv:AIfConn 
 
 
 
 ├
[V] fv:FcIfConn  Represents the FC If connectivity parametres
 
 
 
 ├
[V] fv:IfConn Connectivity parameters for an interface.
 
 
 ├
[V] fv:APodConnP  Abstract POD Connectivity Profile
 
 
 
 ├
[V] fv:PodConnP  POD Connectivity Profile
 
 
 
 ├
[V] fv:PodConnPDef  POD Connectivity Profile Definition
 
 
 ├
[V] fv:AREpPDomDefDependencyResolver 
 
 
 ├
[V] fv:ASiteConnP  Abstract class for Multisite Connectivity Information
 
 
 
 ├
[V] fv:SiteConnP  Container for Local Multisite Connectivity Information for MultiSite deployments
 
 
 
 ├
[V] fv:SiteConnPDef  Container for Local Multisite Connectivity Information for MultiSite deployments
 
 
 ├
[V] fv:CepNetCfgPol  Represents Client End Point network configuration policy, Used this information for Microsoft SCVMM/Azure application to create SCVMM static IP pool
 
 
 ├
[V] fv:Comp An abstraction of the fabric virtualization policy definition.
 
 
 
 ├
[V] fv:ATg Base class for the Attachable Target Group
 
 
 
 
 ├
[V] fv:CCg A special endpoint group representing a set of connectivity rules to a compute container or hypervisor.
 
 
 
 
 ├
[V] fv:EPg A set of endpoints.
 
 
 
 
 
 ├
[V] cloud:ABaseEPg  Abstract Base Cloud EPg for both Explicit and Implicit cloud EPG's.
 
 
 
 
 
 
 ├
[V] cloud:AAEPg  Abstract Cloud EPg. Named AAEPg in order to avoid confusing this with Application EPg
 
 
 
 
 
 
 
 ├
[V] cloud:EPg  Cloud EPg
 
 
 
 
 
 
 
 ├
[V] cloud:ExtEPg  Cloud External EPg
 
 
 
 
 
 
 ├
[V] cloud:ASvcEPg  Abstract Cloud Service EPg.
 
 
 
 
 
 
 
 ├
[V] cloud:ISvcEPg  Cloud service EPg
 
 
 
 
 
 ├
[V] extnw:EPg An abstraction of a policy controlling connectivity to an external network such as another fabric or WAN.
 
 
 
 
 
 
 ├
[V] l2ext:InstP The external network instance profile represents a group of external subnets that have the same security behavior. These subnets inherit contract profiles applied to the parent instance profile. Each subnet can also associate to route control profiles, which defines the routing behavior for that subnet.
 
 
 
 
 
 
 ├
[V] l3ext:InstP The external network instance profile represents a group of external subnets that have the same security behavior. These subnets inherit contract profiles applied to the parent instance profile. Each subnet can also associate to route control profiles, which defines the routing behavior for that subnet.
 
 
 
 
 
 
 ├
[V] l3ext:InstPDef The L4-L7 services route peering.
 
 
 
 
 
 ├
[V] fv:CEPg A set of hypothetical client endpoints attaching to the network.
 
 
 
 
 
 
 ├
[V] fv:AEPg A set of requirements for the application-level EPG instance. The policy regulates connectivity and visibility among the end points within the scope of the policy.
 
 
 
 
 
 
 ├
[V] fv:TnlEPg  qinq End Point Group
 
 
 
 
 
 
 ├
[V] vns:AEPpInfo 
 
 
 
 
 
 
 
 ├
[V] vns:EPpInfo Internal object to store encap info (vlan ID) for an endpoint.
 
 
 
 
 
 
 
 ├
[V] vns:REPpInfo 
 
 
 
 
 
 
 
 ├
[V] vns:SDEPpInfo 
 
 
 
 
 
 
 
 ├
[V] vns:SHEPpInfo 
 
 
 
 
 
 ├
[V] infra:EPg Abstraction of an infrastructure endpoint group.
 
 
 
 
 
 
 ├
[V] infra:ACEPg An abstraction of the infrastructure client endpoint group. The client endpoint group represents a set of hypothetical client endpoints attaching to the network.
 
 
 
 
 
 
 
 ├
[V] dhcp:CRelPg A group of DHCP relay function providers: A set of DHCP Server to which client DHCP requests are relayed.
 
 
 
 
 
 
 
 ├
[V] infra:CEPg A base class for the client endpoint group.
 
 
 
 
 
 
 ├
[V] infra:APEPg An abstraction of the infrastructure provider endpoint group. The provider endpoint group represents a set of hypothetical provider endpoints attaching to the network; for example, a set of DHCP servers, fabric relays, or client requests.
 
 
 
 
 
 
 
 ├
[V] dhcp:PRelPg A group of DHCP Relay Function Providers: A set of DHCP Servers to which client DHCP Requests are relayed.
 
 
 
 
 
 
 
 ├
[V] infra:PEPg Ignore, removed
 
 
 
 
 
 ├
[V] mgmt:InB The in-band management endpoint group consists of switches (leaves/spines) and APICs. Each node in the group is assigned an IP address that is dynamically allocated from the address pool associated with the corresponding in-band management zone. The allocated IP address is then configured as the in-band management access IP address on the corresponding node. Any host that is part of another endpoint group can communicate with the nodes in the...
 
 
 
 
 ├
[V] mgmt:InstP The external management entity instance profile communicates with nodes that are part of out-of-band management endpoint group. To enable this communication, a contract is required between the instance profile and the out-of-band management endpoint group.
 
 
 
 
 ├
[V] mgmt:InstPDef The instance profile definition.
 
 
 
 
 ├
[V] mgmt:OoB An out-of-band management endpoint group, which consists of switches (leaves/spines) and APICs that are part of the associated out-of-band management zone. Each node in the group is assigned an IP address that is dynamically allocated from the address pool associated with the corresponding out-of-band management zone. The allocated IP address is then configured on the out-of-band management port of the corresponding node. Hosts that are par...
 
 
 
 ├
[V] vz:Any vzAny associates all endpoint groups (EPGs) in a context (fvCtx) to one or more contracts (vzBrCP), rather than creating a separate contract relation for each EPG. EPGs can only communicate with other EPGs according to contract rules. A relationship between an EPG and a contract specifies whether the EPG provides the communications defined by the contract rules, consumes them, or both. By dynamically applying contract rules to all EPGs in a conte...
 
 
 ├
[V] fv:DataPoolDef 
 
 
 ├
[V] fv:Encap The encapsulation associated with the functions.
 
 
 ├
[V] fv:EncapDef An internal encapsulation definition. This is an internal object used for deployment of encapsulation.
 
 
 ├
[V] fv:EpPCtrctInfo 
 
 
 ├
[V] fv:ExtLocaleCont A container for the extended fabric node information shared across all nodes.
 
 
 ├
[V] fv:ExtPodSubnetDef  PODs Ext TEP Pool Definition. The ext tep pool is associated with a virtual pod (vPOD)
 
 
 ├
[V] fv:ExtPoolDef  POD Specific External Ip Pool Definition
 
 
 ├
[V] fv:ExtTepPoolDef  PODs Ext TEP Pool Definition
 
 
 ├
[V] fv:FreePoolDef 
 
 
 ├
[V] fv:L3extOutLblDepl  Container for Logical Outside Profile Deployment
 
 
 ├
[V] fv:MgmtPoolDef 
 
 
 ├
[V] fv:NlbStaticGroup 
 
 
 ├
[V] fv:PoolDef  POD Specific Ip Pool Definition
 
 
 ├
[V] fv:PrimaryEncapDef 
 
 
 ├
[V] fv:PullREpPCont 
 
 
 ├
[V] fv:QinqFabEncapDef 
 
 
 ├
[V] fv:REpPCont Container for a remote endpoint profile.
 
 
 ├
[V] fv:SvcMacEp 
 
 
 ├
[V] fv:SystemGIPoDef  System GIPo - one value across the whole fabric. Its used when sending multicast traffic across PODs. @@@ It is same as Infra BDs GIPo. It should work according to switch team @@@ Its sharded by the tenant infra's dn.
 
 
 ├
[V] fv:TepPoolDef  PODs TEP Pool Definition
 
 
 ├
[V] fv:VsanEncapDef 
 
 
 ├
[V] fvns:AAddrBlk The abstraction of the IP address block.
 
 
 
 ├
[V] fvns:McastAddrBlk The multicast address block policy defines the multicast IP address ranges. These addresses can be used for various purposes, such as VxLAN encapsulation.
 
 
 
 ├
[V] fvns:McastAddrBlkDef The multicast address block definition.
 
 
 
 ├
[V] fvns:UcastAddrBlk Defines the first and last unicast IP addresses in the namespace block.
 
 
 ├
[V] fvns:AEncapBlk The abstraction of the encapsulation block.
 
 
 
 ├
[V] fvns:EncapBlk The VLAN encapsulation block.
 
 
 
 ├
[V] fvns:EncapBlkDef The encapsulation block definition.
 
 
 
 ├
[V] fvns:VsanEncapBlk 
 
 
 
 ├
[V] topoctrl:EncapBlk The encap blocks.
 
 
 
 ├
[V] vns:EncapBlkDef 
 
 
 ├
[V] geo:Building The building identifier where the node is located.
 
 
 ├
[V] geo:Floor The floor number of the building where the node is located.
 
 
 ├
[V] geo:Rack The rack identifier where the node is located.
 
 
 ├
[V] geo:Room The room name or number where the node is located.
 
 
 ├
[V] geo:Row The row name where the node is located.
 
 
 ├
[V] health:LevelP Represents the health score level policy.
 
 
 ├
[V] health:Pol Defines how much influence a child's health score has on its parent's health score.
 
 
 ├
[V] health:PolCont The health score policies container.
 
 
 ├
[V] hvs:Encap Contains the encap and multicast address of the ExtPol. If this child encap exists, the ExtPol uses this encap or the encap properties of the ExtPol.
 
 
 ├
[V] ident:AllocRule The identity allocation rule.
 
 
 ├
[V] ident:Block The base class for the ID block subclasses must have the From and To properties defined.
 
 
 
 ├
[V] ident:Block16 The identity block 16.
 
 
 
 ├
[V] ident:Block32 The identity block 32.
 
 
 
 ├
[V] ident:Block64 The identity block 64.
 
 
 
 ├
[V] ident:BlockIp The identity block Ip.
 
 
 ├
[V] igmp:AIfP 
 
 
 
 ├
[V] igmp:IfP 
 
 
 ├
[V] igmp:ASnoopAccessGroup  IGMP Snoop Access Group, defines a filter for the IGMP joins that can be accepted on a given port/encap or fvAEPg. This enable to perform a selective admission control on certain interfaces
 
 
 
 ├
[V] igmp:SnoopAccessGroup  Representation of an IGMP snooping filter
 
 
 
 ├
[V] igmp:SnoopAccessGroupDef  In case the filter will take place at the fvAEPg level For future releases Internal Representation of an IGMP snooping filter
 
 
 ├
[V] igmp:ASnoopStaticGroup  IGMP Snoop Static Group, it's used to allow a tenant admin to statically join a multicast stream on some port,encap or fvAEPG
 
 
 
 ├
[V] igmp:SnoopStaticGroup  Representation of an IGMP snooping static (*,G) or (S,G) membership
 
 
 
 ├
[V] igmp:SnoopStaticGroupDef  In case the static group membership is at the fvAEPg level For future releases Internal representation of the group memebership
 
 
 ├
[V] infra:AFunc The abstraction of a function or functions provided by the port selector.
 
 
 
 ├
[V] infra:Boot The hypervisor boot function provides the policies used for booting hypervisors. For example, the VLAN and endpoint group policies used during hypervisor bootup.
 
 
 
 ├
[V] infra:Generic The hypervisor generic function provides policies used for any generic hypervisor functionality. This can be used when any other pre-defined functions are not sufficient. The VLAN and endpoint group policies associated with this function are deployed on the leaf ports.
 
 
 
 ├
[V] infra:Image The port characteristics required for accessing storage. Note that this is only used for L2 storage.
 
 
 
 ├
[V] infra:Mgmt The Vcenter management connectivity. The Vcenter management encap is a regular VLAN.
 
 
 
 ├
[V] infra:PreProv 
 
 
 
 ├
[V] infra:ProvAcc The provider access function is defined when the hypervisor is using an encapsulation protocol, such as VxLAN/NVGRE, and provides the policies to impacting VxLAN/NvGRE packets from NVGRE. You do not need to provide the encapsulation VLAN and endpoint for the provider access function. The system uses the Infra VLAN (provided during APIC bootup) as the encapsulation and associates it to the default endpoint group under the default tenant.
 
 
 
 ├
[V] infra:Storage The hypervisor storage function provides the policies used for hypervisors and virtual machines to access the storage network. For example, the VLAN and endpoint group policies.
 
 
 ├
[V] infra:ANode A node is a base class representing the node where the endpoint group will be deployed.
 
 
 
 ├
[V] fv:ANode  Abstract Node Definition @@@ Class for passing some internal node specific information between PM & PE
 
 
 
 
 ├
[V] fv:ExtNodeDef  ExtNodeDef represents a node that is external to the pod, like a remote leaf node.
 
 
 
 
 ├
[V] fv:NodeDef  Node Definition @@@ Class for passing some internal node specific information between PM & PE
 
 
 
 ├
[V] infra:Node The node where the endpoint group will be deployed.
 
 
 
 ├
[V] infra:NodeDef A node definition.
 
 
 
 ├
[V] mgmt:ANodeDef 
 
 
 
 
 ├
[V] mgmt:NodeDef The node definition.
 
 
 
 
 ├
[V] mgmt:StNodeDef 
 
 
 
 ├
[V] mgmt:EffNodeDef 
 
 
 ├
[V] infra:AttPolicyGroup The attachable policy group acts as an override of the policies given at the AccBaseGrp for the ports associated with the Attachable Entity Profile.
 
 
 ├
[V] infra:Encap The encaps associated with the functions.
 
 
 ├
[V] infra:EncapDef The encapsulation information. This object is generated and used only by internal processes.
 
 
 ├
[V] infrazone:Zone  Infrastructure Zone: Represents a policy deployment zone in the fabric. A zone consists of member nodes
 
 
 ├
[V] ip:ANexthopEpP  Abstratcion of Route definitions
 
 
 
 ├
[V] ip:NexthopEpP 
 
 
 
 ├
[V] ip:NexthopEpPDef 
 
 
 ├
[V] ip:ANexthopP An abstraction of route definitions.
 
 
 
 ├
[V] ip:NexthopDef The Nexthops for the static route.
 
 
 
 ├
[V] ip:NexthopP The Nexthop policy for the static route.
 
 
 ├
[V] ip:NlbStaticGroupDef 
 
 
 ├
[V] ipmc:ASSMXlateP  Abstraction of SSM Translate
 
 
 
 ├
[V] igmp:SSMXlateDef  Context-level SSM Translate Definition
 
 
 
 ├
[V] igmp:SSMXlateP  Context-level SSM Translate Policy
 
 
 ├
[V] l2:Cons Used for reference counting the consumers corresponding to the RsPathDomAtt relation. Requirement from switch team: If an circuit is associated to port-x, then the BD should also get associated with the same port. This managed object is used for reference counting the circuit endpoints that need the BD-to-port association.
 
 
 ├
[V] l3:Cons  Represents a consumer of a resource.
 
 
 ├
[V] l3ext:AExtEncapAllocator An internal object for managing encap allocation for an external SVI.
 
 
 
 ├
[V] l3ext:CtxExtEncapAllocator  COntext External Encap Id Allocator
 
 
 
 ├
[V] l3ext:ExtEncapAllocator The external encap ID allocator.
 
 
 
 ├
[V] l3ext:ExtEncapDef The external encap definition.
 
 
 ├
[V] l3ext:AMember The member. The member is used for providing per node IP address configuration.
 
 
 
 ├
[V] l3ext:Member The member. The member is used for providing per node IP address configuration.
 
 
 
 ├
[V] l3ext:MemberDef The member definition. The member is used for providing per node IP address configuration. This is used internally.
 
 
 ├
[V] l3ext:AOutRefSrc  Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:BgpPeerSrc  BGP Peer Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:BgpPolSrc  BGP Role Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:DampeningPolSrc  Dampening Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:DefRtLeakCriteriaSrc  DefRtLeakCriteria Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:DefRtLeakScopeSrc  DefRtLeakScope Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:EigrpPolSrc  Ospf Role Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:InterleakPolSrc  Interleak Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:OspfAreaIdSrcRefs  Ospf Area ID Policy Source L3 Out(Ref) OutDns
 
 
 
 ├
[V] l3ext:OspfRoleSrc  Ospf Role Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:RedistributePolSrc  Redistribute Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:RouterIdSrc  Router ID Policy Source L3 Out(Ref)
 
 
 ├
[V] l3ext:AOutRefSrcCont  Abstraction of Container for L3 Out Policy Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:BgpPeerSrcCont  Container for BGP Peer Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:BgpPolSrcCont  Container for BGP Policy Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:DampeningPolSrcCont  Dampening Policy Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:DefRtLeakCriteriaSrcCont  Container for DefRtLeakCriteria Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:DefRtLeakScopeSrcCont  Container for DefRtLeakScope Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:EigrpPolSrcCont  Per Adress Family Container for EIGRP Policy Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:InterleakPolSrcCont  Interleak Policy Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:OspfAreaIdSrc  Ospf Area ID Policy Source L3 Out(Ref)
 
 
 
 ├
[V] l3ext:OspfAreaIdSrcCont  Container for Ospf Area ID Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:OspfRoleSrcCont  Per Adress Family Container for Ospf Role Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:RedistributePolSrcCont  Redistribute Policy Sources ( L3 OutsRef )
 
 
 
 ├
[V] l3ext:RouterIdSrcCont  Container for Router ID Sources ( L3 OutsRef )
 
 
 ├
[V] l3ext:DepPolState  L3 Outside Policy Reference
 
 
 ├
[V] l3ext:GlobalCtxName  Global VRF Name
 
 
 ├
[V] l3ext:GlobalCtxNameDef  Global VRF Name Definition
 
 
 ├
[V] l3ext:InfraNodeP  Infra Logical Node Profile
 
 
 ├
[V] l3ext:IntersiteLoopBackIfP  Intersite Loop Back Interface Profile
 
 
 ├
[V] l3ext:IntersiteLoopBackIfPDef  Intersite Loop Back Interface Profile Definition
 
 
 ├
[V] l3ext:LoopBackIfP The loopback interface profile.
 
 
 ├
[V] l3ext:LoopBackIfPDef 
 
 
 ├
[V] l3ext:OutRef The Layer 3 outside policy reference.
 
 
 ├
[V] macsec:IfTracker 
 
 
 ├
[V] macsec:Mgmt 
 
 
 ├
[V] mgmt:AZone The managed node zone.
 
 
 
 ├
[V] mgmt:InBZone The in-band management zone.
 
 
 
 ├
[V] mgmt:OoBZone The out-of-band zone.
 
 
 ├
[V] mld:ASnoopAccessGroup  MLD Snoop Access Group, defines a filter for the MLD joins that can be accepted on a given port/encap or fvAEPg. This enable to perform a selective admission control on certain interfaces
 
 
 
 ├
[V] mld:SnoopAccessGroup  Representation of an MLD snooping filter
 
 
 
 ├
[V] mld:SnoopAccessGroupDef  In case the filter will take place at the fvAEPg level For future releases Internal Representation of an MLD snooping filter
 
 
 ├
[V] mld:ASnoopStaticGroup  MLD Snoop Static Group, it's used to allow a tenant admin to statically join a multicast stream on some port,encap or fvAEPG
 
 
 
 ├
[V] mld:SnoopStaticGroup  Representation of an MLD snooping static (*,G) or (S,G) membership
 
 
 
 ├
[V] mld:SnoopStaticGroupDef  In case the static group membership is at the fvAEPg level For future releases Internal representation of the group memebership
 
 
 ├
[V] mon:ATarget The base monitoring target policy model.
 
 
 
 ├
[V] mon:Target The base monitoring target policy model.
 
 
 
 
 ├
[V] mon:EPGTarget Creating a monitoring target will allow you to associate certain monitoring policies to the target object for this tenant. These associated policies can be related to stats collection, stats export, Callhome/SNMP/Syslog, event severities, fault severities, and fault lifecycle policies. The target object will be found in the Monitoring Object drop-down menu in the sub-folders of this monitoring policy, if available.
 
 
 
 
 ├
[V] mon:FabricTarget The monitoring target policy model for the fabric semantic scope.
 
 
 
 
 ├
[V] mon:InfraTarget Creating a monitoring target will allow you to associate certain monitoring policies to the target object for the fabric infrastructure. These associated policies can be related to stats collection, stats export, Callhome/SNMP/Syslog, event severities, fault severities, and fault lifecycle policies. The target object will be found in the Monitoring Object drop-down menu in the sub-folders of this monitoring policy, if available.
 
 
 ├
[V] mon:ExportP The export data policy for a given user.
 
 
 
 ├
[V] stats:ExportP The export policy, which enables you to output statistics collection policy reports in an XML or JSON format. The reports are exported at a specified frequency with an option for gzip file compression.
 
 
 ├
[V] mon:Group The monitoring group.
 
 
 
 ├
[V] callhome:AGroup  CallHome Group brings together all information needed to send CallHome messages to a set of destinations. It is referenced by mon:Src, which determines what information is sent
 
 
 
 
 ├
[V] callhome:Group Call Home provides an email-based notification for critical system policies. A range of message formats are available for compatibility with pager services or XML-based automated parsing applications. You can use this feature to page a network support engineer, email a Network Operations Center, or use Cisco Smart Call Home services to generate a case with the Technical Assistance Center.
 
 
 
 
 ├
[V] callhome:SmartGroup 
 
 
 
 ├
[V] snmp:Group The SNMP destination group contains information needed to send traps or informs to a set of destinations.. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
 
 
 
 ├
[V] syslog:Group The syslog destination group contains all information required to send syslog messages to a group of destinations.
 
 
 
 ├
[V] tacacs:Group  Group brings together all information needed to send audit logs to a set of destinations. It is referenced by mon:Source, which determines which events generate logs.
 
 
 ├
[V] mon:ProtoP The objects in the hierarchy under mon:Pol (Policy, Target Subjects, ...) that define scopes for monitoring activities, including statistics reporting and notification dispatching. To enable notification dispatching, a user attaches a mon:Src object under the object with the desired scope. The source provides an association to a group, which contains all the information needed to dispatch notifications to a set of destinations using a specifie...
 
 
 
 ├
[V] callhome:Prof Contains all site information and the address of the SMTP server used to send emails.
 
 
 
 ├
[V] syslog:Prof Represents the configuration parameters used for this protocol.
 
 
 ├
[V] mon:SecAuthP The Security/Authorization profile.
 
 
 ├
[V] mon:Src Acts as a tap: place it under another mon managed object to start funnelling events to the destinations in the group using the specified profiles and credentials. Note that the creation of Fault/Event/Audit record managed objects happens independently of the presence of an Src.
 
 
 
 ├
[V] callhome:ASrc  Abstract Callhome source used for callhome and smart callhome
 
 
 
 
 ├
[V] callhome:SmartSrc 
 
 
 
 
 ├
[V] callhome:Src The call home source profile determines the information to deliver and the urgency level for sending email-based alert notifications to a call home destination. A range of message formats are available for compatibility with pager services or XML-based automated parsing applications. You can use this feature to page a network support engineer, email a Network Operations Center, or use Cisco Smart Call Home services to generate a case with the Te...
 
 
 
 ├
[V] snmp:Src The SNMP source profile determines the fault information, severity level, and destination for sending messages to the SNMP destination. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network .
 
 
 
 ├
[V] statslimit:InstLimitPol 
 
 
 
 ├
[V] syslog:Src The syslog source configures a syslog source that specifies the minimum severity of items to be sent as syslog messages to the syslog servers in the destination group.
 
 
 
 ├
[V] tacacs:Src 
 
 
 ├
[V] mon:Subj An abstract object that identifies a scope within a target. Reaction to conditions (fault/events) are examples of scopes that can be captured with a Subj MO.
 
 
 
 ├
[V] condition:CondP Represents a base class for policies on conditions within a given scope.
 
 
 
 
 ├
[V] condition:SevAsnP 
 
 
 
 
 
 ├
[V] event:SevAsnP Represents a policy that specifies the initial and target severity for a specific event.
 
 
 
 
 
 ├
[V] fault:SevAsnP The initial and target severities for a specific fault can be specified in a custom or default monitoring policy directly under an observable target object.
 
 
 
 
 ├
[V] fault:LcP The fault lifecycle policy specifies the timer intervals of faults in their lifecycle. This policy can be specified in a common, default, or custom monitoring policy. Custom and default monitoring policies can be applied globally, per monitoring object or to a group of monitoring objects.
 
 
 ├
[V] monitor:Destination The span destination information.
 
 
 
 ├
[V] monitor:ERDest The ERSPAN destination information.
 
 
 
 ├
[V] monitor:LocalDest The local span destination information.
 
 
 ├
[V] monitor:Session The monitor session definition. There can only be a few sessions active at a given time (with a maximum of 4).
 
 
 ├
[V] monitor:Source The sources to be monitored.
 
 
 ├
[V] nws:ASrc  Firewall logging policies
 
 
 
 ├
[V] nws:ASyslogSrc  Abstract Syslog Source for Firewall. Contains configuration parameters for syslog functionality of the firewall device and a relation to the syslog group, which contains the list of destination servers
 
 
 
 
 ├
[V] nws:SyslogSrc  Policy providing a concrete implementation of a syslog source for a firewall.
 
 
 
 
 ├
[V] nws:SyslogSrcDef  Read-only instance of syslog source for a firewall. Intended for internal use.
 
 
 ├
[V] pim:RouteMapDefWrapper  PIM Route Map DEF wrapper
 
 
 ├
[V] planner:AEpgFilter  Base class for epg filter
 
 
 
 ├
[V] planner:Epg 
 
 
 
 ├
[V] planner:EpgAny 
 
 
 ├
[V] planner:ATmpl  A named template
 
 
 
 ├
[V] planner:ADomainTmpl  Base class for domain templates
 
 
 
 
 ├
[V] planner:AzureDomainTmpl  Azure Domain Template
 
 
 
 
 ├
[V] planner:VmwareDomainTmpl  Vmware Domain Template
 
 
 
 ├
[V] planner:AEpgDomain  Base class for epg domain
 
 
 
 
 ├
[V] planner:AzureDomain  Azure Domain
 
 
 
 
 ├
[V] planner:PhysDomain  Phys Domain
 
 
 
 
 ├
[V] planner:VmwareDomain  Vmware Domain
 
 
 
 ├
[V] planner:AObject  An enuemrable object template
 
 
 
 
 ├
[V] planner:AEpg  Abstract Epg base class
 
 
 
 
 
 ├
[V] planner:EpgTmpl  Epg template
 
 
 
 
 
 ├
[V] planner:L2OutTmpl  L2Out template
 
 
 
 
 
 ├
[V] planner:L3OutTmpl  L3Out template
 
 
 
 ├
[V] planner:BdTmpl  BD template
 
 
 
 ├
[V] planner:ContractTmpl  Contract template
 
 
 
 ├
[V] planner:GraphTmpl  Grapth template
 
 
 
 ├
[V] planner:L4L7ClusterTmpl  L4L7 Cluster template
 
 
 
 ├
[V] planner:VrfTmpl  VRF template
 
 
 ├
[V] planner:FexTmpl  Fex Tmpl
 
 
 ├
[V] planner:LeafTmpl  Leaf Template
 
 
 ├
[V] planner:SpineTmpl  Spine Template
 
 
 ├
[V] planner:TenantTmpl  Tenant template
 
 
 ├
[V] qos:ABuffer The buffer policy holder describes the minimum guaranteed packet buffer reservations. These are applied per class currently in the system.
 
 
 
 ├
[V] qos:Buffer The buffering information of a class, such as the minimum buffer required for a class. This is applied at system level
 
 
 
 ├
[V] qosp:Buffer The buffering information of a class, such as the minimum buffer required for a class, which is applied at system level.
 
 
 ├
[V] qos:ACong An abstraction of a congestion management policy holder. This object describes congestion algorithms and ECN information. These are applied at a per class today in the system.
 
 
 
 ├
[V] qos:Cong The congestion algorithm and ECN information of a class. This is applied at system level
 
 
 
 ├
[V] qosp:Cong A container for the congestion policy. This container holds information that describes the congestion parameters of the class such as ECN, WRED, and Tail-drop. These congestion parameters are applied at per class-level in the system.
 
 
 ├
[V] qos:AQueue An abstraction of a queue management policy holder. This object describes the queue threshold parameters, such as management method, limits, etc. These are applied at a per class today in the system.
 
 
 
 ├
[V] qos:Queue The queuing information, such as the limit and queuing method. This is applied at system level.
 
 
 
 ├
[V] qosp:Queue A container for the queue management policy. This container holds information that describes the queue threshold parameters, such as the management method, which are applied at a per-class basis in the system.
 
 
 ├
[V] qos:ASched An abstraction of a schedule policy holder. This object describes the minimum guaranteed packet buffer reservations. These are applied at a per class today in the system.
 
 
 
 ├
[V] qos:Sched The information about the scheduling parameter of the class. This object has the scheduling method and bandwidth parameter and is applied at system level.
 
 
 
 ├
[V] qosp:Sched A container for the schedule policy. This container holds information that describes the bandwidth and scheduling algorithm (Strict priority or WRR), which are applied at a per-class basis in the system.
 
 
 ├
[V] qos:Classification An abstract class for dot1p and DSCP classification rules.
 
 
 
 ├
[V] qos:ADot1PClass An abstraction of a dot1P class.
 
 
 
 
 ├
[V] qos:Dot1PClass The class level for dot1P to prioritize the map.
 
 
 
 
 ├
[V] qos:Dot1PClassDef The definition class to be attached to the endpoint profile. Note that this is an internal object.
 
 
 
 ├
[V] qos:ADscpClass An abstraction of a DSCP class.
 
 
 
 
 ├
[V] qos:DscpClass The class level for DSCP to prioritize the map.
 
 
 
 
 ├
[V] qos:DscpClassDef The definition class to be attached to the endpoint profile. Note that this is an internal object.
 
 
 ├
[V] qosp:PrioFlowCtrl 
 
 
 ├
[V] rtctrl:CtxP The context policy, which is a unique layer 3 forwarding and application policy domain. The context defines a layer 3 address domain.
 
 
 ├
[V] rtctrl:Scope The route context Scope. The scope defines the node on which the policy is deployed.
 
 
 ├
[V] rtctrl:SubjDef The subject definition.
 
 
 ├
[V] rtctrl:SubjP The subject profile.
 
 
 ├
[V] rtdmc:AFilterPol  Abstraction of Filter Policy
 
 
 
 ├
[V] ipmc:ARepPol  Report Policy
 
 
 
 
 ├
[V] igmp:RepDef 
 
 
 
 
 ├
[V] igmp:RepPol 
 
 
 
 ├
[V] ipmc:AStRepPol  Static Report Policy
 
 
 
 
 ├
[V] igmp:StRepDef 
 
 
 
 
 ├
[V] igmp:StRepPol 
 
 
 
 ├
[V] ipmc:AStateLPol  State Limit
 
 
 
 
 ├
[V] igmp:StateLDef 
 
 
 
 
 ├
[V] igmp:StateLPol 
 
 
 
 ├
[V] rtdmc:ABSRFilter 
 
 
 
 
 ├
[V] pim:BSRFilterDef The PIM Bootstrap Router (BSR) filter definition.
 
 
 
 
 ├
[V] pim:BSRFilterPol The PIM Bootstrap Router (BSR) filter policy.
 
 
 
 ├
[V] rtdmc:AInterVRFEntry 
 
 
 
 
 ├
[V] pim:InterVRFEntryDef  PIM MA Filter definition
 
 
 
 
 ├
[V] pim:InterVRFEntryPol  Inter VRF Entry policy
 
 
 
 ├
[V] rtdmc:AJPFilterPol  Interface Join-PruneFilter Policy
 
 
 
 
 ├
[V] pim:JPInbFilterDef Interface-level inbound join/prune filter definition.
 
 
 
 
 ├
[V] pim:JPInbFilterPol Interface-level inbound join/prune filter policy.
 
 
 
 
 ├
[V] pim:JPOutbFilterDef Interface-level outbound join/prune filter definition.
 
 
 
 
 ├
[V] pim:JPOutbFilterPol Interface-level outbound join/prune filter policy.
 
 
 
 ├
[V] rtdmc:AMAFilter 
 
 
 
 
 ├
[V] pim:MAFilterDef PIM MA filter definition.
 
 
 
 
 ├
[V] pim:MAFilterPol Mapping agent (MA) filter policy.
 
 
 
 ├
[V] rtdmc:ANbrFilterPol  Interface Neighbor Filter Policy
 
 
 
 
 ├
[V] pim:NbrFilterDef Interface-level neighbor filter definition.
 
 
 
 
 ├
[V] pim:NbrFilterPol Interface-level neighbor filter policy.
 
 
 
 ├
[V] rtdmc:ARPGrpRangePol 
 
 
 
 
 ├
[V] pim:RPGrpRangeDef Specifies if RP multicast group range definition.
 
 
 
 
 ├
[V] pim:RPGrpRangePol Specifies if RP multicast group range policy.
 
 
 
 ├
[V] rtdmc:ARegTrPol 
 
 
 
 
 ├
[V] pim:RegTrDef PIM register traffic policy definition
 
 
 
 
 ├
[V] pim:RegTrPol PIM register traffic policy
 
 
 
 ├
[V] rtdmc:AResPol 
 
 
 
 
 ├
[V] pim:ResDef PIM resource policy definition
 
 
 
 
 ├
[V] pim:ResPol PIM resource policy
 
 
 
 ├
[V] rtdmc:ASGRangeExpPol  Abstraction of (S,G) expiry policy
 
 
 
 
 ├
[V] pim:SGRangeExpDef The (S,G) expiry definition.
 
 
 
 
 ├
[V] pim:SGRangeExpPol The (S,G) range expiry policy.
 
 
 
 ├
[V] rtdmc:ASSMRangePol  Abstraction of SSM group range policy
 
 
 
 
 ├
[V] pim:SSMRangeDef Source-specific group range definition
 
 
 
 
 ├
[V] pim:SSMRangePol Source-specific group range policy
 
 
 
 ├
[V] rtdmc:ASharedRangePol  Abstraction of shared tree policy
 
 
 
 
 ├
[V] pim:SharedRangeDef Shared tree definition
 
 
 
 
 ├
[V] pim:SharedRangePol Shared tree group range policy
 
 
 ├
[V] rtdmc:APatPol  Abstraction of Multicast Pattern policy
 
 
 
 ├
[V] rtdmc:AASMPatPol  Abstraction of Any Source Multicast Pattern policy
 
 
 
 
 ├
[V] pim:ASMPatDef The any-source multicast pattern definition.
 
 
 
 
 ├
[V] pim:ASMPatPol The any-source multicast pattern policy.
 
 
 
 ├
[V] rtdmc:ABidirPatPol  Abstraction of Bidirectional Multicast Pattern policy
 
 
 
 
 ├
[V] pim:BidirPatDef  Bidirectional Multicast Pattern definition
 
 
 
 
 ├
[V] pim:BidirPatPol  Not configurable until feature is ready - Bidirectional Multicast Pattern policy
 
 
 
 ├
[V] rtdmc:ASSMPatPol  Abstraction of Source Specific Multicast Pattern policy
 
 
 
 
 ├
[V] pim:SSMPatDef Source-specific multicast pattern definition
 
 
 
 
 ├
[V] pim:SSMPatPol Source-specific multicast pattern policy
 
 
 ├
[V] rtdmc:ARPPol  Abstraction of Multicast RP policy
 
 
 
 ├
[V] rtdmc:AAutoRPPol  Abstraction of Multicast AutoRP policy
 
 
 
 
 ├
[V] pim:AutoRPDef The Auto-RP PIM definition.
 
 
 
 
 ├
[V] pim:AutoRPPol The Auto-RP policy.
 
 
 
 ├
[V] rtdmc:ABSRPPol  Abstraction of Multicast Bootstrap RP policy
 
 
 
 
 ├
[V] pim:BSRPDef The Bootstrap Router (BSR) policy definition.
 
 
 
 
 ├
[V] pim:BSRPPol The Bootstrap Router (BSR) policy.
 
 
 
 ├
[V] rtdmc:AInterVRFPol  WILL BE EXPOSED/IMPEMENTED in a future release Abstraction of Multicast Inter VRF policy
 
 
 
 
 ├
[V] pim:InterVRFDef  Inter VRF PIM definition
 
 
 
 
 ├
[V] pim:InterVRFPol  Inter VRF PIM policy
 
 
 
 ├
[V] rtdmc:AStaticRPPol  WILL BE EXPOSED/IMPEMENTED in a future release
 
 
 
 
 ├
[V] pim:FabricRPDef  FabricRP PIM definition
 
 
 
 
 ├
[V] pim:FabricRPPol  FabricRP PIM policy
 
 
 
 
 ├
[V] pim:StaticRPDef Static RP PIM definition
 
 
 
 
 ├
[V] pim:StaticRPPol Static RP PIM policy
 
 
 ├
[V] rtdmc:ARtMapEntry  Route Map Entry
 
 
 
 ├
[V] pim:RouteMapEntry PIM route map entry
 
 
 
 ├
[V] pim:RouteMapEntryDef PIM route map entry definition
 
 
 ├
[V] rtdmc:AStaticRPEntry 
 
 
 
 ├
[V] pim:StaticRPEntryDef PIM MA filter definition
 
 
 
 ├
[V] pim:StaticRPEntryPol Static RP entry policy
 
 
 ├
[V] snmp:AClientGrpP An abstract representation of a client group profile.
 
 
 
 ├
[V] snmp:ClientGrp A client group is a group of client IP addresses that allows SNMP access to routers or switches.
 
 
 
 ├
[V] snmp:ClientGrpP A client group is a group of client IP addresses that allows SNMP access to routers or switches.
 
 
 ├
[V] snmp:ACommunityP An abstract representation of a community profile.
 
 
 
 ├
[V] snmp:CommSecP A security profile using a community string match for authentication.
 
 
 
 ├
[V] snmp:CommunityP The SNMP community profile enables access to the router or switch statistics for monitoring. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
 
 
 ├
[V] snmp:AUserP An abstract representation of a user profile.
 
 
 
 ├
[V] snmp:UserP The SNMP user profile is used to associate users with SNMP policies for monitoring devices in a network. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
 
 
 
 ├
[V] snmp:UserSecP An authentication profile using user names.
 
 
 ├
[V] span:ASource The abstraction of a SPAN source. A SPAN source is where traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access or fabric) determines the allowed types of SPAN sources and d...
 
 
 
 ├
[V] span:FabSource The fabric source port (also called a monitored port), which is a switched port that you monitor for network traffic analysis. In a single local SPAN session, you can monitor source port traffic such as received (Rx), transmitted (Tx), or bidirectional (both). The switch supports any number of source ports (up to the maximum number of available ports on the switch).
 
 
 
 ├
[V] span:Source The SPAN or ERSPAN source, which is where traffic is sampled. A source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a source and a destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of sources and destinations. The destination can b...
 
 
 ├
[V] span:Destination The SPAN destination, which is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a port or an endpoint group. If the destination is a port, i...
 
 
 
 ├
[V] span:ERDestination The ERSPAN destination, which is where network traffic is sent for analysis by a network analyzer. When you create a traffic monitoring session, you must select an ERSPAN source and ERSPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of ERSPAN sources and destinations. The destination can be either a remote port or endpoint group. If the destination is a port, it should not be one that has been config...
 
 
 
 ├
[V] span:LDestination The local SPAN destination, which is where network traffic is sent for analysis by a network analyzer. When you create a traffic monitoring session, you must select an local SPAN source and destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of local SPAN sources and destinations. The destination can be either a port or endpoint group. If the destination is a port, it should not be one that has been configur...
 
 
 ├
[V] span:FilterEntry 
 
 
 ├
[V] span:FilterGrp Filter Group
 
 
 ├
[V] span:Session A local SPAN session is an association of a destination port with source ports. You can monitor incoming or outgoing traffic on a series or range of ports.
 
 
 ├
[V] stats:AColl A superclass that configures collection rules according to the granularity of the statistics.
 
 
 
 ├
[V] stats:Coll The collection configuration policy, which configures the collection policy according to the granularity of the statistics.. This is also a container for threshold policies for the statistic granularity.
 
 
 
 ├
[V] stats:HierColl The statistics collection policy, which enables you to determine how often the system collects data and to specify how far back in time data should be collected.
 
 
 ├
[V] stats:AExportJob A superclass for the export job status of statistical data.
 
 
 
 ├
[V] stats:ExportJob The model for the holding status of an export job for statistical data.
 
 
 
 ├
[V] stats:ShardExportSubJob 
 
 
 ├
[V] stats:AThrP The superclass for the statistical threshold policy. Subclasses represent export policies for specific data types.
 
 
 
 ├
[V] stats:ThrDoubleP The concrete statistical threshold policy for a double data type.
 
 
 
 ├
[V] stats:ThrFloatP The concrete statistical threshold policy for a float data type.
 
 
 
 ├
[V] stats:ThrSByteP The concrete statistical threshold policy for a signed byte data type.
 
 
 
 ├
[V] stats:ThrSint16P The concrete statistical threshold policy for a 16-bit signed Int data type.
 
 
 
 ├
[V] stats:ThrSint32P The concrete statistical threshold policy for a 32-bit signed Int data type.
 
 
 
 ├
[V] stats:ThrSint64P The concrete statistical threshold policy for a 64-bit signed integer data type.
 
 
 
 ├
[V] stats:ThrTriggerP The concrete statistical threshold policy for a trigger counter type.
 
 
 
 ├
[V] stats:ThrUByteP The concrete statistical threshold policy for an unsigned byte data type.
 
 
 
 ├
[V] stats:ThrUint16P The concrete statistical threshold policy for a 16-bit unsigned Int data type.
 
 
 
 ├
[V] stats:ThrUint32P The concrete statistical threshold policy for a 32-bit unsigned Int data type.
 
 
 
 ├
[V] stats:ThrUint64P The concrete statistical threshold policy for a 64-bit unsigned integer data type.
 
 
 ├
[V] stats:Reportable A statistics policy container, which contains statistic collections and export policies for different types of statistics.
 
 
 ├
[V] stp:AllocEncapBlkDefDependencyResolver 
 
 
 ├
[V] stp:DomFabCons 
 
 
 ├
[V] stp:DomFabEncap 
 
 
 ├
[V] stp:EncapSegIdPair The table created at the node for efficient lookups of the spanning tree flooding segment ID. This table is created from the spanning-tree protocol encap block definition for allocated IDs and the base segment ID used for the range pushed by IFC.
 
 
 ├
[V] svccore:CoreState 
 
 
 ├
[V] syslog:Console A console terminal.
 
 
 ├
[V] syslog:DestState 
 
 
 ├
[V] syslog:FacilityFilter 
 
 
 ├
[V] syslog:File A local file.
 
 
 ├
[V] syslog:LogMsg 
 
 
 ├
[V] syslog:SystemMsgP 
 
 
 ├
[V] trig:Executable The container for executable policies.
 
 
 
 ├
[V] callhome:InvP The call home inventory policy is used to send Call Home messages with system inventory information.
 
 
 
 ├
[V] config:ABackupP The abstract backup policy.
 
 
 
 
 ├
[V] config:ExportP A configuration export policy is used to backup the system configuration.
 
 
 
 
 ├
[V] config:ImportIdP 
 
 
 
 
 ├
[V] config:ImportP A configuration import policy specifies how to import a fabric configuration file.
 
 
 
 
 ├
[V] config:RollbackP 
 
 
 
 
 ├
[V] config:SnapshotMgrP 
 
 
 
 ├
[V] config:DumpP 
 
 
 
 ├
[V] dbgexp:ExportP The data export policy creates an archive containing configuration information, logs and diagnostic data that will help TAC with troubleshooting and resolving a technical issue. This is an abstract class for technical support and core policies.
 
 
 
 
 ├
[V] dbgexp:CoreP The core policy provides a core file report containing data about the system and the component at the time of the failure.
 
 
 
 
 ├
[V] dbgexp:TechSupODev  Techsupport export for ODev
 
 
 
 
 ├
[V] dbgexp:TechSupOnDBase  TechSupport export on demand
 
 
 
 
 
 ├
[V] dbgexp:TechSupOnD The on-demand tech support policy creates an archive containing configuration information, logs and diagnostic data that will help TAC with troubleshooting and resolving a technical issue.
 
 
 
 
 
 ├
[V] dbgexp:TechSupVmm  Techsupport export for Vmm hypervisor
 
 
 
 
 ├
[V] dbgexp:TechSupP A tech support policy creates an archive containing configuration information, logs and diagnostic data that will help TAC with troubleshooting and resolving a technical issue.
 
 
 
 ├
[V] maint:AMaintP The maintenance policy specifies when and how maintenance takes place.
 
 
 
 
 ├
[V] maint:CatMaintP The catalog maintenance policy specifies when catalog maintenance takes place.
 
 
 
 
 ├
[V] maint:CtrlrMaintP The controller maintenance policy specification describes when and how maintenance takes place.
 
 
 
 
 ├
[V] maint:MaintP The maintenance policy determines the pre-defined action to take when there is a disruptive change made to the service profile associated with the node or set of nodes.
 
 
 
 
 ├
[V] maint:MaintPOnD The On Demand Maintenance policy specification for the node, which describes when and how maintenance takes place.
 
 
 
 ├
[V] recovery:ReconcileConfigP 
 
 
 
 ├
[V] trig:RoProxy 
 
 
 
 ├
[V] troubleshoot:Session  ****************** MOs *********************
 
 
 ├
[V] tunnel:Cons  tunnel:Cons: Used for reference counting the consumers responsible for creation of this tunnel
 
 
 ├
[V] ui:SettingsCont 
 
 
 ├
[V] useg:DomainCont  Container For all EPg and UsegEPg in a given Domain
 
 
 ├
[V] useg:UsegEPgDefCont 
 
 
 ├
[V] vns:ALDevCtx The logical device context.
 
 
 
 ├
[V] vns:LDevCtx A device cluster context points to the device cluster used to pick a specific device based on contract, subject, and function label or names. To specify a wild card, set the name to Any.
 
 
 
 ├
[V] vns:LDevHint Contains hints for the device cluster that must be picked for a specific node of a graph that belongs to a specific subject of a specific contract. In the absence of this hint in an abstract graph, a match for a device cluster context will be done based on the name of the contract, subject, and node. If that fails, a match will be made by wildcarding: the contract followed by the contract, and the subject followed by the contract, subject, and no...
 
 
 ├
[V] vns:ALIfCtx The logical interface context.
 
 
 
 ├
[V] vns:LIfCtx The logical interface context points to the logical interface used to pick a specific logical interface based on the connector name. To specify a wild card, set the name to Any.
 
 
 
 ├
[V] vns:LIfHint Contains hints for the logical interface that must be picked for a specific connector of a graph that belongs to the selected device cluster. The device cluster is selected based on device cluster hint.
 
 
 
 ├
[V] vns:LIfHintInst 
 
 
 ├
[V] vns:ATerm A terminal.
 
 
 
 ├
[V] vns:InTerm An input terminal node. For abstract graphs (AbsGraph), InTerm refers to the terminal node at the input end.
 
 
 
 ├
[V] vns:OutTerm An output terminal node. For abstract graphs (AbsGraph), OutTerm refers to the terminal node at the output end.
 
 
 ├
[V] vns:CtrlrMgmtPol The management policy for the controller appliance IP address.
 
 
 ├
[V] vns:FltInst The representation of a whitelist filter that needs to be applied on a particular endpoint group.
 
 
 ├
[V] vns:HealthDest 
 
 
 ├
[V] vns:L1L2RedirectDest 
 
 
 ├
[V] vns:OrchReq  normalized parameters from orchestrator
 
 
 
 ├
[V] vns:EPGExtRequest 
 
 
 
 ├
[V] vns:FWReq 
 
 
 
 ├
[V] vns:LBReq 
 
 
 
 
 ├
[V] vns:LBIPReq 
 
 
 
 
 ├
[V] vns:LBRNatReq 
 
 
 
 
 ├
[V] vns:LBVSvcGrpSvrReq 
 
 
 
 
 ├
[V] vns:LBVSvrReq 
 
 
 
 ├
[V] vns:NATReq 
 
 
 
 
 ├
[V] vns:NATDynPATReq 
 
 
 
 
 ├
[V] vns:NATPATReq 
 
 
 ├
[V] vns:RedirectDest 
 
 
 ├
[V] vpc:KAPol The keepalive policy.
 
 
 ├
[V] vz:AFiltEntry An abstraction of a filter entry. A filter entry is a combination of network traffic classification properties.
 
 
 
 ├
[V] actrl:Entry The filter entry in the system, which is a unique set of classification filters identified by l4 parameters.
 
 
 
 ├
[V] vz:Entry A filter entry is a combination of network traffic classification properties.
 
 
 
 ├
[V] vz:RFltE A remote filter entry. A filter entry is a combination of network traffic classification properties. Note that this relation is an internal object.
 
 
 ├
[V] vz:ASubj The abstraction of a subject. A subject represents a sub application running behind an endpoint group. For example, an exchange server or a firewall.
 
 
 
 ├
[V] vz:Subj A subject is a sub-application running behind an endpoint group (for example, an Exchange server). A subject is parented by the contract, which can encapsulate multiple subjects. An endpoint group associated to a contract is providing one or more subjects or is communicating with the subject as a peer entity. An endpoint group always associates with a subject and defines rules under the association for consuming/providing/peer-to-peer communicati...
 
 
 
 ├
[V] vz:TSubj The subjects for a service contract represents a sub-application running behind an endpoint group, such as an exchange server. A subject is parented by the contract.
 
 
 ├
[V] vz:ATerm The abstraction of a terminal.
 
 
 
 ├
[V] vz:ASTerm An abstraction of a subject terminal.
 
 
 
 
 ├
[V] vz:InTerm An input terminal node. For abstract graphs, this is the terminal node at the input end.
 
 
 
 
 ├
[V] vz:OutTerm An output terminal node. For abstract graphs, this is the terminal node at the output end.
 
 
 ├
[V] vz:AllocateSharedService Allocate shared service.
 
 
 ├
[V] vz:AnyDef 
 
 
 ├
[V] vz:AnyGroupDef 
 
 
 ├
[V] vz:AnyREpPCont 
 
 
 ├
[V] vz:GlobalPcTagRequest 
 
 
 ├
[V] vz:GlobalPcTagRequestCont  Container of all the requests for allocating global PcTag
 
 
 ├
[V] vz:PcTagCons 
 
 
 ├
[V] vz:ResPcTag 
 
 ├
[V] pol:Consumer consumer of the policy
 
 ├
[V] pol:Cont Represents entities that contain policy definitions.
 
 
 ├
[V] aentp:Entity  Holds aentp control plane entity information.
 
 
 ├
[V] comp:Cont A container for policy definitions.
 
 
 ├
[V] config:BackupStatusCont The backup status container.
 
 
 ├
[V] config:JobCont The configuration job container.
 
 
 ├
[V] config:SnapshotCont 
 
 
 ├
[V] dbgexp:TSTaskCont  Container for techsupport task on switch
 
 
 ├
[V] dbgexp:TechSupCollect The tech support data collection policy creates an archive containing configuration information, logs and diagnostic data that will help TAC with troubleshooting and resolving a technical issue.
 
 
 ├
[V] dbgexp:TechSupData Tech support data
 
 
 ├
[V] dbgexp:TechSupDataCont Tech support data policy container.
 
 
 ├
[V] edm:Cont 
 
 
 ├
[V] eqpt:Entity The equipment policy container.
 
 
 ├
[V] eqptcapacity:Entity 
 
 
 ├
[V] frmwrk:ARelDelCont 
 
 
 
 ├
[V] event:ProcessEventLogPayload 
 
 
 
 ├
[V] fault:ConfMoPayload 
 
 
 
 ├
[V] fault:ProcessFaultPayload 
 
 
 
 ├
[V] fault:UpdateDelegatePayload 
 
 
 
 ├
[V] fault:UpdateRecordPayload 
 
 
 
 ├
[V] fault:UpdateTcaFaultMaskPayload 
 
 
 
 ├
[V] frmwrk:ReliableDeliveryResp 
 
 
 
 ├
[V] health:UpdateDelegateHealthPayload 
 
 
 
 ├
[V] health:UpdateDelegateWeightPayload 
 
 
 ├
[V] ident:Subj The identity subject.
 
 
 ├
[V] ipagectrl:Entity  IP Aging policy container
 
 
 ├
[V] license:FeatureCont 
 
 
 ├
[V] opflexp:Proto  Container for opflex protocol policies
 
 
 ├
[V] pol:Dom Represents the policy definition or resolution domain.
 
 
 
 ├
[V] auth:ASvrGroup 
 
 
 
 
 ├
[V] auth:SvrGroup 
 
 
 
 ├
[V] comp:ProvP The VM provider profile, which enables you to configure policies for a VM provider such as VMware or Microsoft.
 
 
 
 
 ├
[V] vmm:ProvP The VMM provider profile stores the policies of VMM systems from a particular vendor (VMware or Microsoft). This container is automatically created by the system.
 
 
 
 ├
[V] ctrlr:Dom A controller domain.
 
 
 
 
 ├
[V] ctrlr:Inst An instance of the controller.
 
 
 
 ├
[V] dbgexp:TSDomain  Reference to
 
 
 
 ├
[V] fabric:Dom Abase class for fabric policies.
 
 
 
 
 ├
[V] fabric:Inst A container object for fabric policies.
 
 
 
 ├
[V] fv:ADomP A base class for domain profiles.
 
 
 
 
 ├
[V] infra:ADomP The domain profile in the infrastructure is used for carving the infra-elements including, but not limited to, port, vlan, etc.
 
 
 
 
 
 ├
[V] infra:DomP An abstraction of an infrastructure domain profile associated with application endpoint groups. This is used for carving the infra elements including, but not limited to, port, VLAN, etc.
 
 
 
 
 
 
 ├
[V] comp:DomP A virtual machine management domain.
 
 
 
 
 
 
 
 ├
[V] vmm:DomP The VMM domain profile is a policy for grouping VM controllers with similar networking policy requirements. For example, the VM controllers can share VLAN or VXLAN space and application endpoint groups. The APIC communicates with the controller to publish network configurations such as port groups that are then applied to the virtual workloads.
 
 
 
 
 
 
 
 ├
[V] vmm:DomPDef A container for distributed virtual switch policies. This is an object in the iLeaf (switch).
 
 
 
 
 
 
 ├
[V] edm:GroupP 
 
 
 
 
 
 
 
 ├
[V] extdev:GroupP  External Device Group Profile is a policy pertaining to single External Device Management domain that also corresponds to a single policy enforcement domain: a UCSM Instance (a cluster of UCS FIs) forms such domain. This maps into UCS VLAN Group concept.
 
 
 
 
 
 
 ├
[V] extnw:DomP The base class for the external bridged and external routed domain profiles. The external bridged domain profile is a policy for managing the physical infrastructure, such as ports/VLANS, that can be used by an L2 network bridged outside the fabric. The external routed domain profile is a policy for managing the physical infrastructure, such as ports/VLANS, that can be used by an L3 routed outside network.
 
 
 
 
 
 
 
 ├
[V] l2ext:ADomP The abstraction of the external routed domain profile is a policy for managing the physical infrastructure, such as ports/VLANS, that can be used by an L3 routed outside network.
 
 
 
 
 
 
 
 
 ├
[V] l2ext:DomDef This is generated and used only by internal processes.
 
 
 
 
 
 
 
 
 ├
[V] l2ext:DomP The external bridged domain profile is a policy for managing the physical infrastructure, such as ports/VLANS, that can be used by an L2 network bridged outside the fabric.
 
 
 
 
 
 
 
 ├
[V] l3ext:ADomP The abstraction of the external routed domain profile, which is a policy for managing the physical infrastructure, such as ports/VLANS, that can be used by an L3 routed outside network.
 
 
 
 
 
 
 
 
 ├
[V] l3ext:DomDef This is generated and used only by internal processes.
 
 
 
 
 
 
 
 
 ├
[V] l3ext:DomP The external routed domain profile is a policy for managing the physical infrastructure, such as ports/VLANS, that can be used by an L3 routed outside network.
 
 
 
 
 
 
 ├
[V] fc:DomP  FC domain profile is a policy pertaining to single FC Management domain that also corresponds to a single policy enforcement domain: representing the FC bindings.
 
 
 
 
 
 
 ├
[V] phys:DomP The physical domain profile stores the physical resources (ports and port-channels) and encap resources (VLAN/VXLAN) that should be used for endpoint groups associated with this domain.
 
 
 
 ├
[V] fv:AppCtxRefCont  App Ctx Reference Container
 
 
 
 ├
[V] fv:EpCPCont The definition objects.
 
 
 
 ├
[V] fv:EpCont An endpoint container. This is an internal object used for deploying endpoints.
 
 
 
 ├
[V] fv:EpPCont The container for an endpoint profile.
 
 
 
 ├
[V] fv:FailedXlateCont 
 
 
 
 ├
[V] fv:L3EpCont  L3 Ep Container: Contains EndPoints per VRF @@@ This Mo exists only on PE
 
 
 
 ├
[V] fv:Tenant A policy owner in the virtual fabric. A tenant can be either a private or a shared entity. For example, you can create a tenant with contexts and bridge domains shared by other tenants. A shared type of tenant is typically named common, default, or infra.
 
 
 
 ├
[V] infra:Infra A container for all tenant infra configurations.
 
 
 
 ├
[V] l3ext:PolRefCont The L3 outside level policy reference container.
 
 
 
 ├
[V] opflex:AODevRslt  Singleton
 
 
 
 
 ├
[V] dbgexp:TSVmmRslt 
 
 
 
 
 ├
[V] opflexp:TechSuppVmmRslt 
 
 
 
 ├
[V] opflex:AODevTask 
 
 
 
 
 ├
[V] dbgexp:TSVmmTask 
 
 
 
 ├
[V] planner:Cont 
 
 
 
 ├
[V] pol:Uni Represents policy definition/resolution universe.
 
 
 
 ├
[V] rtctrl:ConsSubjDefCont  SubjDef Container for Shared Service Consumers Public Subnets with resolved policies
 
 
 ├
[V] quota:Cont  Container for quota configurations
 
 
 ├
[V] recovery:CheckerDiffCont  Container to store the config diffs between PM and PE. Used for Checker in the task CheckConfig.
 
 
 ├
[V] res:ASubj This is generated and used only by internal processes.
 
 
 
 ├
[V] res:Subj This is generated and used only by internal processes.
 
 
 
 ├
[V] res:USubj This is generated and used only by internal processes.
 
 
 ├
[V] stats:ExportStatusCont A container for the data export statuses of statistical data.
 
 
 ├
[V] stats:MonPolDefCont A container for monitoring policy shadow objects.
 
 
 ├
[V] telemetry:AFltGrp 
 
 
 
 ├
[V] telemetry:SubnetFltGrp 
 
 
 
 ├
[V] telemetry:SubnetFltGrpDef 
 
 
 ├
[V] telemetry:Servers 
 
 
 ├
[V] topoctrl:Entity A container for the topology control policy.
 
 ├
[V] pol:Ctrlr Represents the policy controller.
 
 
 ├
[V] auth:ASvr 
 
 
 
 ├
[V] auth:Svr 
 
 
 ├
[V] comp:CtrlrP A base abstract class for the controller policy.
 
 
 
 ├
[V] vmm:CtrlrP The VMM controller profile specifies how to connect to a single VM management controller that is part of a policy enforcement domain. For example, the VMM controller profile could be a policy to connect a VMware vCenter that is part of a VMM domain.
 
 
 
 ├
[V] vmm:CtrlrPDef A shadow object needed on the iLeaf to get DVS policies for a given controller instance.
 
 
 ├
[V] edm:MgrP 
 
 
 
 ├
[V] extdev:MgrP  External Device Controller Profile specifies how to connect to a single External Device Management Controller that is part of containing policy enforcement domain. For example, policy to connect a Cisco UCSM that is part a EDM Group.
 
 ├
[V] pol:Def Represents self-contained policy document.
 
 
 ├
[V] aaa:AuthRealm An authentication realm provides authentication to verify the identity of an entity (person or device) accessing fabric devices. The authentication is based on the user ID and password combination provided by the entity trying to access the fabric. Authentication can be performed locally, using the local lookup database, or by remote, using one or more RADIUS or TACACS+ servers.
 
 
 ├
[V] aaa:CtrlrFipsState 
 
 
 ├
[V] aaa:Definition The AAA policy definition. This is an abstract class and cannot be instantiated.
 
 
 
 ├
[V] aaa:ADomainRef This object is generated and used only by internal processes.
 
 
 
 
 ├
[V] aaa:DomainRef A reference to the domain that the parent object belongs to.
 
 
 
 
 ├
[V] aaa:IDomainRef This object is generated and used only by internal processes.
 
 
 
 ├
[V] aaa:AProvider An abstract class that is the superclass for the Radius/Tacacs/Ldap provider classes.
 
 
 
 
 ├
[V] aaa:LdapProvider An LDAP provider is a remote server supporting the LDAP protocol that will be used for authentication.
 
 
 
 
 ├
[V] aaa:RadiusProvider A RADIUS provider is a remote server supporting the RADIUS protocol that will be used for authentication.
 
 
 
 
 ├
[V] aaa:RsaProvider 
 
 
 
 
 ├
[V] aaa:SamlProvider 
 
 
 
 
 ├
[V] aaa:TacacsPlusProvider A TACACS+ provider is a remote server supporting the TACACS+ protocol that will be used for authentication.
 
 
 
 ├
[V] aaa:ARbacRule This is generated and used only by internal processes.
 
 
 
 
 ├
[V] aaa:IPRbacRule  IPRbacRule mos are created under aaaRbacEp as a side-effect of the creation of PRbacRule under fv:Tenant
 
 
 
 
 ├
[V] aaa:IRbacRule This is generated and used only by internal processes.
 
 
 
 
 ├
[V] aaa:RbacRule A role based access control (RBAC) rule allows users from a security domain to read the subtree starting at a specific object.
 
 
 
 ├
[V] aaa:ActiveUserSession 
 
 
 
 ├
[V] aaa:Banner An abstract class that contains login banners and cannot be instantiated.
 
 
 
 
 ├
[V] aaa:PreLoginBanner A GUI banner is the informational banner to be displayed before user login authentication.
 
 
 
 ├
[V] aaa:Config The generic security authentication configuration. This is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] aaa:AuthMethod The generic security authentication method. This is an abstract class and cannot be instantiated.
 
 
 
 
 
 ├
[V] aaa:ConsoleAuth The authentication configuration for console login.
 
 
 
 
 
 ├
[V] aaa:DefaultAuth The default authentication configuration for all login methods.
 
 
 
 
 
 ├
[V] aaa:DomainAuth The authentication configuration for a domain login.
 
 
 
 ├
[V] aaa:DeletedUserSession 
 
 
 
 ├
[V] aaa:Domain An AAA domain is the AAA security method for processing authentication requests.
 
 
 
 ├
[V] aaa:Ep The base class for an AAA endpoint is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] aaa:DuoEp 
 
 
 
 
 ├
[V] aaa:KafkaEp 
 
 
 
 
 ├
[V] aaa:LdapEp The global security management properties for LDAP endpoints and LDAP provider groups.
 
 
 
 
 ├
[V] aaa:PingEp 
 
 
 
 
 ├
[V] aaa:RadiusEp The RADIUS endpoint policy is the global security management properties for RADIUS endpoints and RADIUS provider groups.
 
 
 
 
 ├
[V] aaa:RsaEp 
 
 
 
 
 ├
[V] aaa:SamlEp 
 
 
 
 
 ├
[V] aaa:TacacsPlusEp The TACACS+ endpoint policy is the global security management properties for TACACS+ endpoints and TACACS+ provider groups.
 
 
 
 ├
[V] aaa:FabricSec 
 
 
 
 ├
[V] aaa:FactoryRole 
 
 
 
 ├
[V] aaa:KafkaAcl 
 
 
 
 ├
[V] aaa:KafkaTopic 
 
 
 
 ├
[V] aaa:LdapGroupMap  The MO represents an LDAP Group Map
 
 
 
 ├
[V] aaa:LdapGroupMapRule  The MO represents an LDAP Group Map Rule The actual Map consisting of Domains and Roles
 
 
 
 ├
[V] aaa:LdapGroupMapRuleRef  The MO points to actual Ldap Rules
 
 
 
 ├
[V] aaa:LoginDomain An AAA login domain for authentication and authorization. The AAA configuration can be configured per domain.
 
 
 
 ├
[V] aaa:PartialRbacRule 
 
 
 
 ├
[V] aaa:ProviderGroup A provider group is a set of providers that will be used by the system during the authentication process. During authentication, all the providers within a provider group are tried in order. If all of the configured servers are unavailable or unreachable, the system manager automatically falls back to the local authentication method using the local username and password.
 
 
 
 
 ├
[V] aaa:DuoProviderGroup  Duo Provider Group
 
 
 
 
 ├
[V] aaa:LdapProviderGroup An LDAP provider group is a group of remote servers supporting the LDAP protocol for authentication.
 
 
 
 
 ├
[V] aaa:RadiusProviderGroup A RADIUS provider group is a group of remote servers supporting the RADIUS protocol for authentication.
 
 
 
 
 ├
[V] aaa:RsaProviderGroup  This MO represents a group of AAA RSA servers.
 
 
 
 
 ├
[V] aaa:SamlProviderGroup  This MO represents a group of AAA SAML servers.
 
 
 
 
 ├
[V] aaa:TacacsPlusProviderGroup A TACACS+ provider group is a group of remote servers supporting the TACACS+ protocol for authentication.
 
 
 
 ├
[V] aaa:ProviderRef A member of an AAA provider group.
 
 
 
 ├
[V] aaa:PwdProfile The password profile contains the information about password constraints that apply to all local users.
 
 
 
 ├
[V] aaa:PwdStrengthProfile 
 
 
 
 ├
[V] aaa:RbacEp This is generated and used only by internal processes.
 
 
 
 ├
[V] aaa:Realm The AAA realm is the security method for processing authentication and authorization requests. The realm allows the protected resources on the associated server to be partitioned into a set of protection spaces, each with its own authentication authorization database. This is an abstract class and cannot be instantiated.
 
 
 
 ├
[V] aaa:Role An AAA role is a set of attributes and privileges that describe what a user is authorized to perform.
 
 
 
 ├
[V] aaa:SamlEncCert 
 
 
 
 ├
[V] aaa:ServiceNode 
 
 
 
 ├
[V] aaa:ServiceNodeCluster 
 
 
 
 ├
[V] aaa:SshAuth A user's public key in PEM format used for certificate-based login.
 
 
 
 ├
[V] aaa:SystemUser The base class for a system user. This is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] aaa:AppUser 
 
 
 
 
 ├
[V] aaa:RemoteUser The remote user login account.
 
 
 
 
 ├
[V] aaa:User A locally-authenticated user account.
 
 
 
 ├
[V] aaa:UserCert An AAA user certificate in X.509 format. This certificate is the RSA public key used for certificate-based REST API calls.
 
 
 
 ├
[V] aaa:UserConf 
 
 
 
 ├
[V] aaa:UserData This object is managed internally and should not be modified by the user.
 
 
 
 ├
[V] aaa:UserDomain The AAA domain to which the user belongs.
 
 
 
 ├
[V] aaa:UserEp A user endpoint is a local user. A user is assigned a role determines the user's privileges, and belongs to a security domain, which determines the user's scope of control
 
 
 
 ├
[V] aaa:UserPreferences  User preferences
 
 
 
 ├
[V] aaa:UserProfile  User profile
 
 
 
 ├
[V] aaa:UserRole The privilege bitmask of a user domain.
 
 
 
 ├
[V] aaa:UserSelf 
 
 
 
 ├
[V] aaa:UserSessionEp  User Login tracking & logout
 
 
 
 ├
[V] aaa:VMMCertificateRule 
 
 
 ├
[V] aaa:DomainRolesTuple This object is managed internally and should not be modified by the user.
 
 
 ├
[V] aaa:FipsState 
 
 
 ├
[V] analytics:ACfgSrv 
 
 
 
 ├
[V] analytics:CfgSrv 
 
 
 ├
[V] analytics:ACluster 
 
 
 
 ├
[V] analytics:Cluster 
 
 
 ├
[V] ap:ContainerPol 
 
 
 ├
[V] ap:DockerContr  Docker Container
 
 
 ├
[V] ap:PluginContr  Plugin Container
 
 
 ├
[V] ap:PluginPol  Deprecated Plugin Policy Info
 
 
 ├
[V] ap:PluginPolContainer  Plugin Policy Container
 
 
 ├
[V] ap:PluginPolContr  Legacy Plugin Policy Container
 
 
 ├
[V] ap:PluginPolicy  Plugin Policy Info
 
 
 ├
[V] ap:UiInfo 
 
 
 ├
[V] auth:BaseUsrAccP 
 
 
 
 ├
[V] auth:UsrAccP 
 
 
 ├
[V] bd:EnforceExceptIp 
 
 
 ├
[V] bd:EnforceExceptionCont 
 
 
 ├
[V] bd:EnforceExpCont 
 
 
 ├
[V] bd:EnforceExpIp 
 
 
 ├
[V] cap:Def A base class for capabilities.
 
 
 
 ├
[V] eqptcap:AMfgDef The manufacturing-related properties such as PID and SKU.
 
 
 
 
 ├
[V] eqptcap:MfgDef The manufacturing-related properties such as PID and SKU.
 
 
 
 
 ├
[V] eqptcap:SfpMfgDef The small form-factor pluggable transceiver (SFP) manufacturing-related properties.
 
 
 
 ├
[V] eqptcap:PhysicalDef Physical properties such as maximum temperature and removal conditions.
 
 
 
 ├
[V] eqptcap:System The system capability provider.
 
 
 ├
[V] cloud:AAwsFlowLogPol 
 
 
 
 ├
[V] cloud:AwsFlowLogPol 
 
 
 
 ├
[V] cloud:AwsFlowLogPolDef 
 
 
 ├
[V] cloud:AAwsLogGroup 
 
 
 
 ├
[V] cloud:AwsLogGroup 
 
 
 
 ├
[V] cloud:AwsLogGroupDef 
 
 
 ├
[V] cloud:ABgpPeerP 
 
 
 
 ├
[V] cloud:BgpPeerP 
 
 
 
 ├
[V] cloud:BgpPeerPDef 
 
 
 ├
[V] cloud:ACidr 
 
 
 
 ├
[V] cloud:Cidr 
 
 
 
 ├
[V] cloud:CidrDef 
 
 
 ├
[V] cloud:ACtxProfile 
 
 
 
 ├
[V] cloud:CtxProfile 
 
 
 
 ├
[V] cloud:CtxProfileDef 
 
 
 ├
[V] cloud:ADomP  Cloud Abstract Domain Profile Def
 
 
 
 ├
[V] cloud:DomP  SHIV TODO: Need to find a propert Super class SHASHANK TODO: Need to add other roles/access besides admin
 
 
 
 ├
[V] cloud:DomPDef  Cloud Domain Profile Def
 
 
 ├
[V] cloud:AExtNetworkP 
 
 
 
 ├
[V] cloud:ExtNetworkP 
 
 
 
 ├
[V] cloud:ExtNetworkPDef 
 
 
 ├
[V] cloud:AHostBootstrapPol 
 
 
 ├
[V] cloud:AHostIfP 
 
 
 
 ├
[V] cloud:HostIfP 
 
 
 
 ├
[V] cloud:HostIfPDef 
 
 
 ├
[V] cloud:AHostRouterPol 
 
 
 
 ├
[V] cloud:HostRouterPol 
 
 
 
 ├
[V] cloud:HostRouterPolDef 
 
 
 ├
[V] cloud:AIntNetworkP 
 
 
 
 ├
[V] cloud:IntNetworkP 
 
 
 
 ├
[V] cloud:IntNetworkPDef 
 
 
 ├
[V] cloud:AIpSecTunnelIfP 
 
 
 
 ├
[V] cloud:IpSecTunnelIfP 
 
 
 
 ├
[V] cloud:IpSecTunnelIfPDef 
 
 
 ├
[V] cloud:AIpv4AddrP 
 
 
 
 ├
[V] cloud:Ipv4AddrP 
 
 
 
 ├
[V] cloud:Ipv4AddrPDef 
 
 
 ├
[V] cloud:AL3IfP 
 
 
 
 ├
[V] cloud:L3IfP 
 
 
 
 ├
[V] cloud:L3IfPDef 
 
 
 ├
[V] cloud:AL3TunnelIfP  IPSec tunnel running on the NIC. The outer tunnel desination address is on-prem IPN router's public address. The tunnel source address is parent interface's primary address.
 
 
 
 ├
[V] cloud:L3TunnelIfP 
 
 
 
 ├
[V] cloud:L3TunnelIfPDef 
 
 
 ├
[V] cloud:AOspfAreaP 
 
 
 
 ├
[V] cloud:OspfAreaP 
 
 
 
 ├
[V] cloud:OspfAreaPDef 
 
 
 ├
[V] cloud:AOspfIfP  Underlay OSPF configuration.
 
 
 
 ├
[V] cloud:OspfIfP 
 
 
 
 ├
[V] cloud:OspfIfPDef 
 
 
 ├
[V] cloud:AProvResP  Base class for provider resource usage limit policies
 
 
 
 ├
[V] cloud:AProvEpSecGrpMaxP  Abstract Provider resource policy to limit SG per Endpoint
 
 
 
 
 ├
[V] cloud:ProvEpSecGrpMaxDef  Provider resource policy to limit SG per Endpoint Resolved model object
 
 
 
 
 ├
[V] cloud:ProvEpSecGrpMaxP  Provider resource policy to limit SG per Endpoint
 
 
 
 ├
[V] cloud:AProvGC  Abstract Provider resource policy for garbage collection
 
 
 
 
 ├
[V] cloud:ProvGC  Provider resource policy for garbage collection
 
 
 
 
 ├
[V] cloud:ProvGCDef  Provider resource policy for garbage collection Resolved model object
 
 
 
 ├
[V] cloud:IntegrationMode  Policy that indicate how is cAPIC managing the provider (Managed Identity / Credential ) Setting backup=no since this policy will contains the VM identity ID, that will be different for any new cAPIC VM. The policy will be autmatically created on cAPIC bringup with the correct ID
 
 
 ├
[V] cloud:AProvider  Cloud Providers Super-Class
 
 
 
 ├
[V] cloud:AAwsProvider  Cloud Abstract Aws Provider
 
 
 
 
 ├
[V] cloud:AwsProvider  only one provider per tenant
 
 
 
 
 ├
[V] cloud:AwsProviderDef 
 
 
 ├
[V] cloud:ARouterP 
 
 
 
 ├
[V] cloud:RouterP 
 
 
 
 ├
[V] cloud:RouterPDef 
 
 
 ├
[V] cloud:ARuleAction 
 
 
 
 ├
[V] cloud:RuleAction 
 
 
 
 ├
[V] cloud:RuleActionDef 
 
 
 
 ├
[V] cloud:RuleActionRef 
 
 
 ├
[V] cloud:ARuleCondition 
 
 
 
 ├
[V] cloud:RuleCondition 
 
 
 
 ├
[V] cloud:RuleConditionDef 
 
 
 
 ├
[V] cloud:RuleConditionRef 
 
 
 ├
[V] cloud:ASvcPol 
 
 
 
 ├
[V] cloud:SvcPolicy 
 
 
 
 ├
[V] cloud:SvcPolicyRef 
 
 
 ├
[V] cloud:AVpnGwPol 
 
 
 
 ├
[V] cloud:VpnGwPol 
 
 
 
 ├
[V] cloud:VpnGwPolDef 
 
 
 ├
[V] cloud:AbsNodeRef 
 
 
 ├
[V] cloud:AzureStatsPol 
 
 
 ├
[V] cloud:AzureStatsPolDef 
 
 
 ├
[V] cloud:Bookeeping 
 
 
 ├
[V] cloud:CtxDefCont 
 
 
 ├
[V] cloud:CtxHolder  Mo that will be used to pull cloudCtxProfileDef from PM to cPE
 
 
 ├
[V] cloud:DefCont  Container for all the cloud:DefCont, under top, to have them neatly organized
 
 
 ├
[V] cloud:Depl 
 
 
 ├
[V] cloud:DeplBy 
 
 
 ├
[V] cloud:DomPHolder 
 
 
 ├
[V] cloud:ProvResPolCont  Container for provider resource usage limit policies
 
 
 ├
[V] cloud:SvcDefCont 
 
 
 ├
[V] cloud:SvcPolicyDef 
 
 
 ├
[V] cloud:TenantSvcDef 
 
 
 ├
[V] cloud:VpnIfP 
 
 
 ├
[V] cloudsec:ACapability  Cloudsec Site Capability exchanged with MSC
 
 
 
 ├
[V] cloudsec:CapabilityLocal  Cloudsec Local Site Capability exchanged with MSC
 
 
 
 ├
[V] cloudsec:CapabilityRemote  Cloudsec Peer Site Capability received from MSC
 
 
 ├
[V] cloudsec:AControl  Cloudsec Site Control exchanged with MSC
 
 
 
 ├
[V] cloudsec:Control  Cloudsec Site Control sent by MSC
 
 
 
 ├
[V] cloudsec:ControlDef  Internal Mo for Resolved Cloudsec Site Control
 
 
 ├
[V] cloudsec:ASaKeyP  Cloudsec Site SaKey Profile exchanged with MSC
 
 
 
 ├
[V] cloudsec:ASaKeyPLocal  Cloudsec Site Local SaKey Profile exchanged with MSC
 
 
 
 
 ├
[V] cloudsec:SaKeyPLocal 
 
 
 
 ├
[V] cloudsec:ASaKeyPRemote  Cloudsec Site Remote SaKey Profile exchanged with MSC
 
 
 
 
 ├
[V] cloudsec:RxSaKeyDef  Internal Mo Resolved Rx SaKey associated to remote site
 
 
 
 
 ├
[V] cloudsec:SaKeyPRemote 
 
 
 ├
[V] cloudsec:ASaKeyStatus  Cloudsec Site SaKey status exchanged with MSC
 
 
 
 ├
[V] cloudsec:ASaKeyStatusLocal  Cloudsec Site Local SaKey status exchanged with MSC
 
 
 
 
 ├
[V] cloudsec:ASpKeySt  Internal Mo for tracking rx key status on spine
 
 
 
 
 
 ├
[V] cloudsec:SpRxKeySt 
 
 
 
 
 
 ├
[V] cloudsec:SpTxKeySt  Internal Mo for tracking tx key status on spine
 
 
 
 
 ├
[V] cloudsec:FabricSpRxKeySt  Internal Mo for tracking rx key status on spine
 
 
 
 
 ├
[V] cloudsec:FabricSpTxKeySt  Internal Mo for tracking tx key status on spine
 
 
 
 
 ├
[V] cloudsec:SaKeyStatusLocal 
 
 
 
 
 ├
[V] cloudsec:SiteRxKeySt  Internal Mo for tracking rx key status on site
 
 
 
 
 ├
[V] cloudsec:SiteTxKeySt  Internal Mo for tracking tx key status on site
 
 
 
 ├
[V] cloudsec:ASaKeyStatusRemote  Cloudsec Site Local SaKey status exchanged with MSC
 
 
 
 
 ├
[V] cloudsec:SaKeyStatusRemote 
 
 
 
 
 ├
[V] cloudsec:TxSaKeyDef  Internal Mo for Resolved Tx SaKey associated to remote site
 
 
 ├
[V] cloudsec:PreSharedKey  Internal Mo for Cloudsec Preshared Key
 
 
 ├
[V] cloudsec:RekeyInfo  Internal MO used to keep track of the information for rekeying
 
 
 ├
[V] cloudsec:SaKeyUsage  Cloudsec Key Usage MO used locally. For internal use, not sent to MSC
 
 
 ├
[V] cloudtemplate:RemoteSite 
 
 
 ├
[V] cloudtemplate:RemoteSitePeer 
 
 
 ├
[V] comm:Definition Definition
 
 
 ├
[V] comm:Pol The communication policy contains the service configuration for various services.
 
 
 ├
[V] comp:APltfmP 
 
 
 
 ├
[V] comp:AVmmPltfmP 
 
 
 
 
 ├
[V] comp:AVmmSecP 
 
 
 
 
 
 ├
[V] vmm:SecP 
 
 
 ├
[V] comp:AccessP An abstract base class for policies related to access credentials.
 
 
 
 ├
[V] comp:UsrAccP The policies for user account credentials.
 
 
 
 
 ├
[V] vmm:UsrAccP The user account profile is used to access a VM provider account.
 
 
 ├
[V] compat:Cat Compatibility Catalog
 
 
 ├
[V] condition:RetP The condition log record retention policy specifies the maximum number of log records to be retained and the maximum number of log records to be deleted in a 30-second period.
 
 
 
 ├
[V] aaa:ARetP The audit log retention policy specifies the maximum number of audit log records to be retained and the maximum number of audit log records to be deleted in a 30-second period. Note that this is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] aaa:CtrlrRetP The controller audit log retention policy specifies the maximum number of controller audit log records to be retained and the maximum number of controller audit log records to be deleted in a 30-second period.
 
 
 
 
 ├
[V] aaa:SwRetP The switch AAA audit log retention policy specifies the maximum number of AAA audit log records to be retained and the maximum number of AAA audit log records to be deleted in a 30-second period.
 
 
 
 ├
[V] event:ARetP The event record retention policy, which specifies the maximum number of event history records to be retained on the node or controller and the maximum number of event history records to be deleted in a 30-second period. Note that this is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] event:CtrlrRetP The controller event record retention policy, which specifies the maximum number of controller event records to be retained and the maximum number of controller event records to be deleted in a 30-second period.
 
 
 
 
 ├
[V] event:SwRetP The switch event retention policy specifies the maximum number of event records to be retained and the maximum number of event records to be deleted in a 30-second period.
 
 
 
 ├
[V] fault:ARetP The fault record retention policy specifies the maximum number of fault history records to be retained on the node or controller and the maximum number of fault history records to be deleted in a 30-second period. Note that this is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] fault:CtrlrRetP The controller fault record retention policy specifies the maximum number of controller fault records to be retained and the maximum number of controller fault records to be deleted in a 30-second period.
 
 
 
 
 ├
[V] fault:SwRetP Specifies the maximum number of fault records to be retained and the maximum number of fault records to be deleted in a 30-second period. These settings can be changed either by creating a custom policy or editing the default policy.
 
 
 
 ├
[V] health:ARetP The health score history record retention policy, which specifies the maximum health score history record count to delete in a 30-second period. Note that this is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] health:CtrlrRetP The controller health score history record retention policy, which specifies the maximum number of controller health score history records to be retained and the maximum number of controller health score history records to be deleted in a 30-second period.
 
 
 
 
 ├
[V] health:SwRetP The switch health retention policy specifies the maximum number of health score history records to be retained and the maximum number of health score history records to be deleted in a 30-second period.
 
 
 ├
[V] configpush:ForcePush  MO used to force the re-configuration. scopeDn is the root of the subtree to re-configure.
 
 
 ├
[V] copp:AProfile  Abstract class for all the profiles for CoPP that can be applied at the node level
 
 
 
 ├
[V] copp:LeafProfile  CoPP policy that can be applied at LEAF nodes
 
 
 
 ├
[V] copp:SpineProfile  CoPP policy that can be applied at SPINE nodes
 
 
 ├
[V] datetime:APol The date time policy is based on international time zones and a defined NTP server. Before configuring a date and time policy under a domain group, this policy must first be created. Policies under the Domain Groups root were already created by the system and ready to configure.
 
 
 
 ├
[V] datetime:ClkPol Represents the date/time clock policy information.
 
 
 
 ├
[V] datetime:Pol The date time policy is based on international time zones and a defined NTP server. Before configuring a date and time policy under a domain group, this policy must first be created. Policies under the Domain Groups root were already created by the system and ready to configure.
 
 
 ├
[V] datetime:Format The date/time format policy defines the time-zone for the entire fabric.
 
 
 ├
[V] dbg:Ftriage  ****************** MOs ********************* Ftriage MO
 
 
 ├
[V] dbg:OngoingAcMode 
 
 
 ├
[V] dbgac:AFilter The abstract atomic counter filter.
 
 
 
 ├
[V] dbgac:Filter The filter properties of the client-defined end point attached to the network.
 
 
 
 ├
[V] dbgac:FilterSummary The filter summary.
 
 
 ├
[V] dbgac:EpSummary The atomic counter endpoint summary.
 
 
 
 ├
[V] dbgac:FromEpSummary From endpoint summary.
 
 
 
 ├
[V] dbgac:ToEpSummary The atomic counter destination endpoint summary.
 
 
 ├
[V] dbgac:EpgSummary The atomic counter endpoint group summary managed object.
 
 
 
 ├
[V] dbgac:FromEpgSummary From endpoint group summary.
 
 
 
 ├
[V] dbgac:ToEpgSummary The atomic counter destination endpoint group summary.
 
 
 ├
[V] dbgac:TenantSpaceCmn Tenant Space common policy definition.
 
 
 
 ├
[V] dbgac:EpgCmn The endpoint group common.
 
 
 
 
 ├
[V] dbgac:FromEpgCmn The abstract object with the Source Endpoint Group.
 
 
 
 
 
 ├
[V] dbgac:EpgToEp The endpoint group-to-endpoint atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 
 
 
 ├
[V] dbgac:EpgToEpg The endpoint group-to-endpoint group atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 
 
 
 ├
[V] dbgac:EpgToIp The endpoint group-to-IP atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues
 
 
 
 
 ├
[V] dbgac:ToEpgCmn The abstract object with a destination endpoint group.
 
 
 
 
 
 ├
[V] dbgac:EpToEpg The endpoint-to-endpoint group atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 
 
 
 ├
[V] dbgac:IpToEpg The IP-to-endpoint group atomic counter policy detects drops and misrouting in the fabric and enables quick debugging and isolation of application connectivity issues.
 
 
 
 ├
[V] dbgac:FromEpCmn From endpoint common.
 
 
 
 
 ├
[V] dbgac:EpToAny The endpoint-to-any atomic counter policy which detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 
 
 ├
[V] dbgac:EpToEp The endpoint-to-endpoint atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 
 
 ├
[V] dbgac:EpToExt The endpoint-to-external IP address atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 
 ├
[V] dbgac:IpToIp  IP Addr to IP policy Defn. Used for an external host identified by its IP address to another IP address
 
 
 
 ├
[V] dbgac:TenantSpaceCmnDef The tenant space common definition. This atomic counter managed object is used internally for managing Epg/Epp source and destination policies.
 
 
 
 ├
[V] dbgac:ToEpCmn The abstract object for atomic counter with a destination endpoint.
 
 
 
 
 ├
[V] dbgac:AnyToEp Atomic counters detect drops and misrouting in the fabric enables quick debugging and isolation of application connectivity issues.
 
 
 
 
 ├
[V] dbgac:ExtToEp The external host-to-endpoint atomic counter policy detects drops and misrouting in the fabric to enable quick debugging and isolation of application connectivity issues.
 
 
 ├
[V] dhcp:BootStrapLoader 
 
 
 ├
[V] dhcp:OptionPol The DHCP option policy, which defines lease duration, gateway routers, and other configuration parameters in what are called DHCP options. Every DHCP server must have one or more policies defined for it. The policies are especially useful if you have multiple scopes because you only need to define a policy once and apply it to the multiple scopes. You can define named policies with specific option definitions or you can use system defaults. Note...
 
 
 ├
[V] dhcp:ProvAddrDef The Provider Address Definition.
 
 
 ├
[V] eqptdiagp:GrpTests The diagnostic group to diagnostic test mappings.
 
 
 ├
[V] eqptdiagp:Pol The abstract diagnostic policy for fabric nodes.
 
 
 
 ├
[V] eqptdiagp:BootPol The bootup policy information.
 
 
 
 ├
[V] eqptdiagp:HealthPol The health tests statistics.
 
 
 
 
 ├
[V] eqptdiagp:CardHealthPol The card health tests.
 
 
 
 
 ├
[V] eqptdiagp:NodeHealthPol The node health tests.
 
 
 
 
 ├
[V] eqptdiagp:PortHealthPol The port health tests.
 
 
 ├
[V] eqptdiagp:TestSet An abstract diagnostics policy for fabric nodes.
 
 
 
 ├
[V] eqptdiagp:TestSetBoot A bootup abstract diagnostic policy for fabric nodes.
 
 
 
 
 ├
[V] eqptdiagp:LeTsBtEcc The diagnostic test set for leaf fabric nodes to run at bootup on extended chassis cards (FEXes).
 
 
 
 
 ├
[V] eqptdiagp:LeTsBtLc The diagnostic test set for leaf fabric nodes to run at bootup on line cards (I/O cards).
 
 
 
 
 ├
[V] eqptdiagp:LeTsBtSc The diagnostic test set for leaf fabric nodes to run at bootup on supervisor cards.
 
 
 
 
 ├
[V] eqptdiagp:PortTestSetBt The boot abstract diagnostic policy for ports.
 
 
 
 
 
 ├
[V] eqptdiagp:TsBtExtChFP 
 
 
 
 
 
 ├
[V] eqptdiagp:TsBtExtChHP 
 
 
 
 
 
 ├
[V] eqptdiagp:TsBtFabP The diagnostic tests for fabric ports at bootup.
 
 
 
 
 
 ├
[V] eqptdiagp:TsBtLeafP The diagnostic test set for leaf fabric ports to run at bootup on line cards (I/O cards).
 
 
 
 
 ├
[V] eqptdiagp:SpTsBtFc The diagnostic test set to run at bootup on spine fabric cards.
 
 
 
 
 ├
[V] eqptdiagp:SpTsBtLc The diagnostic test set to run at bootup on spine line cards (I/O cards).
 
 
 
 
 ├
[V] eqptdiagp:SpTsBtSc The diagnostic test set to run at bootup on spine supervisor cards.
 
 
 
 
 ├
[V] eqptdiagp:SpTsBtScc The diagnostic test set to run at bootup on spine system controller cards.
 
 
 
 
 ├
[V] eqptdiagp:TestSetOd An on-demand abstract diagnostic policy for fabric nodes.
 
 
 
 
 
 ├
[V] eqptdiagp:CardTestSetOd The on-demand abstract diagnostic policy for cards.
 
 
 
 
 
 
 ├
[V] eqptdiagp:ExtChCardTsOd An on-demand diagnostic policy for extended chassis cards.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:LeTsOdEcc The diagnostic test set for leaf fabric nodes to run on extended chassis cards (FEXes).
 
 
 
 
 
 
 ├
[V] eqptdiagp:FcTsOd An on-demand abstract diagnostic policy for fabric cards.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:SpTsOdFc The diagnostic on-demand test set to run on spine fabric cards.
 
 
 
 
 
 
 ├
[V] eqptdiagp:LcTsOd An on-demand abstract diagnostic policy for line cards.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:LeTsOdLc The diagnostic on-demand test set for leaf fabric nodes to run on line cards (I/O cards).
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:SpTsOdLc The diagnostic on-demand test set to run on spine line cards (I/O cards).
 
 
 
 
 
 
 ├
[V] eqptdiagp:SupCTsOd The on-demand abstract diagnostic policy for supervisor cards.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:LeTsOdSc The diagnostic on-demand test set for leaf fabric nodes to run on supervisor cards.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:SpTsOdSc The diagnostic on-demand test set for leaf fabric nodes to run on spine supervisor cards.
 
 
 
 
 
 
 ├
[V] eqptdiagp:SysCTsOd The on-demand abstract diagnostic policy for system controller cards.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:SpTsOdScc The diagnostic on-demand test set to run on spine system controller cards.
 
 
 
 
 
 ├
[V] eqptdiagp:PortTestSetOd The abstract classes for port-level diagnostic policies.
 
 
 
 
 
 
 ├
[V] eqptdiagp:FpTsOd The on-demand abstract diagnostic policy for fabric ports.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:TsOdFabP The diagnostic on-demand test set for fabric ports.
 
 
 
 
 
 
 ├
[V] eqptdiagp:LpTsOd An on-demand abstract diagnostic policy for leaf ports.
 
 
 
 
 
 
 
 ├
[V] eqptdiagp:TsOdLeafP The diagnostic on-demand test set to run on leaf fabric ports.
 
 
 
 ├
[V] eqptdiagp:TestSetHealth An abstract health diagnostic policy for fabric nodes.
 
 
 
 
 ├
[V] eqptdiagp:LeTsHlEcc The diagnostic test set for leaf fabric nodes to run on extended chassis cards (FEXes).
 
 
 
 
 ├
[V] eqptdiagp:LeTsHlLc The diagnostic ongoing health test set for leaf fabric nodes to run on line cards (I/O cards).
 
 
 
 
 ├
[V] eqptdiagp:LeTsHlSc The ongoing diagnostic health test set for leaf fabric nodes to run on supervisor cards.
 
 
 
 
 ├
[V] eqptdiagp:PortTestSetHl The health abstract diagnostic policy for ports.
 
 
 
 
 
 ├
[V] eqptdiagp:TsHlExtChFP 
 
 
 
 
 
 ├
[V] eqptdiagp:TsHlExtChHP 
 
 
 
 
 
 ├
[V] eqptdiagp:TsHlFabP The ongoing diagnostic health test set for fabric ports.
 
 
 
 
 
 ├
[V] eqptdiagp:TsHlLeafP The ongoing diagnostic tests for leaf fabric ports.
 
 
 
 
 ├
[V] eqptdiagp:SpTsHlFc The ongoing diagnostic health test set to run at bootup on spine fabric cards.
 
 
 
 
 ├
[V] eqptdiagp:SpTsHlLc The ongoing diagnostic health test set to run at bootup on spine line cards (I/O cards).
 
 
 
 
 ├
[V] eqptdiagp:SpTsHlSc The ongoing diagnostic health test set to run at bootup on spine supervisor cards.
 
 
 
 
 ├
[V] eqptdiagp:SpTsHlScc The ongoing diagnostic health test set to run at bootup on spine system controller cards.
 
 
 ├
[V] equipment:FlashConfigPol 
 
 
 ├
[V] fabric:AONodeS  Abstract Override Node Override Selector
 
 
 
 ├
[V] fabric:OLeafS  Override Leaf Selector
 
 
 
 ├
[V] fabric:OSpineS  Override Spine Selector
 
 
 
 ├
[V] infra:AONodeS  Abstract Override Node Override Selector
 
 
 
 
 ├
[V] infra:OLeafS  Override Leaf Selector
 
 
 
 
 ├
[V] infra:OSpineS  Override Spine Selector @@@ Its not configurable because theres no spine policy group in infra.
 
 
 ├
[V] fabric:APathS 
 
 
 
 ├
[V] fabric:LFPathS 
 
 
 
 ├
[V] fabric:SFPathS 
 
 
 
 ├
[V] infra:APathS  Leaf & FEX Host Path Selector
 
 
 
 
 ├
[V] infra:HPathS 
 
 
 
 
 ├
[V] infra:SHPathS  Spine Host Path Selector
 
 
 ├
[V] fabric:APolGrp An abstraction of a policy group.
 
 
 
 ├
[V] fabric:PolGrp A policy group.
 
 
 
 
 ├
[V] fabric:ACardPGrp An abstraction of card policy groups
 
 
 
 
 
 ├
[V] fabric:LeCardPGrp A leaf card policy group enables you to apply policies to a group of leaf cards.
 
 
 
 
 
 ├
[V] fabric:SpCardPGrp A spine card policy group enables you to apply policies to a group of spine cards.
 
 
 
 
 ├
[V] fabric:ANodePGrp An abstraction of node policy groups.
 
 
 
 
 
 ├
[V] fabric:LeNodePGrp A leaf node policy group enables you to apply policies to a group of leaf nodes.
 
 
 
 
 
 ├
[V] fabric:SpNodePGrp A spine node policy group enables you to apply policies to a group of spine nodes.
 
 
 
 
 ├
[V] fabric:APortPGrp An abstraction of the port policy groups.
 
 
 
 
 
 ├
[V] fabric:LeAPortPGrp A base class for leaf port policy group.
 
 
 
 
 
 
 ├
[V] fabric:LeBrkoutPortGrp  Leaf Fabric Breakout Port Group
 
 
 
 
 
 
 ├
[V] fabric:LePortPGrp The leaf port policy group enables you to apply policies to a group of leaf ports.
 
 
 
 
 
 ├
[V] fabric:SpAPortPGrp A base class for a spine port policy group. This is used for specifying policies to be applied to the spine ports consuming this policy group.
 
 
 
 
 
 
 ├
[V] fabric:SpBrkoutPortGrp  Spine Fabric Breakout Port Group
 
 
 
 
 
 
 ├
[V] fabric:SpPortPGrp A spine port policy group enables you to apply policies to a group of spine ports.
 
 
 
 
 ├
[V] fabric:CtrlrPGrp The controller policy group enables you to apply policies to a group of controllers.
 
 
 
 
 ├
[V] fabric:PodPGrp A POD policy group enables you to apply policies to the leaf nodes that are part of this POD.
 
 
 
 ├
[V] infra:PolGrp An infra policy group.
 
 
 
 
 ├
[V] infra:AccBaseGrp An abstraction of the access policy group.
 
 
 
 
 
 ├
[V] infra:AAccGrp  Abstraction of AccGrp
 
 
 
 
 
 
 ├
[V] infra:AccGrp An abstraction of the port functions.
 
 
 
 
 
 
 
 ├
[V] infra:AAccBndlGrp 
 
 
 
 
 
 
 
 
 ├
[V] infra:AccBndlGrp The bundle interface group enables you to specify the interface policy you want to use.
 
 
 
 
 
 
 
 
 ├
[V] infra:AccBndlPolGrp 
 
 
 
 
 
 
 
 ├
[V] infra:AccPortGrp The interface policy group enables you to specify the interface policies you want to use.
 
 
 
 
 
 
 ├
[V] infra:SpAccGrp  Used for respresenting the spine port functions
 
 
 
 
 
 
 
 ├
[V] infra:SpAccPortGrp  Used for respresting the spine singular ports
 
 
 
 
 
 ├
[V] infra:AccBndlSubgrp The access bundle subgroup enables you to specify (override) a different LACP member policy name for some of the interfaces that are part of an access bundle group.
 
 
 
 
 
 ├
[V] infra:BrkoutPortGrp  Leaf Breakout Port Group
 
 
 
 
 
 ├
[V] infra:FcAccGrp  Used for respresenting the leaf FC port functions
 
 
 
 
 
 
 ├
[V] infra:AFcAccBndlGrp  Used for representing the leaf FC port-channel functions
 
 
 
 
 
 
 
 ├
[V] infra:FcAccBndlGrp  Used for representing leaf FC port-channels
 
 
 
 
 
 
 
 ├
[V] infra:FcAccBndlPolGrp  Used for FC Port Channel overrides
 
 
 
 
 
 
 ├
[V] infra:FcAccPortGrp  Used for representing leaf singular FC ports
 
 
 
 
 
 ├
[V] infra:FexGrp An abstraction of a FEX policy group.
 
 
 
 
 
 
 ├
[V] infra:FexBndlGrp The fabric extender bundled ports.
 
 
 
 
 ├
[V] infra:AccCardPGrp The module policy group enables you to specify the module policies you want to use.
 
 
 
 
 ├
[V] infra:AccNodePGrp The node policy group enables you to specify the node policies you want to use.
 
 
 
 
 ├
[V] infra:SpineAccNodePGrp  Used for Spine grouping node policies
 
 
 ├
[V] fabric:AProfile An abstraction of a profile.
 
 
 
 ├
[V] fabric:Profile A profile.
 
 
 
 
 ├
[V] fabric:CardP The template used for deploying card fabric configuration.
 
 
 
 
 
 ├
[V] fabric:LeCardP The leaf card profile is a template used for deploying the card fabric configuration on a leaf.
 
 
 
 
 
 ├
[V] fabric:SpCardP A spine card profile is used for deploying the card configuration on the spine.
 
 
 
 
 ├
[V] fabric:CtrlrP The controller profile. This object represents the template used for deploying controller-level configuration.
 
 
 
 
 ├
[V] fabric:FuncP The port functions.
 
 
 
 
 ├
[V] fabric:NodeP The node profile. This is the template used for deploying node fabric configuration.
 
 
 
 
 
 ├
[V] fabric:LeafP The leaf profile is a template used for deploying the leaf fabric configuration. It contains leaf selectors and associates to card and port profiles.
 
 
 
 
 
 ├
[V] fabric:SpineP The spine profile is a template used for deploying the leaf fabric configuration. It contains spine selectors and associates to card and port profiles.
 
 
 
 
 ├
[V] fabric:PodP A POD profile. This is a template used for deploying POD level configuration.
 
 
 
 
 ├
[V] fabric:PortP A port policy.
 
 
 
 
 
 ├
[V] fabric:LePortP The leaf fabric port profile contains leaf port selectors that can associate with their respective policy groups.
 
 
 
 
 
 ├
[V] fabric:SpPortP A spine port profile contains leaf port selectors that can associate with their respective policy groups.
 
 
 
 ├
[V] infra:Profile An abstraction of the access policy group.
 
 
 
 
 ├
[V] infra:ANodeP  Node Profile: It represents the template used for deploying node fabric configuration
 
 
 
 
 
 ├
[V] infra:NodeP The node profile enables you to specify which nodes (Example: a leaf) to configure.
 
 
 
 
 
 ├
[V] infra:SpineP  Spine Profile Spine Access Policy: It represents the template used for deploying node access configuration (ex. Configuration for connecting hypervisor, Fex, External network )
 
 
 
 
 ├
[V] infra:AccCardP The module profile enables you to specify the modules you want to configure.
 
 
 
 
 ├
[V] infra:AttEntityP The attached entity profile provides a template to deploy hypervisor policies on a large set of leaf ports. This also provides the association of a Virtual Machine Management (VMM) domain and the physical network infrastructure.
 
 
 
 
 ├
[V] infra:FexP The FEX profile enables you to configure FEX interfaces.
 
 
 
 
 ├
[V] infra:FuncP The hypervisor management function provides the policies used for hypervisor management and connectivity. For example, an endpoint group and encap VLAN.
 
 
 
 
 ├
[V] infra:PodP  Pod Profile: It represents the template used for deploying POD level configuration
 
 
 
 
 ├
[V] infra:PortP  Interface Profile
 
 
 
 
 
 ├
[V] infra:AccPortP The interface profile enables you to specify the interface you want to configure.
 
 
 
 
 
 ├
[V] infra:SpAccPortP  Spine Interface Profile
 
 
 ├
[V] fabric:AProtPol An abstraction of the protection policy.
 
 
 
 ├
[V] fabric:IPV4ProtPol The spine IPV4 protection policy.
 
 
 
 ├
[V] fabric:IPV6ProtPol The spine IPV6 protection policy.
 
 
 
 ├
[V] fabric:MACProtPol The spine MAC protection policy.
 
 
 
 ├
[V] fabric:ProtPol The VPC protection policy is a container of VPC protection groups; it enables you to select a pairing type for creating the protection groups
 
 
 ├
[V] fabric:Def A base class for fabric policies.
 
 
 
 ├
[V] fabric:ACardS An abstraction of the fabric card selector.
 
 
 
 
 ├
[V] fabric:CardS An abstraction of a fabric card selector.
 
 
 
 
 
 ├
[V] fabric:LeCardS The leaf card selector policy information.
 
 
 
 
 
 ├
[V] fabric:SpCardS A card selector. This is a range of cards on the spine.
 
 
 
 
 ├
[V] infra:CardS The module selector enables you to select the modules to configure and the configuration method.
 
 
 
 ├
[V] fabric:Selector An abstraction of selectors.
 
 
 
 
 ├
[V] fabric:ANodeS An abstraction of the fabric node and access node selectors.
 
 
 
 
 
 ├
[V] fabric:NodeGrp A node group.
 
 
 
 
 
 
 ├
[V] condition:NodePolGrp The node policy group is a group of nodes to which Fault, Event, Audit, or Health record retention policies can be applied.
 
 
 
 
 
 
 ├
[V] firmware:FwGrp A firmware group is a set of nodes to which a firmware policy may be applied.
 
 
 
 
 
 
 ├
[V] maint:MaintGrp The maintenance group is a set of nodes to which a maintenance policy may be applied. The maintenance policy determines the pre-defined action to take when there is a disruptive change made to the service profile associated with the node group.
 
 
 
 
 
 
 ├
[V] telemetry:FlowServerGrp  Telemtry Flow Server Group. A set of nodes to which a telemetry filter policy may be applied.
 
 
 
 
 
 
 ├
[V] telemetry:LogServerGrp  Telemtry Log Group. A set of nodes to which a telemetry log policy may be applied.
 
 
 
 
 
 
 ├
[V] telemetry:StatsServerGrp  Telemtry Log Group. A set of nodes to which a telemetry log policy may be applied.
 
 
 
 
 
 ├
[V] fabric:NodeS An abstraction of fabric node selector
 
 
 
 
 
 
 ├
[V] fabric:LeafS The leaf selector. This enables you to select all or a range of leaves.
 
 
 
 
 
 
 ├
[V] fabric:SpineS The spine selector. This enables you to select all or a range of spines.
 
 
 
 
 
 ├
[V] infra:ANodeS An abstraction of an infra node selector.
 
 
 
 
 
 
 ├
[V] infra:ConnNodeS The connectivity selector is used for grouping ports between the FEX and the host (such as hypervisor).
 
 
 
 
 
 
 ├
[V] infra:NodeGrp The node group.
 
 
 
 
 
 
 
 ├
[V] dhcp:NodeGrp The DHCP Node Group.
 
 
 
 
 
 
 
 ├
[V] infrazone:NodeGrp  Infrastructure Zone Node Group: Used for listing member nodes of the zone
 
 
 
 
 
 
 
 ├
[V] mgmt:NodeGrp The managed node group captures the set of nodes that will participate in the management network. All the nodes, a range of nodes, or a specific node can be selected to participate in a given managed node group.
 
 
 
 
 
 
 ├
[V] infra:NodeS  Node Selector
 
 
 
 
 
 
 
 ├
[V] infra:LeafS The leaf selector enables you to select the interface to configure.
 
 
 
 
 
 
 
 ├
[V] infra:SpineS  Spine Selector
 
 
 
 
 ├
[V] fabric:APodS  Abstract POD Selector
 
 
 
 
 
 ├
[V] fabric:PodGrp  Node Group
 
 
 
 
 
 
 ├
[V] condition:PodPolGrp  A set of PODs to which a set of Fault/Event/Audit/Health policies may be applied.
 
 
 
 
 
 
 ├
[V] firmware:PodFwGrp  POD Firmware Group. A set of PODS to which a firmware policy may be applied.
 
 
 
 
 
 
 ├
[V] maint:PodMaintGrp  POD Maintenance Group. A set of PODs to which a maintenance policy may be applied.
 
 
 
 
 
 
 ├
[V] telemetry:PodLogServerGrp  POD Telemetry Group. A set of PODs to which a telemetry log policy may be applied.
 
 
 
 
 
 ├
[V] fabric:PodS The POD selector enables you to select all or a range of PODs.
 
 
 
 
 
 ├
[V] infra:PodGrp  Abstract Infra Pod Group
 
 
 
 
 
 
 ├
[V] dhcp:PodGrp  DHCP POD Group
 
 
 
 
 
 
 ├
[V] infrazone:PodGrp  POD Group
 
 
 
 
 
 
 ├
[V] mgmt:PodGrp 
 
 
 
 
 
 ├
[V] infra:PodS  POD Selector
 
 
 
 
 ├
[V] fabric:APortS An abstraction of the fabric port selector and access port selector.
 
 
 
 
 
 ├
[V] fabric:PortS An abstraction of a fabric port selector.
 
 
 
 
 
 
 ├
[V] fabric:LFPortS The leaf fabric port selector. This object enables you to specify leaf fabric ports with your leaf fabric port profile.
 
 
 
 
 
 
 ├
[V] fabric:SFPortS The spine fabric port selector. This enables you to specify spine fabric ports with your spine fabric port profile.
 
 
 
 
 
 ├
[V] infra:PortS An abstraction of access interface selectors.
 
 
 
 
 
 
 ├
[V] infra:ConnFexS The Connectivity FEX selector is used for grouping ports between the FEX and the host (such as a hypervisor).
 
 
 
 
 
 
 ├
[V] infra:HConnPortS The host connectivity port selector is used for grouping ports between the node and the host (such as hypervisor).
 
 
 
 
 
 
 ├
[V] infra:HPortS The Host Port Selector is used for grouping ports between the node and the host (such as hypervisor).
 
 
 
 
 
 
 ├
[V] infra:SHPortS  Spine Host/Access Port Selector. This selector is used for applying infrastructure policies on selected ports
 
 
 
 
 ├
[V] fabric:CtrlrS The fabric controller group is made up of a core and a tech support export policy.
 
 
 
 ├
[V] hvs:ExtPol The extended policies, which are common policies for VM interfaces. For example, when implementing VMware, this represents the distributed virtual port group.
 
 
 
 ├
[V] hvs:StdExtPol  Represents standard port group in vmware
 
 
 ├
[V] fabric:DeployPol  Deployment Policy
 
 
 ├
[V] fabric:ExtPol The configuration of the extended fabric equipment, such as FEX.
 
 
 ├
[V] fabric:ExtRoutableAnycastIp 
 
 
 ├
[V] fabric:ExtRoutableMcastIp 
 
 
 ├
[V] fabric:ExtRoutableRemoteLeafMcastIp 
 
 
 ├
[V] fabric:ExtRoutableSubnetCont 
 
 
 ├
[V] fabric:MaintPol The maintenance policy. This is used for listing blacklisted or inactive devices.
 
 
 
 ├
[V] fabric:BlacklistPol The blacklist policy.
 
 
 
 ├
[V] fabric:OOServicePol The service policy. This is used for listing equipment under maintenance.
 
 
 ├
[V] fabric:NodeControl  Fabric Node Control: It represents if the type is digital monitoring
 
 
 ├
[V] fabric:NodeIdentPol A container for the node identity profile.
 
 
 ├
[V] fabric:ProtChainP A node proxy IP profile. This is an implicit profile used for managing spine proxy IP addresses.
 
 
 ├
[V] fabric:ProtoPol A base class for protocol policies.
 
 
 
 ├
[V] fabric:IntfPol An abstraction of the interface policy.
 
 
 
 
 ├
[V] fabric:HIfPol The host interface policy specifies the layer 1 parameters of host facing ports.
 
 
 
 ├
[V] fabric:L2ProtoPol A base class for layer 2 protocol policies.
 
 
 
 ├
[V] fabric:L3ProtoPol A base class for layer 3 protocol policies.
 
 
 
 
 ├
[V] bgp:APeerPfxPol The abstraction of a peer prefix policy.
 
 
 
 
 
 ├
[V] bgp:PeerPfxPol The peer prefix policy defines how many prefixes can be received from a neighbor and the action to take when the number of allowed prefixes is exceeded. This feature is commonly used for external BGP peers, but can also be applied to internal BGP peers.
 
 
 
 
 ├
[V] bgp:ARtTarget  Abstraction of BGP Route Target
 
 
 
 
 
 ├
[V] bgp:RtTarget  BGP Route Target
 
 
 
 
 
 ├
[V] bgp:RtTargetDef  BGP Route Target Definition
 
 
 
 
 ├
[V] bgp:ARtTargetInstrP  Abstracttion of BGP Route Target Instrumentation Profile
 
 
 
 
 
 ├
[V] bgp:RtTargetInstrP  BGP Route Target Instrumentation Profile
 
 
 
 
 
 ├
[V] bgp:RtTargetInstrPDef  BGP Route Target Instrumentation Profile Definition
 
 
 
 
 ├
[V] bgp:ARtTargetP  Abstraction of BGP Route Target Profile
 
 
 
 
 
 ├
[V] bgp:AutoRtTargetPDef  BGP Automatic Route Target Profile Definition
 
 
 
 
 
 ├
[V] bgp:RtTargetP  BGP Route Target Profile
 
 
 
 
 
 ├
[V] bgp:RtTargetPDef  BGP Route Target Profile Definition
 
 
 
 
 ├
[V] coop:Pol The COOP policy contains groups of Oracles nodes and COOP repositories.
 
 
 
 
 ├
[V] l3ext:AFabricExtRoutingP  Abstraction of Fabric External Routing Profile
 
 
 
 
 
 ├
[V] l3ext:FabricExtRoutingP  Fabric External Routing Profile
 
 
 
 
 
 ├
[V] l3ext:FabricExtRoutingPDef  Fabric External Routing Profile Definition
 
 
 
 
 ├
[V] l3ext:ARouteTagPol The route tag policy.
 
 
 
 
 
 ├
[V] l3ext:RouteTagDef Definition of Route Tag Policy
 
 
 
 
 
 ├
[V] l3ext:RouteTagPol A route tag is used to assign a number to identify the policy.
 
 
 
 ├
[V] fabric:ProtoDomPol A base class for context-level protocol policies.
 
 
 
 
 ├
[V] fabric:L2DomPol A base class for layer 2 context-level policies.
 
 
 
 
 
 ├
[V] fv:AEpRetPol Abstract of an endpoint retention policy.
 
 
 
 
 
 
 ├
[V] fv:EpRetDef An endpoint retention definition.
 
 
 
 
 
 
 ├
[V] fv:EpRetPol The endpoint retention policy provides the parameters for the lifecycle of the endpoints.
 
 
 
 
 
 ├
[V] igmp:ASnoopPol Restricts flooding of multicast traffic by sending multicast traffic only to the bridge domains that are subscribed to a particular multicast group.
 
 
 
 
 
 
 ├
[V] igmp:SnoopDef The process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams.
 
 
 
 
 
 
 ├
[V] igmp:SnoopPol The IGMP snooping policy streamlines multicast traffic handling for VLANs. By examining (snooping) IGMP membership report messages from interested hosts, multicast traffic is limited to the subset of VLAN interfaces on which the hosts reside.
 
 
 
 
 
 ├
[V] mld:ASnoopPol  MLD Snoop policy Per BD
 
 
 
 
 
 
 ├
[V] mld:SnoopDef The process of listening to Multicast Listener Discovery (MLD) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams.
 
 
 
 
 
 
 ├
[V] mld:SnoopPol The MLD snooping policy streamlines multicast traffic handling for VLANs. By examining (snooping) MLD membership report messages from interested hosts, multicast traffic is limited to the subset of VLAN interfaces on which the hosts reside.
 
 
 
 
 ├
[V] fabric:L3DomPol A base class for layer 3 context-level policies.
 
 
 
 
 
 ├
[V] fabric:L3CtxPol A base class for layer 3 context-level policies.
 
 
 
 
 
 
 ├
[V] bgp:ACtxAfPol The BGP address family context policy.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxAfDef The BGP address family context definition.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxAfPol 
 
 
 
 
 
 
 ├
[V] bgp:ACtxPol The context-level BGP policy.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxDef An internal object for the BGP context-level policy definition.
 
 
 
 
 
 
 
 ├
[V] bgp:CtxPol The BGP timers policy uses timers to control periodic activities such as the frequency keepalive messages that are sent to its peer, the amount of time the system waits to declare a peer dead after keepalive messages stop being received, and the amount of time before restarting a dead peer. The BGP timer policy enables you to specify the intervals for the periodic activities and supplies two options for graceful restart control: the graceful rest...
 
 
 
 
 
 
 
 ├
[V] bgp:NodeCtxDef  Node-level bgp definition
 
 
 
 
 
 
 ├
[V] eigrp:ACtxAfPol The abstraction of the context-level EIGRP policy, which contains the configuration for an address family on a context on the node. The EIGRP policy is configured under the tenant protocol policies and can be applied to one or more contexts (private domains) under the tenant. The EIGRP context policy can be enabled on a context through a relation in the context per address family. If there is no relation to a given address family, or the EIGRP c...
 
 
 
 
 
 
 
 ├
[V] eigrp:CtxAfDef The context-level EIGRP address family definition.
 
 
 
 
 
 
 
 ├
[V] eigrp:CtxAfPol An EIGRP context policy can be applied on one or more contexts under the tenant. EIGRP context policies can be enabled on a context through a relation in the context per address family. If there is no relation to a given address family such as IPv6 or the EIGRP context policy mentioned in the relation doesn't exist, then the default context policy created under Tenant Common will be used for that address family.
 
 
 
 
 
 
 ├
[V] hsrp:AGroupPol  hsrp group abstraction policy
 
 
 
 
 
 
 
 ├
[V] hsrp:GroupPol  Hsrp Group Policy
 
 
 
 
 
 
 ├
[V] ipmc:ACtxPol  Abstraction of Context-level Routed Multicast policy
 
 
 
 
 
 
 
 ├
[V] igmp:CtxDef  Context-level IGMP definition
 
 
 
 
 
 
 
 ├
[V] igmp:CtxP  Context-level IGMP policy
 
 
 
 
 
 
 ├
[V] ospf:ACtxPol The OSPF policy information.
 
 
 
 
 
 
 
 ├
[V] ospf:CtxDef The context-level OSPF definition.
 
 
 
 
 
 
 
 ├
[V] ospf:CtxDefAf The context-level OSPF definition per address family.
 
 
 
 
 
 
 
 ├
[V] ospf:CtxPol The context-level OSPF timer policy provides the Hello timer and Dead timer intervals configuration.
 
 
 
 
 
 
 ├
[V] rtdmc:ACtxPol  Abstraction of Context-level Routed Multicast policy
 
 
 
 
 
 
 
 ├
[V] pim:CtxDef Context-level PIM definition.
 
 
 
 
 
 
 
 ├
[V] pim:CtxP Context-level PIM policy.
 
 
 
 
 
 
 
 ├
[V] pim:IPV6CtxDef  Context-level PIM definition
 
 
 
 
 
 
 
 ├
[V] pim:IPV6CtxP  Context-level PIM policy
 
 
 
 
 
 ├
[V] isis:DomPol The domain policy is used to configure IS-IS domain specific properties.
 
 
 
 ├
[V] fabric:ProtoIfPol A base class for interface-level protocol policies.
 
 
 
 
 ├
[V] fabric:L1IfPol 
 
 
 
 
 
 ├
[V] stormctrl:IfPol The storm control interface policy. A traffic storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. You can use the traffic storm control feature to prevent disruptions on ports by a broadcast, multicast, or unknown unicast traffic storm on physical interfaces.
 
 
 
 
 ├
[V] fabric:L2IfPol A base class for layer 2 interface-level policies.
 
 
 
 
 
 ├
[V] cdp:AIfPol The CDP Interface Policy parameters. CDP is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. CDP can also be used to display information about the interfaces your router uses. CDP is media- and protocol-independent, and runs on all Cisco-manufactured equipment including routers, bridges, access servers, and switches.
 
 
 
 
 
 
 ├
[V] cdp:IfPol The CDP interface policy, which is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. CDP can also be used to display information about the interfaces your router uses. CDP is media- and protocol-independent, and runs on all Cisco-manufactured equipment including routers, bridges, access servers, and switches.
 
 
 
 
 
 
 ├
[V] cdp:IfPolDef The read only copy of CDP interface policy.
 
 
 
 
 
 ├
[V] copp:IfPol  Per interface per protocol CoPP policy
 
 
 
 
 
 ├
[V] copp:ProtoClassP 
 
 
 
 
 
 ├
[V] dwdm:AOptChnlIfPol  Abstract class for all the profiles for DWDM C optic channel that can be applied
 
 
 
 
 
 
 ├
[V] dwdm:FabIfPol 
 
 
 
 
 
 
 ├
[V] dwdm:IfPol DWDM policy that can be applied at interface level
 
 
 
 
 
 ├
[V] extdev:SDWanPolCont  SDWAN policy Container
 
 
 
 
 
 ├
[V] extdev:SDWanVpnCont  SDWAN VPN Container This needs to be fixed. Check with GM
 
 
 
 
 
 ├
[V] extdev:SDWanVpnDef  SDWAN policy Container
 
 
 
 
 
 ├
[V] extdev:SDWanVpnEntry  WAN SLA policy This needs to be fixed. Check with GM
 
 
 
 
 
 ├
[V] fc:IfPol  interface FC policy
 
 
 
 
 
 ├
[V] l2:IfPol 
 
 
 
 
 
 ├
[V] l2:LoadBalancePol 
 
 
 
 
 
 ├
[V] l2:PortAuthPol 
 
 
 
 
 
 ├
[V] lacp:ALagPol The abstract LACP policy definition.
 
 
 
 
 
 
 ├
[V] lacp:LagPol The PortChannel policy enables you to bundle several physical ports together to form a single port channel. LACP enables a node to negotiate an automatic bundling of links by sending LACP packets to the peer node.
 
 
 
 
 
 
 ├
[V] lacp:LagPolDef Read-only copy of LACP policy.
 
 
 
 
 
 ├
[V] lacp:IfPol The PortChannel interface policy defines a common configuration that will apply to one or more LACP interfaces.
 
 
 
 
 
 ├
[V] lldp:AIfPol A summary of the interface policy. We recommend you include information about where and when the policy should be used. The abstraction can be up to 128 characters.
 
 
 
 
 
 
 ├
[V] lldp:IfPol The LLDP interface policy, which defines a common configuration that will apply to one or more LLDP interfaces. LLDP uses the logical link control (LLC) services to transmit and receive information to and from other LLDP agents.
 
 
 
 
 
 
 ├
[V] lldp:IfPolDef Read-only copy of the LLDP interface policy.
 
 
 
 
 
 ├
[V] macsec:AAIfPol  Abstraction of MACSEC Interface Policy
 
 
 
 
 
 
 ├
[V] macsec:AIfPol  Access MACSEC Policy
 
 
 
 
 
 
 
 ├
[V] macsec:IfPol  Infra MACSEC Policy
 
 
 
 
 
 
 ├
[V] macsec:FabIfPol  Fabric MACSEC Infra Policy
 
 
 
 
 
 ├
[V] macsec:AAKeyChainPol  MACSEC Abstract KeyChain Policy
 
 
 
 
 
 
 ├
[V] macsec:AKeyChainPol  MACSEC Access Abstract KeyChain Policy
 
 
 
 
 
 
 
 ├
[V] macsec:KeyChainPol  MACSEC KeyChain Policy
 
 
 
 
 
 ├
[V] macsec:AAKeyPol  MACSEC Abstract Key Policy
 
 
 
 
 
 
 ├
[V] macsec:AKeyPol  MACSEC Access Abstract Key Policy
 
 
 
 
 
 
 
 ├
[V] macsec:KeyPol  MACSEC Key Policy
 
 
 
 
 
 ├
[V] macsec:AAParamPol  Abstraction of MACSEC Interface Policy
 
 
 
 
 
 
 ├
[V] macsec:AParamPol  MACSEC Parameters Policy
 
 
 
 
 
 
 
 ├
[V] macsec:ParamPol  MACSEC Access Parameters Policy
 
 
 
 
 
 
 ├
[V] macsec:FabParamPol  MACSEC Fab Parameter Policy
 
 
 
 
 
 ├
[V] mcp:AIfPol 
 
 
 
 
 
 
 ├
[V] mcp:IfPol 
 
 
 
 
 
 ├
[V] netflow:AFabExporterPol Abstarct Fabric Netflow Exporter
 
 
 
 
 
 
 ├
[V] netflow:AExporterPol  Abstract Netflow Exporter
 
 
 
 
 
 
 
 ├
[V] netflow:ExporterPol  Exporter information for bootstrapping the netflow Collection agent
 
 
 
 
 
 
 
 ├
[V] netflow:ExporterPolDef  Define the Netflow Exporter Policy MO which contains internal information needed to program the leaf
 
 
 
 
 
 
 ├
[V] netflow:VmmExporterPol 
 
 
 
 
 
 
 ├
[V] netflow:VmmExporterPolDef  Read only copy of VMM Netflow Exporter policy
 
 
 
 
 
 ├
[V] netflow:AMonitorPol 
 
 
 
 
 
 
 ├
[V] netflow:MonitorPol 
 
 
 
 
 
 
 ├
[V] netflow:MonitorPolDef  Define the Netflow Monitor Policy MO which contains internal information needed to program the leaf
 
 
 
 
 
 ├
[V] netflow:ARecordPol  Abstract Flow Record
 
 
 
 
 
 
 ├
[V] netflow:RecordPol  Flow Record
 
 
 
 
 
 
 ├
[V] netflow:RecordPolDef  Define the Netflow Record Policy MO which contains internal information needed to program the leaf
 
 
 
 
 
 ├
[V] poe:AIfPol  Abstraction of POE Interface Policy
 
 
 
 
 
 
 ├
[V] poe:IfPol  POE Interface Policy
 
 
 
 
 
 ├
[V] qos:ADppPol  Define a Data Plane Policing policy. User is supposed to use this in scenarios where the incoming traffic need to be policed to certain levels
 
 
 
 
 
 
 ├
[V] qos:DppPol  Define a Data Plane Policing policy. User is supposed to use this in scenarios where the incoming traffic need to be policed to certain levels
 
 
 
 
 
 
 ├
[V] qos:DppPolDef  Define the Data Plane Policing MO which contains internal information needed to program the leaf
 
 
 
 
 
 ├
[V] stp:AIfPol An abstraction of an spanning-tree protocol interface policy. This is applicable to leaf ports and n1000v distributed virtual switches. Extended chassis ports have BPDU guard filter enabled by default.
 
 
 
 
 
 
 ├
[V] stp:IfPol The Spanning-Tree Protocol (STP) interface policy defines a common configuration that will apply to one or more interfaces. STP prevents loops from being formed when the interfaces are interconnected via multiple paths. Spanning-Tree Protocol implements the 802.1D IEEE algorithm by exchanging BPDU messages with other switches to detect loops, and then removes the loop by shutting down selected bridge interfaces. This algorithm guarantees that th...
 
 
 
 
 
 
 ├
[V] stp:IfPolDef The read-only copy of the spanning-tree protocol interface policy.
 
 
 
 
 ├
[V] fabric:L2PortSecurityPol 
 
 
 
 
 
 ├
[V] l2:PortSecurityPol  Port Security Policy
 
 
 
 
 
 ├
[V] l2:PortSecurityPolDef  Port Security Policy
 
 
 
 
 ├
[V] fabric:L3IfPol A base class for layer 3 interface-level policies.
 
 
 
 
 
 ├
[V] arp:AIfPol  This object holds arp information that is operated at a interface level
 
 
 
 
 
 
 ├
[V] arp:IfPol 
 
 
 
 
 
 
 ├
[V] arp:IfPolDef 
 
 
 
 
 
 ├
[V] bfd:AIfPol  Interface-level bfd abstraction policy
 
 
 
 
 
 
 ├
[V] bfd:IfPol  Interface-level bfd policy
 
 
 
 
 
 ├
[V] cloudsec:IfPol  Internal Mo for Cloudsec Policy
 
 
 
 
 
 ├
[V] eigrp:IfPol The EIGRP interface policy, which defines a common configuration that will apply to one or more EIGRP interfaces.
 
 
 
 
 
 ├
[V] hsrp:AIfPol  Interface-level hsrp abstraction policy
 
 
 
 
 
 
 ├
[V] hsrp:IfPol  Interface-level hsrp policy
 
 
 
 
 
 ├
[V] ipmc:AIfPol  Interface-level ipmc policy
 
 
 
 
 
 
 ├
[V] igmp:IfDef 
 
 
 
 
 
 
 ├
[V] igmp:IfPol  Interface-level IGMP policy
 
 
 
 
 
 ├
[V] l3:IfPol  L3 Interface Policy
 
 
 
 
 
 ├
[V] nd:AIfPol The neighbor discovery interface policy defines a common configuration that will apply to one or more neighbor discovery interfaces.
 
 
 
 
 
 
 ├
[V] nd:IfPol The neighbor discovery interface policy defines a common configuration that will apply to one or more neighbor discovery interfaces.
 
 
 
 
 
 
 ├
[V] nd:IfPolDef The read only copy of the neighbor discovery interface policy.
 
 
 
 
 
 ├
[V] nd:APfxPol The neighbor discovery prefix policy.
 
 
 
 
 
 
 ├
[V] nd:PfxPol The neighbor discovery prefix policy.
 
 
 
 
 
 
 ├
[V] nd:PfxPolDef The neighbor discovery prefix policy definition.
 
 
 
 
 
 ├
[V] ospf:IfPol The OSPF interface-level policy information.
 
 
 
 
 
 ├
[V] rtdmc:AIfPol  Interface-level rtdmc-SM policy
 
 
 
 
 
 
 ├
[V] pim:IfDef PIM interface definition.
 
 
 
 
 
 
 ├
[V] pim:IfPol Interface-level PIM-SM (sparse mode) policy.
 
 
 
 
 
 ├
[V] rtdmc:AIfPolCont  Interface-level rtdmc
 
 
 
 
 
 
 ├
[V] rtdmc:IPV6McastIfDefCont  Interface Policy Container
 
 
 
 
 
 
 ├
[V] rtdmc:McastIfDefCont  Interface Policy Container
 
 
 
 
 
 ├
[V] rtdmc:ARtMapPol  Route Map Policy
 
 
 
 
 
 
 ├
[V] pim:RouteMapDef PIM route map definition
 
 
 
 
 
 
 ├
[V] pim:RouteMapPol PIM route map policy
 
 
 
 
 ├
[V] fabric:L4IfPol 
 
 
 
 
 
 ├
[V] nws:AFwPol  Firewall Policy Definition
 
 
 
 
 
 
 ├
[V] nws:FwPol 
 
 
 
 
 
 
 ├
[V] nws:FwPolDef  read only copy of lacp policy
 
 
 
 
 ├
[V] fabric:QinqIfPol 
 
 
 
 ├
[V] fabric:ProtoInstPol A base class for instance-level protocol policies.
 
 
 
 
 ├
[V] dns:AProfile The DNS Profile.
 
 
 
 
 
 ├
[V] dns:Prof The DNS instance information.
 
 
 
 
 
 ├
[V] dns:Profile The DNS profile defines a set of DNS providers and can be deployed to a switch for tenant contexts. To deploy a DNS profile on a switch, the appropriate label has to be defined for the context deployed on switch.
 
 
 
 
 ├
[V] dnsepg:ADomain  DNS Abstract Domain
 
 
 
 
 
 ├
[V] dnsepg:Domain  DNS Domain
 
 
 
 
 ├
[V] dnsepg:ZoneDB  DNS Zone DB
 
 
 
 
 ├
[V] dnsepg:ZoneEntry  DNS Zone Entry
 
 
 
 
 ├
[V] fabric:L2InstPol A base class for layer 2 interface-level policies.
 
 
 
 
 
 ├
[V] cdp:InstPol Specifies the node-level CDP policy.
 
 
 
 
 
 ├
[V] edr:ErrDisRecoverPol The error disabled recovery policy specifies the policy for re-enabling a port that was disabled due to one or more pre-defined error conditions.
 
 
 
 
 
 ├
[V] ep:ControlP  Endpoint Control Policy
 
 
 
 
 
 ├
[V] ep:IpAgingP 
 
 
 
 
 
 ├
[V] ep:LoopProtectP The endpoint loop protection policy specifies how loops detected by frequent mac moves are handled.
 
 
 
 
 
 ├
[V] fc:FabricPol 
 
 
 
 
 
 ├
[V] fc:InstPol 
 
 
 
 
 
 ├
[V] l2:AInstPol A fabric-wide L2 policy.
 
 
 
 
 
 
 ├
[V] l2:InstPol The Layer 2 instance policy is used for configuring fabric-wide layer 2 settings. Currently, this policy contains only fabric MTU and management MTU configuration.
 
 
 
 
 
 
 ├
[V] l2:InstPolDef A read-only copy of the fabric MTU policy.
 
 
 
 
 
 ├
[V] l2:NodeAuthPol 
 
 
 
 
 
 ├
[V] lldp:InstPol The node level LLDP policy.
 
 
 
 
 
 ├
[V] mcp:InstPol 
 
 
 
 
 
 ├
[V] poe:InstPol  Node level poe policy
 
 
 
 
 
 ├
[V] span:ADest The abstraction of an SPAN destination. The SPAN destination is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a port or an endpoint group...
 
 
 
 
 
 
 ├
[V] span:AVDest The abstraction of a VSPAN destination. The VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of VSPAN sources and destinations. The destination can be either a port or an endpoint...
 
 
 
 
 
 
 
 ├
[V] span:VDest The VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (tenant, access, or fabric) determines the allowed types of VSPAN sources and destinations. The destination can be either a port or an endpoint group. If the destination is a port, it...
 
 
 
 
 
 
 
 ├
[V] span:VDestDef The VLAN-based SPAN (VSPAN) destination definition.
 
 
 
 
 
 
 ├
[V] span:Dest The SPAN destination is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a port or an endpoint group. If the destination is a port, it shoul...
 
 
 
 
 
 ├
[V] span:ASrcGrp The abstraction of a SPAN source group. The SPAN source group can contain a group of SPAN sources, which is where network traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source group and a SPAN destination. The type of session (Tenan...
 
 
 
 
 
 
 ├
[V] span:SrcGrp The SPAN source group can contain a group of SPAN sources. A SPAN source is where network traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source group and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines...
 
 
 
 
 
 
 ├
[V] span:SrcGrpDef The SPAN source group definitions. The SPAN source is where traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (access SPAN), a Layer 2 bridge domain, or a Layer 3 context (fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access or fabric) determines the allowed types of SPAN sources an...
 
 
 
 
 
 ├
[V] span:AVDestGrp The abstraction of a VSPAN destination group. The VSPAN destination group can contain a group of VSPAN destinations. A VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of VSPAN so...
 
 
 
 
 
 
 ├
[V] span:VDestGrp The VSPAN destination group contains a group of VSPAN destinations. A VSPAN destination is where network traffic is sent for analysis by a network analyzer. A VSPAN destination can be local or remote (VERSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (tenant, access, or fabric) determines the allowed types of VSPAN sources and destinations. The destination can be ei...
 
 
 
 
 
 
 ├
[V] span:VDestGrpDef VSPAN destination group used for configuring VSPAN source group definitions.
 
 
 
 
 
 ├
[V] span:AVSrcGrp The abstraction of a VSPAN source group. The VSPAN source group can contain a group of VSPAN sources. A VSPAN source is where network traffic is sampled. A VSPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access VSPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric VSPAN). When you create a traffic monitoring session, you must select a VSPAN source group and a VSPAN destination. The type ...
 
 
 
 
 
 
 ├
[V] span:VSrcGrp The VSPAN source group can contain a group of VSPAN sources. A VSPAN source is where network traffic is sampled. A VSPAN source can be an endpoint group (EPG), one or more ports; or port traffic filtered by an EPG (access VSPAN), a Layer 2 bridge domain, or a Layer 3 context (fabric VSPAN). When you create a traffic monitoring session, you must select a VSPAN source group and a VSPAN destination. The type of session (tenant, access, or fabric) de...
 
 
 
 
 
 
 ├
[V] span:VSrcGrpDef The VSPAN source group definition.
 
 
 
 
 
 ├
[V] span:DestGrp The SPAN destination group contains a group of SPAN destinations. A SPAN destination is where network traffic is sent for analysis by a network analyzer. A SPAN destination can be local or remote (ERSPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of SPAN sources and destinations. The destination can be either a p...
 
 
 
 
 
 ├
[V] span:SpanProv The SPAN destination provider is used for configuring SPAN destination provider parameters.
 
 
 
 
 
 ├
[V] span:SrcTargetShadow The SPAN source to EPG information.
 
 
 
 
 
 ├
[V] span:SrcTargetShadowBD The SPAN source to bridge domain (BD) information.
 
 
 
 
 
 ├
[V] span:SrcTargetShadowCtx The SPAN source to Ctx information.
 
 
 
 
 
 ├
[V] span:SrcTargetShadowL3If  Holds span src to l3 itnerface related information
 
 
 
 
 
 ├
[V] span:TaskParam The SPAN source to EPG task information.
 
 
 
 
 
 ├
[V] span:VSpanProv The VSPAN destination provider is used for configuring VSPAN destination provider parameters.
 
 
 
 
 
 ├
[V] stp:InstPol The spanning Tree Protocol (STP) instance policy, which enables you to set the bridge protocol data unit (BPDU) guard policy or filter. BDPUs are packets that run the STP protocol. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. Loops are deadly to a network.
 
 
 
 
 
 ├
[V] vpc:InstPol The node-level vPC domain policy, which is used to specify a vPC domain and is applied to both vPC peer devices, the vPC peer keepalive link, the vPC peer link, and all the PortChannels in the vPC domain connected to the downstream device. You can have only one vPC domain ID on each device.
 
 
 
 
 ├
[V] fabric:L3InstPol A base class for layer 3 instance-level policies.
 
 
 
 
 
 ├
[V] bfd:AInstPol  Global BFD policy
 
 
 
 
 
 
 ├
[V] bfd:Ipv4InstPol 
 
 
 
 
 
 
 ├
[V] bfd:Ipv6InstPol 
 
 
 
 
 
 ├
[V] bgp:InstPol The BGP Instance level policy is used to configure MP-BGP policies inside the fabric.
 
 
 
 
 
 ├
[V] dhcp:ARelayP The abstract DHCP Relay profile, which is used for configuring relay parameters per bridge domain (BD).
 
 
 
 
 
 
 ├
[V] dhcp:RelayP The DHCP relay profile, with one or more helper addresses in it, configures a DHCP relay agent for forwarding DHCP packets to a remote server.
 
 
 
 
 ├
[V] fabric:UtilInstPol A base class for policies.
 
 
 
 
 
 ├
[V] psu:InstPol The power redundancy policy is for all power supply units on the fabric nodes (leaves and spines) that are consuming the power supply policy through their respective selector profile policy.
 
 
 
 
 
 ├
[V] wwn:InstPol WWN Instance policy
 
 
 
 
 ├
[V] fabric:VxlanInstPol 
 
 
 
 
 
 ├
[V] l4:AVxlanInstPol 
 
 
 
 
 
 
 ├
[V] l4:VxlanInstPol 
 
 
 
 
 
 
 ├
[V] l4:VxlanInstPolDef 
 
 
 
 
 ├
[V] twamp:ResponderPol TWAMP Responder Policy.
 
 
 
 
 ├
[V] twamp:ServerPol  Node level TWAMP policy
 
 
 
 ├
[V] lbp:Pol The load balancing policy options for balancing traffic among the available uplink ports. Static hash load balancing is the traditional load balancing mechanism used in networks where each flow is allocated to an uplink based on a hash of its 5-tuple. This load balancing gives a distribution of flows across the available links that is roughly even. Usually, with a large number of flows, the even distribution of flows results in an even distributi...
 
 
 ├
[V] fabric:SetupPol 
 
 
 ├
[V] fc:AEncapCont 
 
 
 
 ├
[V] fc:AllocEncapCont  Represents the container object used for managing Fibre Channel Encap Block
 
 
 ├
[V] fc:APinningLbl  Fiber Channel Pinning Label. Its used for pinning host interfaces to uplink interfaces. This label should match with the name of a fc:PinningP configured this tenant or tenant-commmon. Once this label is configured under a fv:RsFcPathAtt, that host interface will get pinned to the uplink interfaces specified in the Pinning profile.
 
 
 
 ├
[V] fc:PinningLbl 
 
 
 
 ├
[V] fc:PinningLblDef 
 
 
 ├
[V] fc:APinningP  Abstract Fiber Channel Pinning Profile. Its used for pinning host interfaces to uplink interfaces.
 
 
 
 ├
[V] fc:PinningP  Fiber Channel Pinning Profile. Its used for pinning host interfaces to uplink interfaces.
 
 
 
 ├
[V] fc:PinningPDef  Fiber Channel Pinning Profile Definition. Its used for pinning host interfaces to uplink interfaces.
 
 
 ├
[V] fc:AllocEncapBlkDef 
 
 
 ├
[V] fc:ResPolCont  Container for resolved Fiber Channel policies in node
 
 
 ├
[V] fc:VsanAttrP 
 
 
 ├
[V] fcpr:Consumer 
 
 
 ├
[V] fcpr:Holder 
 
 
 ├
[V] fcpr:PostponedRequest 
 
 
 ├
[V] fhs:ABDPol 
 
 
 
 ├
[V] fhs:BDDef 
 
 
 
 ├
[V] fhs:BDPol 
 
 
 ├
[V] fhs:ARaGuardPol 
 
 
 
 ├
[V] fhs:RaGuardDef 
 
 
 
 ├
[V] fhs:RaGuardPol 
 
 
 ├
[V] fhs:ATrustCtrlPol 
 
 
 
 ├
[V] fhs:TrustCtrlDef 
 
 
 
 ├
[V] fhs:TrustCtrlPol 
 
 
 ├
[V] firmware:AFwP The firmware policy specifies the desired firmware version.
 
 
 
 ├
[V] firmware:AnalyticsAgentFwP  Firmware policy specification for analytics agent.
 
 
 
 ├
[V] firmware:CatFwP The catalog firmware policy version.
 
 
 
 ├
[V] firmware:CatFwPInternal  Internal Catalog Policy. Fields will be populated internally.
 
 
 
 ├
[V] firmware:CtrlrFwP The firmware policy specification for the controller.
 
 
 
 ├
[V] firmware:FwP The firmware specification policy for a node.
 
 
 ├
[V] firmware:RepoP The firmware repository population and maintenance information.
 
 
 ├
[V] fmcast:SystemGIPoPol  Used for enabling usage of configured system GIPo in the fabric (includes all the PODs). @@@ In previous releases system GIPo was hardcoded and was not usable for Multipod scenarios. @@@ In Congo, PE/APIC changes were done for configuring new system GIPo value but NXOS changes @@@ were slipped out of Congo. Now we are introducing this knob to start using configured system @@@ ...
 
 
 ├
[V] fmcast:TreePol The Multicast Tree policy parameters..
 
 
 ├
[V] fv:AAKeyChainPol  Abstract KeyChain Policy
 
 
 
 ├
[V] fv:AKeyChainPol  Abstract Tenant KeyChain Policy
 
 
 
 
 ├
[V] fv:KeyChainPol  KeyChain Policy
 
 
 
 
 ├
[V] fv:KeyChainPolDef  Resolved KeyChain Policy
 
 
 ├
[V] fv:AAKeyPol  Abstract Key Policy
 
 
 
 ├
[V] fv:AKeyPol  Abstract Key Policy
 
 
 
 
 ├
[V] fv:KeyPol  Key Policy
 
 
 
 
 ├
[V] fv:KeyPolDef  Resolved Key Policy
 
 
 ├
[V] fv:AAREpPRequestor 
 
 
 
 ├
[V] fv:GenericEpPRequestor 
 
 
 
 ├
[V] fv:UsegEpPRequestor 
 
 
 ├
[V] fv:AAREpPUpdate  Represent an AREpP Update
 
 
 
 ├
[V] fv:InProgressUpd  In-Progress AREpP Update
 
 
 
 ├
[V] fv:PostponedUpd  Postponed AREpP Update
 
 
 ├
[V] fv:AFabricExtConnP  Abstract Site Connectivity Profile
 
 
 
 ├
[V] fv:FabricExtConnP  Site Connectivity Profile
 
 
 
 ├
[V] fv:FabricExtConnPDef  Site Connectivity Profile Definition @@@ PE will pull FabricExtConnPDef. An Outside pushed to spine will pull it.
 
 
 ├
[V] fv:AIntersiteConnP  Abstract Class Container for Connectivity Information for MultiSite deployments
 
 
 
 ├
[V] fv:ExtRoutableUcastConnP  Container for Unicast Connectivity Information for MultiSite deployments
 
 
 
 ├
[V] fv:IntersiteConnP  Container for Unicast Connectivity Information for MultiSite deployments
 
 
 
 ├
[V] fv:IntersiteMcastConnP  Container for Multisite Connectivity Information for MultiSite deployments
 
 
 ├
[V] fv:AIntersiteConnPDef  Abstract Class Container Def for Connectivity Information for MultiSite deployments
 
 
 
 ├
[V] fv:ExtRoutableUcastConnPDef 
 
 
 
 ├
[V] fv:IntersiteConnPDef 
 
 
 
 ├
[V] fv:IntersiteMcastConnPDef  Container for Local Multisite Connectivity Information for MultiSite deployments
 
 
 ├
[V] fv:APathAtt An abstraction of the path the endpoint group configuration will be deployed on.
 
 
 
 ├
[V] fv:AttEntityPathAtt An attachable entity path attachment on the EPG configuration.
 
 
 
 ├
[V] fv:DyNodeAtt 
 
 
 
 ├
[V] fv:DyPathAtt A dynamic path attachment.
 
 
 
 ├
[V] fv:ExtStPathAtt The path the endpoint group configuration will be deployed on.
 
 
 
 ├
[V] fv:StNodeAtt 
 
 
 
 ├
[V] fv:StPathAtt The path the endpoint group configuration is deployed on.
 
 
 
 ├
[V] fv:VNodeAtt  Represent a Path on whom the EPG configuration will be deployed. It represents Virtual Node Attachment. If only this type of attachement is present under an EpP then the EpP will not get instrumented on that node. But together with VNodeAtt if any other type of PathAtt is present then EpP will get instrumented as usual
 
 
 ├
[V] fv:APathEpDef The abstract path endpoint definition.
 
 
 
 ├
[V] fv:ExtPathEpDef An external path endpoint definition.
 
 
 
 ├
[V] fv:PathEpDef The node and interface, or a group of interfaces, that the endpoint group is deployed on. This is an internal object used for tracking static endpoint group deployment.
 
 
 ├
[V] fv:APeeringP  Abstract Peering Profile
 
 
 
 ├
[V] fv:IntersitePeeringDef  Peering Profile Definition
 
 
 
 ├
[V] fv:IntersitePeeringP  Intersite Peering Profile
 
 
 
 ├
[V] fv:PeeringDef  Peering Profile Definition
 
 
 
 ├
[V] fv:PeeringP  Peering Profile
 
 
 ├
[V] fv:AREpPBootStrap 
 
 
 ├
[V] fv:AREpPCtrct A contract for a remote endpoint profile.
 
 
 
 ├
[V] fv:REpPCtrct A contract for a remote endpoint profile.
 
 
 
 ├
[V] fv:UtilizedCtrct 
 
 
 ├
[V] fv:AREpPRequestorCont 
 
 
 ├
[V] fv:AREpPUpd 
 
 
 ├
[V] fv:AVip  Abstraction of Virtual IP address
 
 
 
 ├
[V] fv:Vip  Virtual IP address
 
 
 
 ├
[V] fv:VipDef  Virtual IP address definition
 
 
 
 ├
[V] vns:SvcVip  Virtual IP address
 
 
 
 ├
[V] vns:SvcVipDef  Implicit instance of Svc VIP
 
 
 ├
[V] fv:AccP The bridge domain (BD) access profile. When created over a BD, contracts are not enforced for the BD, and the encap will be applied to all endpoint groups on this BD.
 
 
 ├
[V] fv:AdjDefCons 
 
 
 ├
[V] fv:AppCtxRef  App Context Reference
 
 
 ├
[V] fv:AppEpGCons  App EpG Consumer
 
 
 ├
[V] fv:AppEpGPol  App EpG Policy
 
 
 ├
[V] fv:AppEpGRef  App EpG Reference
 
 
 ├
[V] fv:BDHolder The bridge domain (BD) holder contains bridge domain related information. For example, in a same shared service scenario, when a context is deployed on a node, the PE needs to get all subnets of all the associated BDs. In this case, the private Layer 3 network context contains DNs of all associated BDs, and with that info, the node pulls down the corresponding bridge domain holders of each of the associated BDs. The bridge domain holder contai...
 
 
 ├
[V] fv:BDPublicSubnetHolder This MO is used to hold all the public subnets under a BD that are consumed by l3 out
 
 
 ├
[V] fv:ByDom 
 
 
 ├
[V] fv:ByHv 
 
 
 ├
[V] fv:ConnInstrPol Every endpoint group should have a relation set to its bridge domain. If not set by the user, then the relation is set to the default Bridge Domain and the Connectivity Instrumentation Policy determines whether or not traffic will be allowed to flow to/from that EPG. This applies to all EPGs regardless of use (VMM, baremetal, L2ext, L3ext). There is also a relation from the Bridge Domain to the VRF. If this is not set by the user, then the defaul...
 
 
 ├
[V] fv:CtrlrIpDef  POD Specific Controller Definition
 
 
 ├
[V] fv:EPgCont An endpoint group container is an internal object that represents endpoint groups.
 
 
 
 ├
[V] fv:AEPgCont An abstract container class for endpoint groups. This is an abstract class and cannot be instantiated
 
 
 
 ├
[V] fv:EPgDef An internal object that represents endpoint groups is used for deployment.
 
 
 
 
 ├
[V] fv:AEPgDef Abstract representation of an endpoint group definition.
 
 
 
 
 
 ├
[V] dhcp:ProvDhcp Internal object that points to the provider details of a DHCP relay profile.
 
 
 
 
 
 ├
[V] fv:AEpP Abstract representation of an endpoint profile.
 
 
 
 
 
 
 ├
[V] fv:AREpP Abstract representation of the resolvable endpoint profile. This is an abstract class and cannot be instantiated.
 
 
 
 
 
 
 
 ├
[V] cloud:EpP 
 
 
 
 
 
 
 
 ├
[V] fv:AMgmtEpP Abstract representation of the management endpoint policy for a fabric node management endpoint group. This is an abstract class and cannot be instantiated.
 
 
 
 
 
 
 
 
 ├
[V] fv:InBEpP An in-band management endpoint profile for a fabric node management endpoint group.
 
 
 
 
 
 
 
 
 ├
[V] fv:InstPEpP Instance Profile Management EpP for the Fabric Node Management EPG. This EpP is created per external management entity instance profile (InstP EPg).
 
 
 
 
 
 
 
 
 ├
[V] fv:OoBEpP An out-of-band management endpoint profile for a fabric node management endpoint group.
 
 
 
 
 
 
 
 ├
[V] fv:EpP An endpoint profile.
 
 
 
 
 
 
 
 ├
[V] fv:ExtEpP Abstraction of a profile created for an endpoint connected to an external router or switch.
 
 
 
 
 
 
 
 
 ├
[V] fv:BrEpP The bridge endpoint profile represents L2 outside present under a tenant.
 
 
 
 
 
 
 
 
 ├
[V] fv:RtdEpP A target relation to an L3 routed outside present under a tenant.
 
 
 
 
 
 
 
 ├
[V] fv:SvcEpP Abstract representation of a service endpoint profile, such as an endpoint profile created per node in the service graph.
 
 
 
 
 
 
 
 ├
[V] fv:TnlEpP 
 
 
 
 
 
 ├
[V] fv:EPgSummaryDef 
 
 
 
 
 
 ├
[V] span:ADestSummary The abstraction of a SPAN destination information summary, which is used for configuring the SPAN destination information summary.
 
 
 
 
 
 
 ├
[V] span:AEpgSummary The abstraction of a SPAN destination endpoint group (EPG) summary, which stores EPG information for SPAN.
 
 
 
 
 
 
 
 ├
[V] span:EpgSummary The SPAN destination Epg summary.
 
 
 
 
 
 
 
 ├
[V] span:VEpgSummary The VEpg summary.
 
 
 
 
 
 
 
 ├
[V] span:VEpgSummaryDef The VSPAN EpgSummaryDef is used for VERSPAN definitions.
 
 
 
 
 
 ├
[V] vns:AdjacencyDefCont 
 
 
 
 
 
 ├
[V] vns:CopyAdjacencyDef 
 
 
 
 
 
 ├
[V] vz:ACtrctEpgDef An endpoint group associated with a contract can be provider or consumer.
 
 
 
 
 
 
 ├
[V] vz:ConsDef A consumer definition.
 
 
 
 
 
 
 ├
[V] vz:CtrctEntityDef The contract entity definition.
 
 
 
 
 
 
 ├
[V] vz:IntraSecurityDef  Represent an EPg with Intra EPg security enabled
 
 
 
 
 
 
 ├
[V] vz:ProvDef A provider definition.
 
 
 
 
 
 ├
[V] vz:AToEPg 
 
 
 
 
 
 
 ├
[V] vz:ToEPg The destination endpoint group.
 
 
 
 
 
 
 ├
[V] vz:ToEPgAny 
 
 
 
 
 ├
[V] fv:ProtEPg An endpoint group associated with a taboo policy in a given context. This is an internal object.
 
 
 
 
 ├
[V] vz:FromEPg The endpoint group that traffic originates from.
 
 
 
 ├
[V] vz:CtrctEPgCont A container for a contract endpoint group.
 
 
 ├
[V] fv:EpCP A container to hold criterion definition objects for an endpoint group.
 
 
 ├
[V] fv:EpTaskAggrCont A container for the endpoint task aggregator.
 
 
 ├
[V] fv:ExtRoutableMcastIpDef 
 
 
 ├
[V] fv:ExtRoutableRemoteLeafMcastIpDef 
 
 
 ├
[V] fv:FailedXlate 
 
 
 ├
[V] fv:GipoCont 
 
 
 ├
[V] fv:GipoInfo 
 
 
 ├
[V] fv:GipoRequestor 
 
 
 ├
[V] fv:GipoTaskAggr 
 
 
 ├
[V] fv:GraphCons 
 
 
 ├
[V] fv:ICMPProbe 
 
 
 ├
[V] fv:IPSLAMonitoringPol 
 
 
 ├
[V] fv:InProgressUpdCont  Container for AREpP Updates Currently in Progress
 
 
 ├
[V] fv:L3SubInterface 
 
 
 ├
[V] fv:NodeAREpPUpd  Manager for AREpP Updates for a given Node
 
 
 ├
[V] fv:NonStretchedCont 
 
 
 ├
[V] fv:PasswordConfig  BGP password config
 
 
 ├
[V] fv:PasswordConfigDef  BGP Password config definition
 
 
 ├
[V] fv:PeerContextDefDn  Used to store Peer (provider or consumer) Context DNs
 
 
 ├
[V] fv:PeerContextDn  Used to store Peer (provider or consumer) Context DNs
 
 
 ├
[V] fv:PodDhcpServerInfo  Dhcp Server info of the Virtual Pod
 
 
 ├
[V] fv:PolDeliveryStatus Status of policy deployment indicates if APIC has delivered/is delivering policy to node - Policy to node cannot be delivered (node is a spine).
 
 
 ├
[V] fv:PolMod A bridge domain policy modifier that can override the desired state of the bridge domain.
 
 
 ├
[V] fv:PostponedUpdCont  Container for AREpP Updates Currently Postponed
 
 
 ├
[V] fv:PullRecover 
 
 
 ├
[V] fv:PulledPolicy 
 
 
 ├
[V] fv:RemoteId 
 
 
 ├
[V] fv:RemotePolHolder A container existing on each node to efficiently download policies to the node. For example: filters, bridge domain, and taboo policies. This is an internal object.
 
 
 ├
[V] fv:RtdEpPInfoCont A container for target relations that point to a Layer 3 routed outside and present under a tenant.
 
 
 ├
[V] fv:RtdEpPInfoHolder A container for target relations to a Layer 3 routed outside and present under a tenant.
 
 
 ├
[V] fv:SDWanPrefixTaskAggrCont  SDWan Prefix task aggregator container
 
 
 ├
[V] fv:ShardedAREpPUpd 
 
 
 ├
[V] fv:SiteAssociated  Used to store ID mappings
 
 
 ├
[V] fv:SlaDef  IPSLA Policy Definition @@@ PE will pull IPSLA Def Mo
 
 
 ├
[V] fv:SpineExtIfDef 
 
 
 ├
[V] fv:SpineL3IpDef 
 
 
 ├
[V] fv:StretchedCont 
 
 
 ├
[V] fv:TCPProbe 
 
 
 ├
[V] fv:TrackList 
 
 
 ├
[V] fv:TrackMember 
 
 
 ├
[V] fv:UnkMacUcastActMod This is the bridge domain (BD) Policy Modifier for UnkMacUcastAct. In special cases, the BD Policy Modifier can override the desired state of BD.
 
 
 ├
[V] fv:UplinkOrderCont  Uplink Failover Order Container Mo
 
 
 ├
[V] fv:UsegSrc 
 
 
 ├
[V] fv:VStaticEp 
 
 
 ├
[V] fv:VStaticEpCont 
 
 
 ├
[V] geo:Site The geographical site of the fabric node.
 
 
 ├
[V] hcloud:AwsVpnTunnelInfo 
 
 
 ├
[V] hcloud:TechSup 
 
 
 ├
[V] hcloud:TechSupDone 
 
 
 ├
[V] hcloud:VnetStatsPol 
 
 
 ├
[V] hcplatform:License  License Definition
 
 
 ├
[V] health:EvalP The health score evaluation policy indicates the severity of the fault in percentages.
 
 
 ├
[V] health:LevelsP The severity of a health score, such as healthy, fair, or poor.
 
 
 ├
[V] health:RecalcP  Health Score recalculation policy
 
 
 ├
[V] hostprot:APol 
 
 
 
 ├
[V] hostprot:Pol 
 
 
 
 ├
[V] hostprot:PolDef 
 
 
 ├
[V] hostprot:ARemoteIp 
 
 
 
 ├
[V] hostprot:RemoteIp 
 
 
 
 ├
[V] hostprot:RemoteIpDef 
 
 
 ├
[V] hostprot:ARule 
 
 
 
 ├
[V] hostprot:Rule 
 
 
 
 ├
[V] hostprot:RuleDef 
 
 
 ├
[V] hostprot:ASubj 
 
 
 
 ├
[V] hostprot:Subj 
 
 
 
 ├
[V] hostprot:SubjDef 
 
 
 ├
[V] iacl:AProfile  Abstract class for all the profiles for CoPP Prefilters that can be applied at the node level
 
 
 
 ├
[V] iacl:LeafProfile  CoPP Prefilter policy that can be applied at LEAF nodes
 
 
 
 ├
[V] iacl:SpineProfile  CoPP Prefilter policy that can be applied at SPINE nodes
 
 
 ├
[V] ident:Ns The identity namespace.
 
 
 ├
[V] infra:CPMtuPol 
 
 
 ├
[V] infra:ClusterPol The cluster policy is used to set the size of the cluster.
 
 
 ├
[V] infra:DRRPol 
 
 
 ├
[V] infra:ImplicitSetPol 
 
 
 ├
[V] infra:KafkaPol 
 
 
 ├
[V] infra:PortTrackPol 
 
 
 ├
[V] infra:RlPodRedPol 
 
 
 ├
[V] infra:SetPol 
 
 
 ├
[V] infrazone:ZoneP  Infrastructure Zoning Profile: This profile can be used for carving out policy deployment zones in the fabric. With zones, user can push policies to different zones at different times to prevent or minimize fabric downtime
 
 
 ├
[V] ipsec:AIsakmpPhase1Pol  Holds Ipsec ISAKMP Phase 1 Policy
 
 
 
 ├
[V] ipsec:IsakmpPhase1Pol 
 
 
 
 ├
[V] ipsec:IsakmpPhase1PolDef 
 
 
 ├
[V] ipsec:AIsakmpPhase2Pol  Holds Ipsec ISAKMP Phase 2 Policy
 
 
 
 ├
[V] ipsec:IsakmpPhase2Pol 
 
 
 
 ├
[V] ipsec:IsakmpPhase2PolDef 
 
 
 ├
[V] isakmp:GlobalPol  Holds Isakmp Cloud Router-Level Common Policy
 
 
 ├
[V] isakmp:Keyring 
 
 
 ├
[V] isakmp:Policy  Holds Isakmp Policy information
 
 
 ├
[V] isakmp:Profile 
 
 
 ├
[V] l3ext:AnchorNodeDef 
 
 
 ├
[V] l3ext:CtxRef  L3 Outside Ctx Reference
 
 
 ├
[V] l3ext:CtxRtdOutRef  L3 Outside Ctx Reference
 
 
 ├
[V] l3ext:FloatingIfDef 
 
 
 ├
[V] l3ext:FloatingNodeDef 
 
 
 ├
[V] l3ext:ProvLblDefCont  Represents Logical Outside Profile Label Definition Container
 
 
 ├
[V] l3ext:RequestedBy 
 
 
 ├
[V] l3ext:RtdCtxCont  Container of RtdCtxDef
 
 
 ├
[V] l3ext:RtdCtxDef  Contains information related to RtdCtxDef.
 
 
 ├
[V] l3ext:RtdCtxDefRef  Mo that will be attached to retrieve the DN of the RtdCtxDef that should be downloaded on the leaf in order to program the leaf
 
 
 ├
[V] l3ext:RtdOutCont  Container of RtdOutDef
 
 
 ├
[V] l3ext:RtdOutDef  Contains information related to RtdOutDef.
 
 
 ├
[V] l3ext:RtdOutDefRef  Reference to the Routed Out Definition associated with this RtdEpP. Existence of this mo under RtdEpP is also used as an indicator that the RtdEpP is version 2 (i.e. pruned) RtdEpP.
 
 
 ├
[V] l3ext:VrfValidationPol  VRF Validation knobs
 
 
 ├
[V] latency:OngoingMode 
 
 
 ├
[V] mgmt:ConnectivityPrefs  ConnectivityPrefs has the information about routing interface(oob/inb)
 
 
 ├
[V] mock:Counter This is generated and used only by internal processes
 
 
 ├
[V] mock:MockRoot This is generated and used only by internal processes
 
 
 ├
[V] mock:MockSession This is generated and used only by internal processes
 
 
 ├
[V] mock:Stats This is generated and used only by internal processes
 
 
 ├
[V] mon:MonObjDn 
 
 
 ├
[V] mon:Pol The base monitoring policy model.
 
 
 
 ├
[V] mon:CommonPol The monitoring policy model for the common semantic scope, which is used when there is no corresponding policy under the more specific infra or tenant scopes. In such cases, these policies are used throughout the fabric except for objects attached to their own specific policies.
 
 
 
 ├
[V] mon:EPGPol Creates a container for monitoring policies associated with the tenant. This allows you to apply tenant-specific policies related to Stats Collection, Stats Export, Callhome/SNMP/Syslog, Event Severities, Fault Severities, and Fault Lifecycles.
 
 
 
 ├
[V] mon:FabricPol Creates a policy which acts as a container for associated fabric monitoring policies. These can include policies related to Event/Fault severity, the Fault lifecycle, and other such monitoring policies.
 
 
 
 ├
[V] mon:InfraPol Creates a policy which acts as a container for associated fabric monitoring policies. These can include policies related to Event/Fault severity, the Fault lifecycle, and other such monitoring policies.
 
 
 ├
[V] netflow:ExporterPolHolder  Mo that will be attached to retrieve the DN of the NetflowExporterPolDef that should be downloaded on the leaf in order to program the leaf
 
 
 ├
[V] netflow:MonitorPolHolder  Mo that will be attached to retrieve the DN of the NetflowMonitorPolDef that should be downloaded on the leaf in order to program the leaf
 
 
 ├
[V] netflow:NodePol 
 
 
 ├
[V] netflow:PolDefCont  Container for all the Netflow Def MOs
 
 
 ├
[V] opflex:EncapCont 
 
 
 ├
[V] opflex:EpPDIDEpRefCont  IDEp ref container under the EpPD
 
 
 ├
[V] opflex:IDEpRefCont  IDEp ref container under the controller
 
 
 ├
[V] opflex:IDEpScope 
 
 
 ├
[V] opflex:IDEpScopeCont 
 
 
 ├
[V] opflex:ODevRefCont  ODev ref container under the topSys for the leaf
 
 
 ├
[V] opflex:OeHupTrigger 
 
 
 ├
[V] opflex:PathAtt 
 
 
 ├
[V] opflex:ScopeCont  Scope container under the controller
 
 
 ├
[V] opflex:UsegInfoCont  container to keep track of tenants with vm-attr useg
 
 
 ├
[V] opflex:VtepRefCont  Vtep ref container under the topSys for the leaf
 
 
 ├
[V] opflexp:HupTrigger 
 
 
 ├
[V] pim:Capability PIM capability.
 
 
 ├
[V] pim:RouteMapPolDefCont  Container for route-map Def MO under top level
 
 
 ├
[V] pki:Definition This is an abstract class and cannot be instantiated.
 
 
 
 ├
[V] opflex:CloudSvmInfo  Cloud SVM(AVE) cert info
 
 
 
 ├
[V] opflex:ODevEp 
 
 
 
 ├
[V] pki:CsyncElement The file pattern, the type of pattern (include or exclude), and the symbolic name of the pattern.
 
 
 
 ├
[V] pki:CsyncPolicy Used to control csync timeout and enable/disable.
 
 
 
 ├
[V] pki:CsyncSharedKey Used to distribute the key to all IFC nodes.
 
 
 
 ├
[V] pki:DebugPluginChallenge The debug plugin challenge.
 
 
 
 ├
[V] pki:Ep The PKI configuration, which includes key rings and certificate authority (CA) credentials. Components of the PKI are used to establish secure communications between two devices.
 
 
 
 ├
[V] pki:ExportEncryptionKey  Config Export Encryption Key policies
 
 
 
 ├
[V] pki:FabricCommunicationEp  IFM SSL Fabric policies
 
 
 
 ├
[V] pki:FabricIssuedSSLCertificate  Object representing x509 certificates issued by the APIC for a node in the Fabric This object is implicitly created and cannot be deleted or exported in the configuration
 
 
 
 ├
[V] pki:FabricNodeSSLCertificate  Object representing a Cisco issued x509 certificate for a node in the Fabric This object is implicitly created and cannot be deleted or exported in the configuration
 
 
 
 ├
[V] pki:FabricNodeSSLCertificateRef  References from serial number to node
 
 
 
 ├
[V] pki:FabricSelfCAEp  IFM SSL Self Signed Generated Certificates
 
 
 
 ├
[V] pki:Item This is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] opflex:ODevKeyRing 
 
 
 
 
 ├
[V] opflexp:OpflexpClientKeyRing 
 
 
 
 
 ├
[V] opflexp:OpflexpKeyRing 
 
 
 
 
 ├
[V] pki:KeyRing A keyring to create and hold an SSL certificate. The SSL certificate contains the public RSA key and signed identity information of a PKI device. The PKI device holds a pair of RSA encryption keys, one kept private and one made public, stored in an internal key ring. The keyring certificate merges into the PKI device keyring to create a trusted relationship.
 
 
 
 
 ├
[V] pki:TP A trustpoint (certificate authority/CA), which issues and validates (signs) digital certificates. When participating in secure communications using the public key infrastructure (PKI), a participant can verify the identity of the other party through the CA that signed the other party's public key.
 
 
 
 
 ├
[V] pki:TbkKey 
 
 
 
 ├
[V] pki:SchedulerCert 
 
 
 
 ├
[V] pki:SchedulerToken 
 
 
 
 ├
[V] pki:SvmInfo  SVM cert info
 
 
 
 ├
[V] pki:WebTokenData The cryptographic data used for generating and verifying web tokens.
 
 
 ├
[V] planner:ACIConfigFilter 
 
 
 ├
[V] planner:ConfigTmpl 
 
 
 ├
[V] planner:ExistingTopoDeplPref 
 
 
 ├
[V] planner:ImportACIConfig 
 
 
 ├
[V] planner:PlacementAlgorithm 
 
 
 ├
[V] planner:ResourceCapPct 
 
 
 ├
[V] planner:Snapshot 
 
 
 ├
[V] planner:Tenant 
 
 
 ├
[V] planner:TenantAny 
 
 
 ├
[V] pol:AConfIssues The policy configuration issues.
 
 
 
 ├
[V] datetime:ConfIssues 
 
 
 
 ├
[V] dns:ConfIssues  DNS Policy Configuration Policy Issues
 
 
 
 ├
[V] fabric:AConfIssues The infrastructure configuration issues.
 
 
 
 
 ├
[V] fabric:ASelectorIssues An abstraction of selector issues.
 
 
 
 
 
 ├
[V] fabric:SelectorIssues Ths selector issues.
 
 
 
 
 
 ├
[V] infra:SelectorIssues An object that reports configuration issues related to infra selector.
 
 
 
 
 ├
[V] infra:AConfIssues An abstraction of configuration issues.
 
 
 
 
 
 ├
[V] infra:NsIssues An object indicating namespace configuration issues.
 
 
 
 
 
 ├
[V] infra:ProfileIssues Infrastructure Profile Configuration Issues. The delegatable class is infra:Profile, which should be a super class of all infra profiles such as Attachable Profile, Node Profile, Port Profile, Function Profile, etc.
 
 
 
 ├
[V] fabric:APathIssues An object used for reporting path-related configuration issues.
 
 
 
 
 ├
[V] fabric:OosPathIssues An object used for reporting configuration issues related to port out-of-service policy.
 
 
 
 ├
[V] fv:AConfIssues The configuration issues found during the endpoint profile instrumentation in the node. This is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] fv:AEpPConfIssues Configuration issues on an endpoint profile.
 
 
 
 
 
 ├
[V] fv:CompIssues The compute configuration issues for each endpoint profile.
 
 
 
 
 
 ├
[V] fv:NwIssues The network configuration issues for each endpoint profile.
 
 
 
 
 
 ├
[V] fv:StorageIssues Represents the storage configuration issues for each endpoint profile.
 
 
 
 
 ├
[V] fv:BDConfigIssues The network bridge domain configuration issues.
 
 
 
 
 ├
[V] fv:CtxConfigIssues The context configuration issues.
 
 
 
 ├
[V] snmp:ConfIssues SNMP policy configuration policy issues.
 
 
 ├
[V] pol:ConsElem Represents a policy consumption qualifier element.
 
 
 
 ├
[V] pol:If Represents an interface exposed or consumed by a policy.
 
 
 
 
 ├
[V] pol:ConsIf Represents a consumer interface.
 
 
 
 
 ├
[V] pol:ProvIf Represents a function or service provider interface.
 
 
 
 
 ├
[V] vz:AIf The abstraction of an interface. A contract interface and bundle interface inherits from this class.
 
 
 
 
 
 ├
[V] vz:CPIf A contract interface is used as a contract consumption interface when a consumer consumes the contract by associating it to a consumption interface provided by the provider in the consumer's domain. A consumer can associate with the contract consumption interface when it is provided by the provider in the consumer's domain. Note that a contract consumption interface represents one or more subjects defined under the contract. By associating...
 
 
 
 ├
[V] pol:Lbl Represents a policy label.
 
 
 
 
 ├
[V] dhcp:ALbl The identification of the DHCP provider. If the owner is the tenant, then the label is matched with the DHCP label present under the bridge domain (BD). If the owner is the infra, then the label is matched with the DHCP label present under the infra (and associated with the node). If n providers match the label, then all of them get configured as relay.
 
 
 
 
 
 ├
[V] dhcp:Lbl A DHCP relay label contains a name for the label, the scope, and a DHCP option policy. The scope is the owner of the relay server and the DHCP option policy supplies DHCP clients with configuration parameters such as domain, nameserver, and subnet router addresses.
 
 
 
 
 
 ├
[V] dhcp:LblDef Definition of the label.
 
 
 
 
 ├
[V] dns:ALbl The DNS profile identifier.
 
 
 
 
 
 ├
[V] dns:Lbl The network domain name label. Labels enable classifying which objects can and cannot communicate with one another.
 
 
 
 
 
 ├
[V] dns:LblDef The Label definition.
 
 
 
 
 ├
[V] extnw:ALIfP An abstract logical interface profile. This object defines the characteristics that will be applied to resources that match with the profile name.
 
 
 
 
 
 ├
[V] l2ext:AIfP The abstraction of an interface profile.
 
 
 
 
 
 
 ├
[V] l2ext:LIfP The logical interface profile defines a common configuration that can be applied to one or more interfaces.
 
 
 
 
 
 
 ├
[V] l2ext:LIfPDef The interface identifiers attached to the node profile.
 
 
 
 
 
 ├
[V] l3ext:AIfP An abstract interface profile. This encapsulates common behavior / configuration that will apply to one or more L3 external interfaces.
 
 
 
 
 
 
 ├
[V] l3ext:LIfP The logical interface profile, which defines a common configuration that can be applied to one or more interfaces.
 
 
 
 
 
 
 ├
[V] l3ext:LIfPDef The interface identifiers attached to the node profile.
 
 
 
 
 ├
[V] extnw:ALNodeP An abstract logical interface profile.
 
 
 
 
 
 ├
[V] l2ext:ALNodeP An abstract logical node profile. This defines the characteristics to be applied to resources that match with the profile name.
 
 
 
 
 
 
 ├
[V] l2ext:LNodeP The logical node profile defines a common configuration that can be applied to one or more leaf nodes.
 
 
 
 
 
 
 ├
[V] l2ext:LNodePDef The logical node profile definition. This defines the characteristics to be applied to resources that match with the profile name.
 
 
 
 
 
 ├
[V] l3ext:AConsLbl  Represents Abstraction of Logical Outside Profile Consumer Label. Defines the characteristics that will be applied to Layer3 Outside that matches with the label name
 
 
 
 
 
 
 ├
[V] l3ext:ConsLbl  Represents Logical Outside Profile Consumer Label. Defines the characteristics that will be applied to Layer3 Outside that matches with the label name
 
 
 
 
 
 
 ├
[V] l3ext:ConsLblDef  Represents Logical Outside Profile Consumer Label Definition. Defines the characteristics that will be applied to Layer3 Outside that matches with the label name
 
 
 
 
 
 ├
[V] l3ext:ALNodeP An abstract logical node profile. This defines the characteristics to be applied to resources that match with the profile name.
 
 
 
 
 
 
 ├
[V] l3ext:LNodeP The logical node profile defines a common configuration that can be applied to one or more leaf nodes.
 
 
 
 
 
 
 ├
[V] l3ext:LNodePDef The logical node profile definition. This defines the characteristics to be applied to resources that match with the profile name.
 
 
 
 
 
 ├
[V] rtctrl:LNodeP The node classification criteria for the route control context.
 
 
 
 
 
 ├
[V] rtctrl:LNodePDef The local node policy definition.
 
 
 
 
 ├
[V] infra:Lbl The tenant or provider characteristics of the port.
 
 
 
 
 
 ├
[V] infra:IfLblDef The tenant/provider's external connection characteristics of the port.
 
 
 
 
 
 ├
[V] infra:NodeLblDef The tenant or provider's external connection characteristics of the port.
 
 
 
 
 ├
[V] l3ext:AProvLbl  Represents Abstraction of Logical Outside Profile Provider Label. Defines the characteristics that will be applied to Layer3 Outside that matches with the label name
 
 
 
 
 
 ├
[V] l3ext:ProvLbl  Represents Logical Outside Profile Provider Label. Defines the characteristics that will be applied to Layer3 Outside that matches with the label name
 
 
 
 
 
 ├
[V] l3ext:ProvLblDef  Represents Logical Outside Profile Label Definition. Defines the characteristics that will be applied to Layer3 Outside that matches with the label name
 
 
 
 
 ├
[V] pol:ConsLbl Represents a consumer label
 
 
 
 
 
 ├
[V] vsvc:AConsLbl This is generated and used only by internal processes.
 
 
 
 
 
 
 ├
[V] dhcp:ConsLbl The consumer label.
 
 
 
 
 
 
 ├
[V] vsvc:ConsLbl A service consumer label.
 
 
 
 
 ├
[V] pol:ProvLbl Represents a function or service provider label.
 
 
 
 
 
 ├
[V] vsvc:AProvLbl An abstraction of the provider label.
 
 
 
 
 
 
 ├
[V] dhcp:ProvLbl The provider label.
 
 
 
 
 
 
 ├
[V] vsvc:ProvLbl A service provider label.
 
 
 
 
 ├
[V] span:ASpanLbl The abstraction of a SPAN label.
 
 
 
 
 
 ├
[V] span:SpanLbl The SPAN label is used for SPAN label parameters.
 
 
 
 
 
 ├
[V] span:SpanLblDef The SPAN label definition.
 
 
 
 
 ├
[V] vz:ALbl The labels for filtering subjects.
 
 
 
 
 
 ├
[V] vz:ACompLbl An abstraction of a complement label.
 
 
 
 
 
 
 ├
[V] vz:ACompLblDef An abstraction of a complement label definition.
 
 
 
 
 
 
 
 ├
[V] vz:ConsSubjLblDef A consumer subject label definition.
 
 
 
 
 
 
 
 ├
[V] vz:ProvLblDef A provider label definition.
 
 
 
 
 
 
 
 ├
[V] vz:ProvSubjLblDef A provider subject label definition. A subject label is used as a classification criteria for subjects being consumed/provided by the endpoint groups (EPGs) participating in the contract. The label identifies a subject being consumed by a consumer. It can be parented by 2 different methods. The first method is the relation between the consumer EPG and the contract that is used for filtering the subjects. A label should match either the subject na...
 
 
 
 
 
 
 ├
[V] vz:ConsSubjLbl A consumer subject label. In general, a subject label is used as a classification criteria for subjects being consumed/provided by the endpoint groups (EPGs) participating in the contract. The label identifies a subject being consumed by a consumer. It can be parented by 2 different methods. The first method is the relation between the consumer EPG and the contract that is used for filtering the subjects. A label should match either the subject n...
 
 
 
 
 
 
 ├
[V] vz:ProvLbl A label used by a provider for specifying its identity. The parent can be either the provider endpoint group or the relation between the provider endpoint group and a contract. A consumer with no label will consume from all the providers of the contract regardless of the provider label. A consumer with a specific label can only consume from providers matching the label.
 
 
 
 
 
 
 ├
[V] vz:ProvSubjLbl A subject label is used as classification criteria for subjects being consumed/provided by the endpoint groups (EPGs) participating in the contract. The label identifies a subject being provided by a provider. It can be parented by 2 different methods. The first method is the relation between the provider EPG and the contract that is used for filtering the subjects. A label should match either the subject name or the label present under the subje...
 
 
 
 
 
 ├
[V] vz:ALblDef An abstraction of a label definition.
 
 
 
 
 
 
 ├
[V] vz:ConsCtrctLblDef A consumer contract label definition.
 
 
 
 
 
 
 ├
[V] vz:ConsLblDef A consumer label definition.
 
 
 
 
 
 
 ├
[V] vz:ProvCtrctLblDef A provider contract label definition.
 
 
 
 
 
 ├
[V] vz:ConsCtrctLbl A consumer contract label. A contract label can be parented by the relation between an endpoint group (EPG) and security group. The EPG is associated with a group and lists all contracts it provides out of the group, as well as, optionally, contracts that it chooses to consume. If no consumption contracts are indicated, all contracts are consumed. If no provider contracts are identified, the EPG provides no contracts out of this group.
 
 
 
 
 
 ├
[V] vz:ConsLbl A label used by consumers to filter the providers. The label can be parented as follows: By the consumer endpoint group. By the relation between the consumer endpoint group and contract. By the relation between the contract interface and contract. By the relation between the consumer endpoint group and contract interface. A consumer with no label will consume from all the providers of the contract with no labels. A consumer with a specific label...
 
 
 
 
 
 ├
[V] vz:ProvCtrctLbl A label identifying a contract. A contract label can be parented by the relation between an endpoint group (EPG) and security group. The EPG is associated with a group and lists all contracts it provides out of the group, as well as, optionally, contracts that it chooses to consume. If no consumption contracts are indicated, all contracts are consumed. If no provider contracts are identified, the EPG provides no contracts out of this group.
 
 
 ├
[V] pol:DefRoot Represents the policy definition's subtree root.
 
 
 
 ├
[V] fv:Def An abstraction of the fabric virtualization policy definition.
 
 
 
 
 ├
[V] fv:AClassifier An abstraction of an endpoint group classifier.
 
 
 
 
 
 ├
[V] fv:ACrRule 
 
 
 
 
 
 
 ├
[V] fv:AACrtrn  Abstraction of Classifier used for Virtual Devices
 
 
 
 
 
 
 
 ├
[V] fv:ACrtrn An abstraction of the classifier used for virtual devices.
 
 
 
 
 
 
 
 
 ├
[V] fv:Crtrn A criterion.
 
 
 
 
 
 
 
 
 ├
[V] fv:CrtrnDef A definition object for a criterion.
 
 
 
 
 
 
 
 
 ├
[V] opflex:CrtrnDefRef  Ctrierion
 
 
 
 
 
 
 ├
[V] fv:ASCrtrn  Abstract class for a sub-criterion
 
 
 
 
 
 
 
 ├
[V] fv:SCrtrn  Sub-Criterion
 
 
 
 
 
 
 
 ├
[V] fv:SCrtrnDef  Definition object for Sub-Criterion
 
 
 
 
 ├
[V] fv:AUsegAssocBD 
 
 
 
 
 
 ├
[V] fv:UsegAssocBD 
 
 
 
 
 
 ├
[V] fv:UsegAssocBDDef 
 
 
 
 
 ├
[V] fv:Attr The attributes in the criterion.
 
 
 
 
 
 ├
[V] fv:ADnsAttr  DNS based Attributes
 
 
 
 
 
 
 ├
[V] fv:DnsAttr 
 
 
 
 
 
 ├
[V] fv:ADyAttr  Abstract Dynamic Member of the useg
 
 
 
 
 
 
 ├
[V] fv:DyMacAttrDef 
 
 
 
 
 
 ├
[V] fv:AIdAttr  Identity based Attributes
 
 
 
 
 
 
 ├
[V] fv:IdGroupAttr 
 
 
 
 
 
 
 ├
[V] fv:IdGroupAttrContDef  definition for the container which has all the group attributes
 
 
 
 
 
 ├
[V] fv:AStAttr  Abstract Static Member of the useg
 
 
 
 
 
 
 ├
[V] fv:AIpAttr An IP based attribute.
 
 
 
 
 
 
 
 ├
[V] fv:IpAttr The IP based attributes.
 
 
 
 
 
 
 
 ├
[V] fv:IpAttrDef The definition for an IP attribute.
 
 
 
 
 
 
 
 ├
[V] opflex:IpAttrDefRef  Definition object for IP attribute
 
 
 
 
 
 
 ├
[V] fv:AMacAttr The MAC-based attribute.
 
 
 
 
 
 
 
 ├
[V] fv:MacAttr A MAC based attribute.
 
 
 
 
 
 
 
 ├
[V] fv:MacAttrDef The definition for a MAC attribute.
 
 
 
 
 
 
 
 ├
[V] opflex:MacAttrDefRef  Definition object for Mac attribute
 
 
 
 
 
 
 ├
[V] fv:AProtoAttr Layer 4 protocol attributes in the criterion.
 
 
 
 
 
 
 
 ├
[V] fv:ProtoAttr The Layer 4 protocol attributes in the criterion.
 
 
 
 
 
 
 
 ├
[V] fv:ProtoAttrDef The definition object for a protocol attribute.
 
 
 
 
 
 
 ├
[V] fv:AVmAttr The virtual attributes in the criterion.
 
 
 
 
 
 
 
 ├
[V] fv:VmAttr The virtual attributes in the criterion.
 
 
 
 
 
 
 
 ├
[V] fv:VmAttrDef Definition object for VM attribute
 
 
 
 
 ├
[V] fv:Dom A virtual fabric domain.
 
 
 
 
 
 ├
[V] fv:L2Dom A private layer 2 domain.
 
 
 
 
 
 
 ├
[V] fv:ABD An abstract representation of a private layer 2 network context that belongs to a specific tenant or context, or is shared. This is an abstract class and cannot be instantiated.
 
 
 
 
 
 
 
 ├
[V] fv:ABDPol Abstract representation of a bridge domain policy.
 
 
 
 
 
 
 
 
 ├
[V] fv:BD A bridge domain is a unique layer 2 forwarding domain that contains one or more subnets. Each bridge domain must be linked to a context.
 
 
 
 
 
 
 
 
 ├
[V] fv:SvcBD A service bridge domain.
 
 
 
 
 
 
 
 ├
[V] fv:BDDef A private layer 2 network context that belongs to a specific tenant or context, or is shared.
 
 
 
 
 
 ├
[V] fv:L3Dom The private layer 3 domain.
 
 
 
 
 
 
 ├
[V] fv:ACtx A private L3 network context belonging to a specific tenant.
 
 
 
 
 
 
 
 ├
[V] fv:Ctx The private layer 3 network context that belongs to a specific tenant or is shared.
 
 
 
 
 
 
 
 ├
[V] fv:CtxDef A private L3 network context belonging to a specific tenant. This is an internal representation of the context.
 
 
 
 
 
 
 
 ├
[V] fv:TnlCtx 
 
 
 
 
 ├
[V] fv:Np An abstraction representing a set of requirements a group of entities has on the virtualizable fabric.
 
 
 
 
 
 ├
[V] cloud:App  Cloud Ap
 
 
 
 
 
 ├
[V] extnw:Out An abstraction of a policy controlling connectivity to outside such as another fabric or WAN.
 
 
 
 
 
 
 ├
[V] l2ext:Out The L2 outside policy controls connectivity to the outside.
 
 
 
 
 
 
 ├
[V] l3ext:Out The L3 outside policy controls connectivity to the outside.
 
 
 
 
 
 
 ├
[V] l3ext:OutDef The L4-L7 services route peering.
 
 
 
 
 
 ├
[V] fv:Ap The application profile is a set of requirements that an application instance has on the virtualizable fabric. The policy regulates connectivity and visibility among endpoints within the scope of the policy.
 
 
 
 
 
 ├
[V] fv:Up A set of requirements for datacenter utility functions on virtualized fabric.
 
 
 
 
 
 
 ├
[V] fabric:Pol The fabric policy.
 
 
 
 
 
 
 
 ├
[V] fabric:InfrP An abstraction of the fabric infrastructure-level policy for either fabric internal or external behaviors
 
 
 
 
 
 
 
 
 ├
[V] fabric:InfrExP An abstraction of the set of rules pertaining to external fabric behavior
 
 
 
 
 
 
 
 
 
 ├
[V] infra:ExP An abstraction of an external profile.
 
 
 
 
 
 
 
 
 
 
 ├
[V] infra:ClP The infrastructure client profile object.
 
 
 
 
 
 
 
 
 
 
 ├
[V] infra:ProvP The infrastructure provider profile.
 
 
 
 
 
 
 
 
 ├
[V] fabric:InfrFP A set of rules pertaining to internal fabric behavior.
 
 
 
 
 
 
 
 
 ├
[V] mgmt:MgmtP The in-band and out-of-band management endpoint groups consists of switches (leaves/spines) and APICs. Each node in the group is assigned an IP address that is dynamically allocated from the address pool associated with the corresponding in-band or out-of-band management zone.
 
 
 
 
 
 ├
[V] infra:AIpP An abstraction of a resolvable infrastructure profile.
 
 
 
 
 
 
 ├
[V] infra:IpP A resolvable hypervisor infrastructure profile.
 
 
 
 
 
 ├
[V] mgmt:ExtMgmtEntity The external entity management. The external entities (hosts) can communicate with nodes that are part of the out-of-band (OOB) management endpoint group. To enable this communication, hosts are connected to the OOB management port of the nodes.
 
 
 
 ├
[V] test:Rule An abstract class for a test rule.
 
 
 
 
 ├
[V] eqptdiag:ARule 
 
 
 
 
 
 ├
[V] eqptdiag:OnDRule 
 
 
 
 
 
 ├
[V] eqptdiag:Rule 
 
 
 ├
[V] pol:Ns Represents a policy namespace.
 
 
 
 ├
[V] fvns:AAddrInstP The abstract policy for address namespaces.
 
 
 
 
 ├
[V] fvns:AddrInst The IP address namespace/IP address range contains unicast and multicast address blocks.
 
 
 
 
 ├
[V] fvns:McastAddrInstDef The multicast address instance definition.
 
 
 
 
 ├
[V] fvns:McastAddrInstP The multicast address namespace policy defines the multicast IP address ranges. These addresses can be used for various purposes, such as VxLAN encapsulation.
 
 
 
 
 ├
[V] vns:AddrInst 
 
 
 
 ├
[V] fvns:AInstP The namespace policy is used for managing the Encap (VXLAN, NVGRE, VLAN) ranges.
 
 
 
 
 ├
[V] fc:EncapInstDef 
 
 
 
 
 ├
[V] fvns:AVlanInstP  Namespace Policy for VLAN ranges
 
 
 
 
 
 ├
[V] fvns:VlanInstDef 
 
 
 
 
 
 ├
[V] fvns:VlanInstP The VLAN range namespace policy defines for ID ranges used for VLAN encapsulation.
 
 
 
 
 ├
[V] fvns:AVsanInstP  Namespace Policy for VSAN ranges
 
 
 
 
 
 ├
[V] fvns:VsanInstP 
 
 
 
 
 ├
[V] fvns:AVxlanInstP The abstract class for Namespace Policy for VxLAN ranges.
 
 
 
 
 
 ├
[V] fvns:VxlanInstDef The VxLAN instance definition.
 
 
 
 
 
 ├
[V] fvns:VxlanInstP The VxLAN range namespace policy defines for ID ranges used for VLAN encapsulation
 
 
 
 
 ├
[V] stp:EncapInstDef The spanning-tree protocol encap instance profile definition. The segment IDs calculated using this profile are for spanning tree BPDU flooding within the fabric. It is implicitly managed by the IFC.
 
 
 ├
[V] pool:Pool An abstraction of a shared resource pool.
 
 
 ├
[V] pres:RegdPod 
 
 
 ├
[V] pres:RegdPodCont 
 
 
 ├
[V] qos:ADppPolHolder  Mo that will be attached to retrieve the DN of the qosDppPolDef that should be downloaded on the leaf in order to program the leaf
 
 
 
 ├
[V] qos:EgressDppPolHolder  DppPolHolder for Egress direction
 
 
 
 ├
[V] qos:IngressDppPolHolder  DppPolHolder for Ingress direction
 
 
 ├
[V] qos:ADscpTrans 
 
 
 
 ├
[V] qos:DscpTransDef 
 
 
 
 ├
[V] qos:DscpTransPol 
 
 
 ├
[V] qos:Class The QoS classification traffic descriptor and specifications are used to categorize a packet within a specific group and making the packet accessible for QoS handling in the network.
 
 
 ├
[V] qos:CustomPol The custom QoS policy enables different levels of service to be assigned to network traffic, including specifications for the Differentiated Services Code Point (DSCP) value(s), and the 802.1p Dot1p priority.
 
 
 ├
[V] qos:CustomPolDef The definition class for a custom QOS policy. Note that this is an internal object.
 
 
 ├
[V] qos:DppPolDefCont  Container for all the qos:DppPolDef, under top, to have them neatly organized
 
 
 ├
[V] qos:InstPol A QOS instance policy, which is a container for QOS class objects.
 
 
 ├
[V] qos:PfcIfPol  interface priority flow control
 
 
 ├
[V] qos:PfcPol 
 
 
 ├
[V] qos:SdIfPol  Slow drain policy
 
 
 ├
[V] resolution:RemotePolicyMgr 
 
 
 ├
[V] rtctrl:EpPRef  Routed EpP Reference
 
 
 ├
[V] rtctrl:Profile The route control profile specifies policies for external networks. The layer 3 networks outside the fabric, and reachable by a Tenant's applications, route to external networks.
 
 
 ├
[V] rtsum:ARtSummPol  TODO: exclude from tenant autoconfigs Route Summarization
 
 
 
 ├
[V] bgp:ARtSummPol  Route summarization policy for BGP
 
 
 
 
 ├
[V] bgp:RtSummPol 
 
 
 
 
 ├
[V] bgp:RtSummPolDef  Route summarization internal policy for BGP
 
 
 
 ├
[V] eigrp:ARtSummPol  Route summarization policy
 
 
 
 
 ├
[V] eigrp:RtSummPol 
 
 
 
 
 ├
[V] eigrp:RtSummPolDef  Route summarization internal policy
 
 
 
 ├
[V] ospf:ARtSummPol  External Route summarization abstract policy
 
 
 
 
 ├
[V] ospf:RtSummPol  External Route summarization abstract policy
 
 
 
 
 ├
[V] ospf:RtSummPolDef  External Route summarization internal policy
 
 
 ├
[V] rtsum:ARtSummPolDef 
 
 
 ├
[V] rule:Definition 
 
 
 ├
[V] snmp:APol An abstract representation of a policy. A profile contains site info and general protocol config parameters (such as version and traps vs. informs).
 
 
 
 ├
[V] snmp:Inst A container for each SNMP instance.
 
 
 
 ├
[V] snmp:Pol The SNMP policy enables you to monitor client group, v3 user, and/or community SNMP policies. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
 
 
 ├
[V] span:ASrc The abstraction of an SPAN source. The SPAN source is where traffic is sampled. A source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (Tenant, Access or fabric) determines the allowed types of SPAN sources and de...
 
 
 
 ├
[V] span:AVSrc The abstraction of a VSPAN source. The VSPAN source is where traffic is sampled. A VSPAN source can an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access VSPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric VSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (Tenant, Access or fabric) determines the allowed types of span sources...
 
 
 
 
 ├
[V] span:VSrc The VSPAN source, which is where traffic is sampled. A VSPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access VSPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric VSPAN). When you create a traffic monitoring session, you must select a VSPAN source and a VSPAN destination. The type of session (Tenant, Access, or Fabric) determines the allowed types of VSPAN sources and destinations. The ...
 
 
 
 
 ├
[V] span:VSrcDef The VSPAN VSrcDef is used for VSPAN source definitions.
 
 
 
 ├
[V] span:Src The SPAN or ERSPAN source is where traffic is sampled. A source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (access SPAN), a Layer 2 bridge domain, or a Layer 3 context (fabric SPAN). When you create a traffic monitoring session, you must select a source and a destination. The type of session (tenant, access, or fabric) determines the allowed types of sources and destinations. The destination can be eithe...
 
 
 
 ├
[V] span:SrcDef The SPAN source definitions. The SPAN source is where traffic is sampled. A SPAN source can be an endpoint group (EPG), one or more ports, or port traffic filtered by an EPG (Access SPAN), a Layer 2 bridge domain, or a Layer 3 context (Fabric SPAN). When you create a traffic monitoring session, you must select a SPAN source and a SPAN destination. The type of session (tenant, access or fabric) determines the allowed types of SPAN sources and dest...
 
 
 ├
[V] stp:AEncapBlkDef An abstraction of a spanning tree encap block.
 
 
 
 ├
[V] stp:AllocEncapBlkDef The spanning-tree protocol encap block definition for allocated IDs and the base segment ID used for the range. These segment IDs are used for spanning tree BPDU flooding within the fabric. It is implicitly managed by the IFC.
 
 
 
 ├
[V] stp:UnAllocEncapBlkDef The spanning-tree protocol encap block definition for un-allocated IDs and the base Segment ID used for the range. These segment IDs are used for spanning tree BPDU flooding within the fabric. It is implicitly managed by the IFC.
 
 
 ├
[V] stp:AEncapCont An abstraction of a container for managing the spanning tree flooding segment ID range.
 
 
 
 ├
[V] stp:AllocEncapCont A container for managing the spanning tree flooding segment ID range.
 
 
 
 ├
[V] stp:UnAllocEncapCont The container for managing the spanning tree flooding segment ID range.
 
 
 ├
[V] svccore:Pol A core policy.
 
 
 
 ├
[V] svccore:CtrlrPol A controller core retention policy.
 
 
 
 ├
[V] svccore:NodePol The core collection policy contains the system or component failure information. You can configure the policy to export a copy of the core file to a location on an external TFTP server as soon as the core file is created.
 
 
 ├
[V] synthetic:LocalPol 
 
 
 ├
[V] synthetic:Policy 
 
 
 ├
[V] sysmgrp:Def Abstract class for all QoS policy definitions.
 
 
 
 ├
[V] sysmgrp:Cores Represents a container for a cores policy.
 
 
 ├
[V] tag:ASelector 
 
 
 
 ├
[V] cloud:AEPSelector  Base Class for Cloud Endpoint Selectors
 
 
 
 
 ├
[V] cloud:AEPSelectorDef  Base Class for Cloud Endpoint Selectors Resolved model MOs
 
 
 
 
 
 ├
[V] cloud:EPSelectorDef  Cloud Endpoint Selector, to decide which endpointss belong to the EPGs based on several parameters, different selectors will be considered as OR
 
 
 
 
 
 ├
[V] cloud:ExtEPSelectorDef  Cloud Endpoint Selector, to decide which endpointss belong to the EPGs based on several parameters, different selectors will be considered as OR
 
 
 
 
 ├
[V] cloud:EPSelector  Cloud Endpoint Selector, to decide which endpointss belong to the EPGs based on several parameters, different selectors will be considered as OR
 
 
 
 
 ├
[V] cloud:ExtEPSelector  Cloud Endpoint Selector, to decide which endpointss belong to the EPGs based on several parameters, different selectors will be considered as OR
 
 
 
 ├
[V] cloud:AEPgSelector  EPG Selector to correlate the cloudEPg with the corresponding fvAEPg from which it can inherit all the security policies. This is optional
 
 
 
 ├
[V] telemetry:Selector 
 
 
 ├
[V] telemetry:AFlowServers 
 
 
 
 ├
[V] telemetry:FlowServers 
 
 
 ├
[V] telemetry:AServer 
 
 
 
 ├
[V] telemetry:LogServer 
 
 
 
 ├
[V] telemetry:StatsServer 
 
 
 ├
[V] telemetry:AServerP 
 
 
 
 ├
[V] telemetry:LogServerP 
 
 
 
 ├
[V] telemetry:Server 
 
 
 
 ├
[V] telemetry:StatsServerP 
 
 
 ├
[V] telemetry:AServerPol 
 
 
 ├
[V] telemetry:FlowCollectorP 
 
 
 ├
[V] telemetry:FlowServerP 
 
 
 ├
[V] telemetry:FltPolGrp 
 
 
 ├
[V] telemetry:MatchedSelector 
 
 
 ├
[V] telemetry:Provider  Node to which we need to create a static route
 
 
 ├
[V] telemetry:VipP 
 
 
 ├
[V] throttler:ASub  Abstract Subscription Request
 
 
 
 ├
[V] throttler:InProgress  In-Progress Subscription
 
 
 
 ├
[V] throttler:Postponed  Postponed Subscription
 
 
 ├
[V] throttler:InProgressCont  Container for In-progress subscriptions
 
 
 ├
[V] throttler:NodeCont 
 
 
 ├
[V] throttler:PostponedCont  Container for postponed subscriptions
 
 
 ├
[V] throttler:SubCont 
 
 
 ├
[V] topoctrl:FastLinkFailoverInstPol 
 
 
 ├
[V] topoctrl:FwdScaleProfilePol 
 
 
 ├
[V] traceroutep:TrEpSummary  Traceroute EP summary MO
 
 
 
 ├
[V] traceroutep:FromEpExtSummary  Traceroute Source EPEXT summary MO
 
 
 
 ├
[V] traceroutep:FromEpSummary  Traceroute Source EP summary MO
 
 
 
 ├
[V] traceroutep:ToEpSummary  Traceroute Dest EP summary MO
 
 
 
 ├
[V] traceroutep:ToExtEpSummary  Traceroute Dest ExtEP summary MO
 
 
 ├
[V] traceroutep:TrExtSummary  Traceroute External summary MO
 
 
 
 ├
[V] traceroutep:FromExtEpSummary  Traceroute Source External for ExtEp summary MO
 
 
 
 ├
[V] traceroutep:FromExtExtSummary  Traceroute Source External for ExtExt summary MO
 
 
 ├
[V] traceroutep:TrP ***************** MOs *******************
 
 
 
 ├
[V] traceroutep:TrEp The traceroute source is the endpoint source information of the traceroute connected to ToR.
 
 
 
 ├
[V] traceroutep:TrEpExt 
 
 
 
 ├
[V] traceroutep:TrExtEp  Traceroute an External IP address from an End Point learned as being connected to ToR
 
 
 
 ├
[V] traceroutep:TrExtExt  Traceroute an External IP address from an External IP
 
 
 
 ├
[V] traceroutep:TrNode The traceroute for a ToR node allows you to determine the path a packet takes to get to a destination from a given source by returning the sequence of hops the packet traversed.
 
 
 ├
[V] trig:Inst An abstraction of a generalized system trigger.
 
 
 
 ├
[V] trig:Meta The meta scheduler.
 
 
 
 ├
[V] trig:Sched A generic scheduler.
 
 
 ├
[V] trig:RoProxyCont 
 
 
 ├
[V] trig:SchedP The scheduler policy enables you to schedule a recurring or one-time window for the execution of a task. Multiple scheduler policies can be created for the same time period.
 
 
 ├
[V] trig:Triggerable A container for a triggerable object.
 
 
 
 ├
[V] trig:SingleTriggerable A triggerable object that can be triggered only once for each instance of a scheduler window.
 
 
 
 
 ├
[V] callhome:InvTrig When you manually trigger an inventory alert group message and do not specify a destination profile name, a message is sent to all active profiles that have either a normal or periodic subscription to the specified alert group.
 
 
 
 
 ├
[V] config:ExportJobTrig The export job trigger.
 
 
 
 
 ├
[V] config:ImportIdJobTrig 
 
 
 
 
 ├
[V] config:ImportJobTrig The import job trigger.
 
 
 
 
 ├
[V] config:RollbackJobTrig 
 
 
 
 
 ├
[V] config:SnapshotMgrJobTrig 
 
 
 
 
 ├
[V] dbgexp:TechSupTrig This object is managed internally and should not be modified by the user.
 
 
 
 
 ├
[V] maint:MaintTrig Triggerable object on which the scheduler triggers a callback for maintenance.
 
 
 
 
 ├
[V] recovery:ReconcileConfigJobTrig 
 
 
 
 
 ├
[V] troubleshoot:SessionTrigger  Trigger on which the scheduler issues a callback. For internal use only.
 
 
 
 ├
[V] trig:Test An internal object for testing if an object can be triggered.
 
 
 ├
[V] ui:Settings 
 
 
 ├
[V] useg:AUsegEPg 
 
 
 
 ├
[V] useg:UsegEPg 
 
 
 
 ├
[V] useg:UsegEPgDef 
 
 
 ├
[V] useg:BaseEPg 
 
 
 ├
[V] vns:AConn A connector.
 
 
 
 ├
[V] vns:AFuncConn A function connector.
 
 
 
 
 ├
[V] vns:AbsFuncConn An abstract function node connector is used to map a service graph interface with the device interface.
 
 
 
 
 ├
[V] vns:FuncConnInst A function connector instance.
 
 
 
 ├
[V] vns:ATermConn A terminal node connector.
 
 
 
 
 ├
[V] vns:AbsTermConn An abstract terminal node connector.
 
 
 
 
 ├
[V] vns:TermConnInst A connector instance.
 
 
 
 ├
[V] vns:CopyConnector  CopyConnector is deprecated
 
 
 ├
[V] vns:AConnection A connection.
 
 
 
 ├
[V] vns:AbsConnection An abstract connection connects two abstract connectors. These connections can either be between two abstract nodes or between an abstract node and an abstract terminal node.
 
 
 
 ├
[V] vns:ConnectionInst A connection instance.
 
 
 ├
[V] vns:AGraph A service graph is an ordered set of function nodes between a set of terminals, which identifies a set of network service functions that are required by an application. Service functions within a graph are automatically provisioned on a service device that is based on an application's requirements.
 
 
 
 ├
[V] vns:AbsGraph The abstract graph is made up of abstract nodes and used to define the traffic flow through a service function such as load balancing, SSL offload, and firewall. Abstract nodes are comprised of service nodes such as a service node balancer (SLB) or firewall (FW), abstract term nodes (the nodes that are connected to endpoint groups), and connections.
 
 
 
 ├
[V] vns:GraphInst The instance of a service graph. All instance objects are implicit.
 
 
 ├
[V] vns:ANode A node.
 
 
 
 ├
[V] vns:AFuncNode A function node.
 
 
 
 
 ├
[V] vns:ANodeInst The abstraction of a node instance.
 
 
 
 
 
 ├
[V] vns:NodeInst An instance of a function node. A service graph consists of multiple function nodes..
 
 
 
 
 
 ├
[V] vns:NodeInstDef An instance of the service node. This is an internal object.
 
 
 
 
 ├
[V] vns:AbsNode An abstract node represents a service node such as a server load balancer (SLB) or firewall (FW). An abstract node is contained in an abstract graph.
 
 
 
 ├
[V] vns:ATermNode A terminal node.
 
 
 
 
 ├
[V] vns:AbsTermNode An abstract terminal node. Abstract terminal nodes are typically attached to the endpoint groups, and are connected to the abstract graph (AbsGraph) through an abstract connection (AbsConnection).
 
 
 
 
 
 ├
[V] vns:AbsTermNodeCon An abstract terminal node connected to a contract consumer.
 
 
 
 
 
 ├
[V] vns:AbsTermNodeProv An abstract terminal node connected to contract provider.
 
 
 
 
 ├
[V] vns:TermNodeInst A terminal node instance.
 
 
 ├
[V] vns:AVNode A virtual node.
 
 
 
 ├
[V] vns:LegVNode A classic mode or legacy virtual node.
 
 
 
 ├
[V] vns:StsVNode A VNode. Holds the resources allocated to render a node instance on a specific Cdev.
 
 
 
 ├
[V] vns:VNodeDef The virtual node definition. This object is used internally.
 
 
 ├
[V] vns:AbsDevCfg A shared configuration for a logical device in the L4-L7 device cluster. This configuration can be shared across multiple logical devices.
 
 
 ├
[V] vns:AbsFuncCfg The configuration for a function. This configuration can be shared across multiple functions.
 
 
 ├
[V] vns:AbsFuncProf An abstract function profile includes the abstract device configuration, the abstract group configuration, and the abstract function configuration. These are analogous to the function configuration, group configuration, and device configuration within a device.
 
 
 ├
[V] vns:AbsFuncProfContr A function profile group container.
 
 
 ├
[V] vns:AbsFuncProfGrp A function profile group.
 
 
 ├
[V] vns:AbsFuncProfNormalized  Normalized Abs Function Profile
 
 
 ├
[V] vns:AbsGrpCfg The shared configuration for a function group. This configuration can be shared across multiple logical groups.
 
 
 ├
[V] vns:BDDef A bridge domain definition for tracking allocated bridge domains. This is an internally used object.
 
 
 ├
[V] vns:BackupPol 
 
 
 ├
[V] vns:CfgDef GraphInst contains a copy of the per logical device shared configuration.
 
 
 
 ├
[V] vns:DevCfgInst GraphInst contains a copy of the per logical device shared configuration.
 
 
 
 ├
[V] vns:FuncCfgInst A per function configuration instance.
 
 
 
 ├
[V] vns:GrpCfgInst A per function group shared configuration.
 
 
 ├
[V] vns:Chassis 
 
 
 ├
[V] vns:CloudSvcEPgDef  Internal Use only - Used to track allocated epgs
 
 
 ├
[V] vns:DevMgr 
 
 
 ├
[V] vns:EPgDef An object used to track allocated endpoint groups. This object is used internally.
 
 
 ├
[V] vns:EpgDefXlate 
 
 
 ├
[V] vns:GraphIdCntnr Contains an ID consumer for the IDs needed by the graph.
 
 
 ├
[V] vns:GraphInstCons 
 
 
 ├
[V] vns:MscGraphXlateCont Explicit Mo to configure pctag translation for internal EPgs>
 
 
 ├
[V] vns:NodeInstIdCntnr 
 
 
 ├
[V] vns:RedirectHealthGroup 
 
 
 ├
[V] vns:RtrCfg 
 
 
 ├
[V] vns:SvcEPgPol 
 
 
 ├
[V] vns:SvcGraphVersion The version of the entire service graph model. This is validated against the device script APIC model version. This number is of the form x.y, where x represents the major version number and y represents the minor version number of the service graph model. Guidelines: 1. The minor version is increased whenever a backward compatible change is made. This could include adding new properties or managed objects in the service graph model. It is expect...
 
 
 ├
[V] vns:SvcRedirectPol 
 
 
 ├
[V] vns:SvcRelnCons 
 
 
 ├
[V] vz:ACollection The abstraction of a contract collection. A collection can be a single contract, a collection of all contracts associated with a bundle, or a collection of all contracts associated with a group.
 
 
 
 ├
[V] vz:ACtrct An abstraction of a resolvable contract.
 
 
 
 
 ├
[V] vz:ABrCP An abstraction of a binary contract profile.
 
 
 
 
 
 ├
[V] vz:BrCP A contract is a logical container for the subjects which relate to the filters that govern the rules for communication between endpoint groups (EPGs). Without a contract, the default forwarding policy is to not allow any communication between EPGs but all communication within an EPG is allowed.
 
 
 
 
 
 ├
[V] vz:OOBBrCP An out-of-band binary contract profile can only be provided by an out-of-band endpoint group and can only be consumed by the external prefix set. A regular endpoint group cannot provide or consume an out-of-band contract profile.
 
 
 
 
 ├
[V] vz:Taboo A Taboo contract provides a way for an endpoint group to specify the subjects on which communication is not allowed.
 
 
 ├
[V] vz:ACollectionDef An abstraction of a collection definition. A collection is a contract
 
 
 
 ├
[V] vz:CollectionDef A collection definition.
 
 
 
 ├
[V] vz:TabooDef A taboo definition.
 
 
 ├
[V] vz:AContDef An abstraction of a container definition.
 
 
 
 ├
[V] vz:DirAssDef A direct association definition for a collection. A collection is a contract.
 
 
 
 ├
[V] vz:EpgAnyDef Any endpoint group definition.
 
 
 
 ├
[V] vz:InheritedDef 
 
 
 
 ├
[V] vz:IntDef An interface definition.
 
 
 
 ├
[V] vz:IntraEPgDef 
 
 
 
 ├
[V] vz:SubjDef A subject definition.
 
 
 ├
[V] vz:AFilterable An abstraction of a filter object. The filter object is a filter.
 
 
 
 ├
[V] vz:AFilterableUnit An abstraction of a filterable unit.
 
 
 
 
 ├
[V] actrl:Flt The filter rules identifying a group of filter entries.
 
 
 
 
 ├
[V] vz:AFilter An abstraction of a filter. A filter is a group of resolvable filter entries. Each filter entry is a combination of network traffic classification properties. Note that this relation is an internal object.
 
 
 
 
 
 ├
[V] vz:Filter A filter policy is a group of resolvable filter entries. Each filter entry is a combination of network traffic classification properties.
 
 
 
 
 
 ├
[V] vz:RFltP A remote filter profile.
 
 
 
 
 ├
[V] vz:ERFltP 
 
 
 ├
[V] vz:AnyREpPCtrct 
 
 
 ├
[V] vz:FltTaskAggrCont A container for a filter task aggregator.
 
 
 ├
[V] vz:GraphCont The graph container.
 
 
 ├
[V] vz:GraphDef A graph definition.
 
 
 ├
[V] vz:ResPcTagCont 
 
 ├
[V] pol:DependencyCont 
 
 ├
[V] pol:DependencyExpression 
 
 ├
[V] pol:Instr Represents a policy control instrumentation object.
 
 
 ├
[V] acl:ACL  Abstract representation of access control-list
 
 
 
 ├
[V] ipv4acl:ACL  IPv4 ACL
 
 
 
 ├
[V] ipv6acl:ACL  IPv6 ACL
 
 
 ├
[V] actrl:Scope The scope of the zoning rules.
 
 
 ├
[V] analytics:MatchAcl  Match ACL
 
 
 ├
[V] analytics:Monitor  Flow Monitor
 
 
 ├
[V] analytics:Policy  Policy Container for ACLs
 
 
 ├
[V] analytics:Profile  Analytics profile
 
 
 ├
[V] analytics:RecordP  Flow Record
 
 
 ├
[V] analytics:RecordSsx SSX Record
 
 
 ├
[V] analytics:RemoteNode  Abstract remote node info
 
 
 
 ├
[V] analytics:Collector  Flow Collector
 
 
 
 ├
[V] analytics:Controller  Controller information for bootstrapping the analytics agent
 
 
 ├
[V] analytics:Sampler  Sampler
 
 
 ├
[V] bfd:AuthP  This object holds authentication policy information
 
 
 ├
[V] bgp:ARtP  Abstract Route Policy
 
 
 
 ├
[V] bgp:RtP  Route policy holds all route targets and route controls
 
 
 
 ├
[V] bgp:RttP The route target policy.
 
 
 ├
[V] bgp:Gr The per-domain graceful restart information.
 
 
 ├
[V] bgp:InvalidRREp An invalid route reflector selection.
 
 
 ├
[V] bgp:MaxPfxP The maximum prefix policy specifies the action to be taken when the number of prefixes advertised by the peer crosses a specified maximum limit. This policy is used as a defensive mechanism to protect resources on the router.
 
 
 ├
[V] cloud:EpInfoHolder 
 
 
 ├
[V] cloud:HostRouterInfoHolder 
 
 
 ├
[V] cloud:HostRouterRgInfoHolder 
 
 
 ├
[V] cloud:HostRouterToInfoHolder 
 
 
 ├
[V] cloud:HostRouterTunnelInfoHolder 
 
 
 ├
[V] cloud:HostRouterUserRgInfoHolder 
 
 
 ├
[V] cloud:RgInfoHolder 
 
 
 ├
[V] coop:AuthP  This object holds authentication policy information
 
 
 ├
[V] coop:RepP All the repository policies information.
 
 
 ├
[V] dpp:Policer  Holder for policer class policy, each class describes a set of rules describing the policer rate policy
 
 
 
 ├
[V] dpp:Class  Holder for dpp class policy, each class describes a set of rules describing the policer rates
 
 
 ├
[V] eigrp:AStubP The abstraction of an stub profile.
 
 
 
 ├
[V] eigrp:StubDef An EIGRP stub policy definition.
 
 
 
 ├
[V] eigrp:StubPol The EIGRP Stub Policy.
 
 
 ├
[V] eigrp:AuthP  This object holds authentication policy information
 
 
 ├
[V] eigrp:Gr 
 
 
 ├
[V] eigrp:StubP The stub policy.
 
 
 ├
[V] eqpt:BrkoutPortP  Port policy
 
 
 ├
[V] eqpt:ConsoleP The console policy.
 
 
 ├
[V] eqpt:PsgP The power supply group policy.
 
 
 ├
[V] eqpt:SlotP The policy container for a slot.
 
 
 ├
[V] fhs:DhcpGuard  DHCP Guard Policy information
 
 
 ├
[V] fv:RInfoHolder An internal object for filtering security rules.
 
 
 ├
[V] hcbgp:ARtP  Abstract Route Policy
 
 
 
 ├
[V] hcbgp:RtP  Route policy holds all route targets and route controls
 
 
 ├
[V] hcipsec:Profile  Holds Ipsec Profile information
 
 
 ├
[V] hcipsec:SAPolicy  Holds Ipsec Security Association Policy
 
 
 ├
[V] hcipsec:TransformSet  Holds Ipsec Transform-Set Policy
 
 
 ├
[V] hcisakmp:GlobalPol  Holds Isakmp Cloud Router-Level Common Policy
 
 
 ├
[V] hcisakmp:Ikev2Policy  Ikev2 Policy
 
 
 ├
[V] hcisakmp:Ikev2Profile 
 
 
 ├
[V] hcisakmp:Keyring 
 
 
 ├
[V] hcisakmp:Policy  Holds Isakmp Policy information
 
 
 ├
[V] hcisakmp:Profile 
 
 
 ├
[V] hsrp:AuthP 
 
 
 ├
[V] im:ForcedBrkoutPortP  Forced Breakout Port policy
 
 
 ├
[V] ip:Nexthop The nexthops for the static route.
 
 
 
 ├
[V] ipv4:Nexthop The next hops for the static route.
 
 
 
 ├
[V] ipv4:NexthopStub 
 
 
 
 ├
[V] ipv6:Nexthop The next hops for the static route.
 
 
 
 ├
[V] ipv6:NexthopStub 
 
 
 ├
[V] ip:NexthopEP  Nexthop Endpoint for the static IP EP
 
 
 
 ├
[V] ipv4:NexthopEP  Nexthop EP for the static route
 
 
 
 ├
[V] ipv6:NexthopEP  Nexthop Endpoint for the static route
 
 
 ├
[V] ip:Route The static route definitions.
 
 
 
 ├
[V] ipv4:Route The static route definitions.
 
 
 
 ├
[V] ipv6:Route The static route definitions.
 
 
 ├
[V] ip:RouteEP  Static route definitions
 
 
 
 ├
[V] ipv4:RouteEP  Static route IP Endpoint definitions
 
 
 
 ├
[V] ipv6:RouteEP  Static route IP Endpoint definitions
 
 
 ├
[V] ipagectrl:IpAgingP  Fabric IP Aging policy
 
 
 ├
[V] isis:Gr Per- graceful restart information.
 
 
 ├
[V] isis:MeshGrp The mesh group information per interface.
 
 
 ├
[V] l1:EeeP An energy efficient Ethernet policy.
 
 
 ├
[V] l2:EpRetPol An endpoint retention policy identifying the duration of how long information is kept about the remote endpoint. This is expressed through a set of triggering and ageing control parameters.
 
 
 ├
[V] l2:MacCktCons 
 
 
 ├
[V] l2:MacCktEp  Mac EP policy
 
 
 ├
[V] l2:MacCktRef  Mac EP reference
 
 
 ├
[V] l3:IpCktEp  IP Circuit Endpoint
 
 
 ├
[V] l3:StaticRouteIpEp  Static Route IP end point
 
 
 ├
[V] mcast:AQuerier  Querier
 
 
 
 ├
[V] ipmc:QuerierP  This objects hold per IP Multicast Querier information
 
 
 
 
 ├
[V] igmp:QuerierP  This object holds querier information per interface
 
 
 
 
 ├
[V] mld:QuerierP  This object holds querier information per interface
 
 
 
 ├
[V] ipmcsnoop:QuerierP  Querier policy
 
 
 
 
 ├
[V] igmpsnoop:QuerierP When an IGMP snooping querier is enabled on a leaf, it sends out periodic IGMP queries on front panel ports of a BD on that leaf.
 
 
 
 
 ├
[V] ipmcsnoop:QuerierSt  Querier state
 
 
 
 
 
 ├
[V] igmpsnoop:QuerierSt Shows the IGMP Snoop querier state.
 
 
 
 
 
 ├
[V] mldsnoop:QuerierSt  Querier state
 
 
 
 
 ├
[V] mldsnoop:QuerierP  Querier policy
 
 
 ├
[V] mcast:AResP  This object holds resource (router state) limit policy to limit amount of multicast routing state on the router
 
 
 
 ├
[V] igmp:ResP  This object holds resource (router state) limit policy to limit amount of multicast routing state on the router
 
 
 
 ├
[V] mld:ResP  This object holds resource (router state) limit policy to limit amount of multicast routing state on the router
 
 
 
 ├
[V] pim6:ResP  This object holds resource (router state) limit policy to limit amount of multicast routing state on the router
 
 
 
 ├
[V] pim:ResP Resource (router state) limit policy.
 
 
 ├
[V] nw:FltEntry An endpoint abstraction.
 
 
 
 ├
[V] actrl:PfxEntry The prefix list entry definition.
 
 
 
 ├
[V] rtflt:Entry A router filter entry definition.
 
 
 
 
 ├
[V] rtcom:Entry A community list entry definition.
 
 
 
 
 
 ├
[V] rtextcom:Entry An extended community list entry.
 
 
 
 
 
 ├
[V] rtregcom:Entry A regular community list entry.
 
 
 
 
 ├
[V] rtmap:Entry An RPM route-map entry.
 
 
 
 
 ├
[V] rtpfx:Entry A prefix list entry definition.
 
 
 
 ├
[V] rtflt:Item A router filter item.
 
 
 
 
 ├
[V] rtcom:Item An item in the community list entry.
 
 
 
 
 
 ├
[V] rtextcom:Item An item in the extended community list.
 
 
 
 
 
 ├
[V] rtregcom:Item A regular community item.
 
 
 ├
[V] nw:FltRule A filter rule.
 
 
 
 ├
[V] ac:Rule Represents an ordered set of rules specifing atomic counter policies. Atomic counter policies specify a set of match criteria for counting packets. These policies are used for debugging packet drops inside the fabric. This is an abstract class and cannot be instantiated.
 
 
 
 
 ├
[V] ac:RuleArp Represents an ARP-based rule for the atomic counters.
 
 
 
 
 ├
[V] ac:RuleIp Specifies the IP entry.
 
 
 
 
 ├
[V] ac:RuleMac Represents media access control (MAC) address-based rules for the atomic counters.
 
 
 
 ├
[V] actrl:ARule An ordered set of rules specifying access control policies based on src/dst policy tag and filter ID.
 
 
 
 
 ├
[V] actrl:MgmtRule The zoning rules for management endpoint groups.
 
 
 
 
 ├
[V] actrl:Rule The zoning rules for tenant endpoint groups.
 
 
 
 
 ├
[V] actrl:SnmpRule The zoning rules for SNMP endpoint groups.
 
 
 
 ├
[V] rtflt:Rule A container for a list of entries that are matched against the route to apply the route control policies.
 
 
 
 
 ├
[V] rtcom:Rule A route control rule for community lists.
 
 
 
 
 
 ├
[V] rtextcom:Rule A route control rule for extended community lists.
 
 
 
 
 
 ├
[V] rtregcom:Rule A route control rule for regular community lists.
 
 
 
 
 ├
[V] rtmap:Rule A route map rule.
 
 
 
 
 ├
[V] rtpfx:Rule A route control rule for prefix lists.
 
 
 
 ├
[V] rtmap:Match An abstraction for a match rule.
 
 
 
 
 ├
[V] rtmap:MatchComm A match rule based on communities.
 
 
 
 
 
 ├
[V] rtmap:MatchExtComm A match rule based on extended communities.
 
 
 
 
 
 ├
[V] rtmap:MatchRegComm A match rule based on regular communities.
 
 
 
 
 ├
[V] rtmap:MatchIPv6Mcast  Match Multicast
 
 
 
 
 ├
[V] rtmap:MatchIpMcast  Match Multicast
 
 
 
 
 ├
[V] rtmap:MatchNhIf  Match rule based on Nexthop Interace
 
 
 
 
 ├
[V] rtmap:MatchOspfArea  Match rule based on Ospf Area
 
 
 
 
 ├
[V] rtmap:MatchRtDst A match rule based on route destinations.
 
 
 
 
 ├
[V] rtmap:MatchRtNh A match rule based on route next hops.
 
 
 
 
 ├
[V] rtmap:MatchRtPervasive A match rule based on pervasive routes.
 
 
 
 
 ├
[V] rtmap:MatchRtSrc A match rule based on route sources.
 
 
 
 
 ├
[V] rtmap:MatchRtTag A match rule based on route tag.
 
 
 
 
 ├
[V] rtmap:MatchRtType A match rule based on route types.
 
 
 
 ├
[V] rtmap:Set An abstraction for a set rule.
 
 
 
 
 ├
[V] rtmap:SetASPath  Set rule based on AS Path
 
 
 
 
 ├
[V] rtmap:SetComm A set rule based on communities.
 
 
 
 
 
 ├
[V] rtmap:SetExtComm A set rule based on generic extended communities.
 
 
 
 
 
 ├
[V] rtmap:SetRegComm A set rule based on regular communities.
 
 
 
 
 
 ├
[V] rtmap:SetRttComm A set rule based on route targets communities.
 
 
 
 
 ├
[V] rtmap:SetDampeningCtrl  Set rule for route-dampening
 
 
 
 
 ├
[V] rtmap:SetMetric A set rule based on metric.
 
 
 
 
 ├
[V] rtmap:SetMetricType 
 
 
 
 
 ├
[V] rtmap:SetNh A set rule based on next hop.
 
 
 
 
 ├
[V] rtmap:SetOspfFwdAddr A set rule based on an OSPF forwarding address.
 
 
 
 
 ├
[V] rtmap:SetOspfNssa A set rule based on ospf-nssa.
 
 
 
 
 ├
[V] rtmap:SetPathSelect  Set rule based on path-selection
 
 
 
 
 ├
[V] rtmap:SetPref A set rule based on preference.
 
 
 
 
 ├
[V] rtmap:SetRtDist 
 
 
 
 
 ├
[V] rtmap:SetRtTag A set rule based on route tag.
 
 
 
 
 ├
[V] rtmap:SetWeight A set rule based on weight.
 
 
 ├
[V] ospf:AGr An abstraction of the per domain graceful restart information.
 
 
 
 ├
[V] ospf:Gr The OSPF domain related statistics.
 
 
 
 ├
[V] ospfv3:Gr The OSPF domain related statistics.
 
 
 ├
[V] ospf:ALsaCtrl This object holds lsa related frequency controls, none of these need to be exposed to the user.
 
 
 
 ├
[V] ospf:LsaCtrl The LSA-related frequency control information.
 
 
 
 ├
[V] ospfv3:LsaCtrl The LSA-related frequency control information.
 
 
 ├
[V] ospf:AMaxLsaP An abstraction of the maximum link-state advertisement (database overflow) feature.
 
 
 
 ├
[V] ospf:MaxLsaP The maximum link-state advertisement (database overflow) feature.
 
 
 
 ├
[V] ospfv3:MaxLsaP The per domain max-lsa information.
 
 
 ├
[V] ospf:ASpfComp An abstraction of spf computation frequency controls, none of these need to be exposed to the user
 
 
 
 ├
[V] ospf:SpfComp The SPF computation frequency controls information.
 
 
 
 ├
[V] ospfv3:SpfComp The SPF computation frequency controls information.
 
 
 ├
[V] ospf:AuthP The OSPF authentication policy information.
 
 
 ├
[V] ospf:Overload  This object holds ospf overload config
 
 
 ├
[V] pim6:Overload  This object holds pim overload config
 
 
 ├
[V] pim:Overload PIM overload configuration
 
 
 ├
[V] policer:Class A container for the policer class policy.
 
 
 
 ├
[V] copp:Class Represents a control plane policing (COPP) policy class, which contains a set of rules describing policer rates.
 
 
 ├
[V] policer:Match A set of match conditions for this policer.
 
 
 
 ├
[V] copp:Match Specifies a set of match conditions for a COPP policer.
 
 
 
 
 ├
[V] copp:MatchProto Represents a set of protocols that match the policer.
 
 
 ├
[V] qosp:Class A container for the QoS fabric class policy. Each class describes QoS attributes such as MTU.
 
 
 ├
[V] qosp:ClassRule The QoS classification rules.
 
 
 
 ├
[V] qosp:Dot1pRule The QoS classification rules based on dot1p values.
 
 
 
 ├
[V] qosp:DscpRule The QoS classification rules based on DSCP values.
 
 
 
 ├
[V] qosp:IpRule The QoS classification rules based on IP values.
 
 
 ├
[V] qosp:InfraDscpMap  Qos class to DSCP marking policy for multipod and remote tor
 
 
 ├
[V] rtctrl:RtCtrlPBase 
 
 
 
 ├
[V] bgp:PfxLeakCtrlP  This object holds route control policy for all networks defined by PfxLeakP in that domain
 
 
 
 ├
[V] bgp:RtCtrlMapP  Route control map policy for routes imported/exported into an AF. Control is through route maps.
 
 
 
 ├
[V] bgp:RtExpP  Route export policy to control whether to export routes into a different address family. Destination address family is specified in the object. Object may be nested within peer Address family (AF) to subject only those peer's particular AF routes to export. Object can also be under a domain Address family in which case it is applicable to all pe...
 
 
 
 ├
[V] rtctrl:RtCtrlP Route control policy for routes. There are few ways to apply this policy, controlling through route maps or prefix lists. The direction specifies whether to apply this policy in the incoming or outgoing direction
 
 
 
 
 ├
[V] bgp:RtCtrlP The route control policy for routes coming/going to peers. There are few ways to apply this policy.
 
 
 
 
 ├
[V] eigrp:RtCtrlP The route control policy for routes coming/going over interfaces. There are few ways to apply this policy, controlling through route maps or prefix lists. The direction specifies whether to apply this policy in the incoming or outgoing direction
 
 
 
 
 ├
[V] eigrp:RtMetricAlterP  Metric Alteration policy for EIGRP routes. Selection of routes for which metric has to be adjusted, can be done through route maps or prefix lists. The direction specifies whether to apply this policy for incoming or outgoing routes
 
 
 
 
 ├
[V] hcbgp:RtCtrlP  Route control policy for routes coming/going to peers. There are few ways to apply this policy, controlling through route maps or prefix lists. If both are specified, the order is implicit. Prefix lists are applied before route maps. The direction specifies whether to apply this policy in the incoming or outgoing direction
 
 
 
 
 ├
[V] ipmcsnoop:ACtrlP  Access control policy for multicast snoop. The policy can be applied either through prefix-list or route-map. Either prefix-list or route-map is applied
 
 
 
 
 
 ├
[V] igmpsnoop:ACtrlP  Route control policy for igmp multicast snoop.
 
 
 
 
 
 ├
[V] mldsnoop:ACtrlP  Route control policy for igmp multicast snoop.
 
 
 ├
[V] rtctrl:RtOverload  Route overload entry to control advertised routes on specified node events
 
 
 
 ├
[V] ospf:OverloadEntry  This object holds ospf overload entries
 
 
 
 ├
[V] pim6:OverloadEntry  This object holds pim overload entries
 
 
 
 ├
[V] pim:OverloadEntry PIM overload entries
 
 
 ├
[V] rtdmc:ACandFilterP  This object holds generic policy to filter messages from router candidates hosting RPs/RP discovery protocols
 
 
 
 ├
[V] rtdmc:ABSRFilterP  This object holds policy for choosing BSRs from among BSR candidates
 
 
 
 
 ├
[V] pim6:BSRFilterP  This object holds policy for choosing BSRs from among BSR candidates
 
 
 
 
 ├
[V] pim:BSRFilterP The PIM Bootstrap Router (BSR) filter policy.
 
 
 
 ├
[V] rtdmc:AMAFilterP  This object holds policy for choosing Mapping Agent from among the candidates
 
 
 
 
 ├
[V] pim6:MAFilterP  This object holds policy for choosing Mapping Agent from among the candidates
 
 
 
 
 ├
[V] pim:MAFilterP Mapping agent (MA) filter policy.
 
 
 
 ├
[V] rtdmc:ARPFilterP  This object holds policy for choosing RPs from among RP candidates
 
 
 
 
 ├
[V] pim6:RPFilterP  End Child MOs This object holds policy for choosing RPs from among RP candidates
 
 
 
 
 ├
[V] pim:RPFilterP The RP filter policy.
 
 
 ├
[V] rtdmc:AFuncP  This object holds policy for a generic function policy
 
 
 
 ├
[V] rtdmc:AAcastRPFuncP  This object holds policy for Anycast RP Function
 
 
 
 
 ├
[V] pim6:AcastRPFuncP  This object holds policy for Anycast RP Function Specifies the anycast and local interface for the anycast RP and all the peer's local info Anycast RP is not supported for BSR and Auto-RP
 
 
 
 
 ├
[V] pim:AcastRPFuncP The Anycast RP function policy. Specifies the Anycast and local interface for the Anycast RP and all the peer's local info.
 
 
 
 ├
[V] rtdmc:ABSRFuncP  This object holds policy for Bootstrap Router Function
 
 
 
 
 ├
[V] pim6:BSRFuncP  This object holds policy for Bootstrap Router Function
 
 
 
 
 ├
[V] pim:BSRFuncP The Bootstrap Router (BSR) function policy.
 
 
 
 ├
[V] rtdmc:AMAFuncP  This object holds policy for Auto-RP Mapping Agent Function
 
 
 
 
 ├
[V] pim6:MAFuncP  This object holds policy for Auto-RP Mapping Agent Function
 
 
 
 
 ├
[V] pim:MAFuncP Auto-RP mapping agent (MA) function policy.
 
 
 
 ├
[V] rtdmc:ARPFuncP  This object holds policy for RP Function
 
 
 
 
 ├
[V] pim6:RPFuncP  This object holds policy for RP Function
 
 
 
 
 ├
[V] pim:RPFuncP RP function policy.
 
 
 ├
[V] rtdmc:AMcPatP  This object holds policy for a generic multicast pattern
 
 
 
 ├
[V] rtdmc:AASMPatP  This object holds policy for Any Source Multicast (ASM) pattern
 
 
 
 
 ├
[V] pim6:ASMPatP  This object holds policy for Any Source Multicast (ASM) pattern
 
 
 
 
 ├
[V] pim:ASMPatP The any-source multicast pattern policy.
 
 
 
 ├
[V] rtdmc:ABidirPatP  This object holds policy for Bidirectional Multicast (BiDir) pattern
 
 
 
 
 ├
[V] pim6:BidirPatP  This object holds policy for Bidirectional Multicast (BiDir) pattern
 
 
 
 
 ├
[V] pim:BidirPatP The Bidirectional multicast (BiDir) pattern.
 
 
 
 ├
[V] rtdmc:ASSMPatP  This object holds policy for Source Specific Multicast (SSM) pattern
 
 
 
 
 ├
[V] pim6:SSMPatP  This object holds policy for Source Specific Multicast (SSM) pattern
 
 
 
 
 ├
[V] pim:SSMPatP Source-specific multicast pattern
 
 
 ├
[V] rtdmc:ARPDiscP  This object holds policy for a generic Rendezvous Point discovery policy
 
 
 
 ├
[V] rtdmc:AAutoRPP  This object holds policy for Auto-RP method of RP discovery
 
 
 
 
 ├
[V] pim6:AutoRPP  This object holds policy for Auto-RP method of RP discovery
 
 
 
 
 ├
[V] pim:AutoRPP The Auto-RP policy.
 
 
 
 ├
[V] rtdmc:ABSRP  This object holds policy for Bootstrap Router method of RP discovery
 
 
 
 
 ├
[V] pim6:BSRP  This object holds policy for Bootstrap Router method of RP discovery
 
 
 
 
 ├
[V] pim:BSRP The Bootstrap Router (BSR) policy.
 
 
 
 ├
[V] rtdmc:AInterVRFP  This object holds policy for Static RP Config If static RP IP matches one of the local interfaces, router automatically designates itself as an RP using below config
 
 
 
 
 ├
[V] pim6:InterVRFP  This object holds policy for Inter VRF
 
 
 
 
 ├
[V] pim:InterVRFP  This object holds policy for Inter VRF
 
 
 
 ├
[V] rtdmc:AStaticRPP  This object holds policy for Static RP Config
 
 
 
 
 ├
[V] pim6:StaticRPP  This object holds policy for Static RP
 
 
 
 
 ├
[V] pim:StaticRPP Static RP policy
 
 
 ├
[V] rtdmc:ATrP  This object holds routed multicast control traffic policy
 
 
 
 ├
[V] rtdmc:AHelloTrP  This object holds the hello traffic policy
 
 
 
 
 ├
[V] pim6:HelloTrP  This object holds the hello traffic policy
 
 
 
 
 ├
[V] pim:HelloTrP  This object holds the hello traffic policy
 
 
 
 ├
[V] rtdmc:AJPTrP  This object holds the join-prune traffic policy
 
 
 
 
 ├
[V] pim6:JPTrP  This object holds the join-prune traffic policy
 
 
 
 
 ├
[V] pim:JPTrP Join/prune traffic policy.
 
 
 
 ├
[V] rtdmc:ARegTrP  This object holds the register traffic policy
 
 
 
 
 ├
[V] pim6:RegTrP  This object holds the register traffic policy
 
 
 
 
 ├
[V] pim:RegTrP PIM register traffic policy
 
 
 ├
[V] rtleak:LeakCtrlP The leak control policy, which defines the different knobs to control redistribution of routes.
 
 
 
 ├
[V] isis:LeakCtrlP The leak controls related to the number of routes leaked.
 
 
 
 ├
[V] ospf:ALeakCtrlP An abstraction of the leak controls related to the number of routes leaked.
 
 
 
 
 ├
[V] ospf:LeakCtrlP The leak controls that determine the number of routes leaked.
 
 
 
 
 ├
[V] ospfv3:LeakCtrlP The leak controls that determine the number of routes leaked.
 
 
 ├
[V] rtleak:LeakP A container for the leak policy. Leak policies are categorized into intra protocol, inter protocol, and default route leak policies. These policies describe the routes to be injected into a given destination protocol domain. The destination domain where the routes are injected contains this leak policy.
 
 
 
 ├
[V] ospf:ALsaLeakCtrlP  Lsa Leak abstract class.
 
 
 
 
 ├
[V] ospf:LsaLeakCtrlP  Lsa Leak Control concrete class.
 
 
 
 
 ├
[V] ospfv3:LsaLeakCtrlP  Lsa Leak Control concrete class.
 
 
 
 ├
[V] ospf:ALsaLeakP An abstraction of the link-state advertisement (LSA) leak policy.
 
 
 
 
 ├
[V] ospf:LsaLeakP The link-state advertisement (LSA) leak policy.
 
 
 
 
 ├
[V] ospfv3:LsaLeakP The link-state advertisement leak concrete class.
 
 
 
 ├
[V] rtleak:DefRtLeakP A container for the default route leak policy.
 
 
 
 
 ├
[V] bgp:DefRtLeakP The default route leak policy.
 
 
 
 
 ├
[V] eigrp:DefRtLeakP The default route leak policy.
 
 
 
 
 ├
[V] isis:DefRtLeakP The default route leak policy.
 
 
 
 
 ├
[V] ospf:ADefRtLeakP An abstraction of the default route leak policy information.
 
 
 
 
 
 ├
[V] ospf:DefRtLeakP The default route leak policy information.
 
 
 
 
 
 ├
[V] ospfv3:DefRtLeakP The default route leak policy.
 
 
 
 ├
[V] rtleak:HostLeakP  This objects holds host route leak policy
 
 
 
 
 ├
[V] bgp:HostLeakP  COOP/L2RIB to BGP host route leak policy. This defines policy to control the distribution of host routes from COOP/L2RIB to BGP
 
 
 
 ├
[V] rtleak:InterLeakP The inter protocol route leak policy, which defines the distribution of routes from one protocol to another.
 
 
 
 
 ├
[V] bgp:InterLeakP A policy that defines distribution of routes from one protocol to another protocol.
 
 
 
 
 ├
[V] eigrp:InterLeakP The inter protocol route leak policy, which defines the distribution of routes from one protocol to another.
 
 
 
 
 ├
[V] isis:InterLeakP The inter protocol route leak policy defines distribution of routes from other protocols to IS-IS.
 
 
 
 
 ├
[V] ospf:AInterLeakP An abstraction of the inter protocol route leak policy defines the distribution of routes from other protocols to OSPF.
 
 
 
 
 
 ├
[V] ospf:InterLeakP Inter protocol route leak policy defines the distribution of routes from other protocols to OSPF.
 
 
 
 
 
 ├
[V] ospfv3:InterLeakP The inter protocol route leak policy, which defines the distribution of routes from other protocols to OSPF.
 
 
 
 ├
[V] rtleak:IntraLeakP The intra protocol leak policy, which defines the distribution of routes from one domain to another in a given protocol.
 
 
 
 
 ├
[V] isis:IntraLeakP Intra protocol leak policy defines distribution of routes from one level to another.
 
 
 
 ├
[V] rtleak:PfxLeakP  This objects holds prefix leak policy
 
 
 
 
 ├
[V] bgp:PfxLeakP  This objects holds route leak policy for a given network
 
 
 
 
 ├
[V] hcbgp:PfxLeakP  This objects holds route leak policy for a given network
 
 
 ├
[V] rtsum:RtSum 
 
 
 
 ├
[V] bgp:RtSum  Route Summarization
 
 
 
 ├
[V] eigrp:ASummP The abstraction of an EIGRP summary route.
 
 
 
 
 ├
[V] eigrp:SummDef The EIGRP summary route definition.
 
 
 
 
 ├
[V] eigrp:SummPol The EIGRP summary route (NOT USED).
 
 
 
 ├
[V] eigrp:RtSum  This object holds summary address
 
 
 
 ├
[V] hcbgp:RtSum  Route Summarization
 
 
 
 ├
[V] isis:RtSum This object holds summarization address. Any address that maps to this prefix will be summarized through this address
 
 
 
 ├
[V] ospf:ARtSum An abstraction of route summarization.
 
 
 
 
 ├
[V] ospf:AExtRtSum An abstraction of the external route summarization is specific to external routes that are injected into OSPF using route leak. Configure external route summarization on ASBRs that are leaking routes into OSPF.
 
 
 
 
 
 ├
[V] ospf:ExtRtSum An external route summarization is specific to external routes that are injected into OSPF using route leak. Configure external route summarization on ASBRs that are leaking routes into OSPF.
 
 
 
 
 
 ├
[V] ospfv3:ExtRtSum The external route summarization, which is specific to external routes that are injected into OSPF using route leak. Configure external route summarization on ASBRs that are leaking routes into OSPF.
 
 
 
 
 ├
[V] ospf:AInterAreaRtSum An abstraction of the inter area route summarization.
 
 
 
 
 
 ├
[V] ospf:InterAreaRtSum The inter-area route summarization. This is configured on ABRs, summarizing routes between areas in the autonomous system.
 
 
 
 
 
 ├
[V] ospfv3:InterAreaRtSum The inter-area route summarization, which is configured on ABRs, summarizing routes between areas in the autonomous system.
 
 
 ├
[V] slowdrain:InstPol 
 
 
 
 ├
[V] slowdrain:Class 
 
 
 ├
[V] snmp:Ctx SNMP context information.
 
 
 ├
[V] topoctrl:EndpointControlP  Fabric endpoint controle policy
 
 
 ├
[V] topoctrl:EndpointDebugControlP  Endpoint debug control policy
 
 
 ├
[V] topoctrl:HashP  user defined hash policy for load balancing in the fabric
 
 
 ├
[V] topoctrl:LbP A fabric load balance policy.
 
 
 ├
[V] topoctrl:LoopProtectP The endpoint loop protection policy, which specifies how loops detected by frequent mac moves are handled.
 
 
 ├
[V] topoctrl:ShardChP The shard chaining policy.
 
 
 ├
[V] topoctrl:ShardRdnP The shard redundancy policy.
 
 
 ├
[V] topoctrl:VirtDom The virtual domain.
 
 
 ├
[V] topoctrl:VxlanP The fabric VXLAN policy.
 
 
 ├
[V] tunnel:APfxEntry 
 
 
 
 ├
[V] tunnel:CtrlPfxEntry  Conversational tunnels discovered matching these external prefixes are marked untrusted or trusted based on whether the sclass can be trusted or not
 
 
 
 ├
[V] tunnel:PfxEntry  Tunnel prefix white list. The tunnels are formed through conversation. Only the tunnels that are part of the whitelist are allowed to form
 
 
 
 ├
[V] tunnel:RlPodPfxEntry 
 
 
 ├
[V] tunnel:Ctx  Tunnel container for all tunnel related information for a given layer 3 domain
 
 
 ├
[V] tunnel:EpRetPol  End-Point retention policy identifying the duration of how long information is kept about remote end-point. This is expressed through a set of triggering and aging control parameters
 
 
 ├
[V] tunnel:LSite 
 
 
 ├
[V] tunnel:NatWhitelistPool 
 
 
 ├
[V] tunnel:RLTepPool 
 
 ├
[V] pol:RelnHolder Represents a policy relation holder.
 
 
 ├
[V] aaa:FabricNodeRelnHolder 
 
 
 ├
[V] aaa:FabricSelfCAEpRelnHolder 
 
 
 ├
[V] aaa:KeyringRelnHolder 
 
 
 ├
[V] aaa:RbacEpRelnHolder This is generated and used only by internal processes.
 
 
 ├
[V] aaa:SSLCertificateEpRelnHolder 
 
 
 ├
[V] aaa:SecRelnHolder This object is managed internally and should not be modified by the user.
 
 
 ├
[V] aaa:UserSessionEpRelnHolder 
 
 
 ├
[V] dbg:RelnHolder 
 
 
 ├
[V] fabric:NodeIdentPolRelnHolder 
 
 
 ├
[V] fabric:SecRelnHolder A relation for SecurityManager policies.
 
 
 ├
[V] fault:RelnHolder 
 
 
 ├
[V] pki:ExportEncryptionKeyRelnHolder  This Relation Holder will allow subscriptions from all shards in all DMEs to the export encryption key to be used to encrypt/decrypt the secure properties fields
 
 
 ├
[V] pol:DefRelnHolder Specifies relations originating from a policy definition.
 
 
 ├
[V] pres:RelnHolder This is generated and used only by internal processes.
 
 
 ├
[V] vns:SvcRelnHolder  one per shard to pull mdev, absFuncProf and absgraph
 
 ├
[V] pol:ResCont consumer of the policy
 
 ├
[V] pol:ResPolCont 
 
 ├
[V] pol:Resolver The per shard policy resolver object
 
 ├
[V] qos:DscpTransCont 
 
 ├
[V] quota:Conf  Quota Configuration
 
 ├
[V] rule:Item 
 
 ├
[V] shareident:Allocator Object representing the location of the centralized allocator. Not instantiated.
 
 ├
[V] snmp:AClientP An abstract representation of a client profile.
 
 
 ├
[V] snmp:Client SNMP client information.
 
 
 ├
[V] snmp:ClientP The client profile information.
 
 ├
[V] snmp:ACtxP An abstract class for an SNMP context information.
 
 
 ├
[V] snmp:CtxDef A definition object for the SNMP context profile.
 
 
 ├
[V] snmp:CtxP The SNMP context profile enables you to specify a context to monitor with a community profile. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
 
 ├
[V] snmp:ATrapFwdServerP 
 
 
 ├
[V] snmp:TrapFwdServerP  Client entry
 
 ├
[V] stats:AStatsBase 
 
 
 ├
[V] stats:AStatsResource 
 
 
 
 ├
[V] stats:Account 
 
 
 ├
[V] stats:Cont 
 
 
 ├
[V] stats:CsrCont 
 
 
 ├
[V] stats:Inst 
 
 
 ├
[V] stats:Region 
 
 
 ├
[V] stats:ServiceCont 
 
 ├
[V] tag:Obj The base class for tag objects.
 
 
 ├
[V] tag:AInst The label instance, which is contained by the taggable object.
 
 
 
 ├
[V] tag:AliasDelInst An alias of a deleted instance.
 
 
 
 ├
[V] tag:AliasInst An alias allows you to refer to an object by a descriptive name instead of by its DN.
 
 
 
 ├
[V] tag:ExtMngdInst  tag inst for external orchestrators to tag objects that are managed by them
 
 
 
 ├
[V] tag:Inst A tag allows you to group multiple objects by a descriptive name. You can assign the same tag name to multiple objects and you can assign one or more tag names to an object.
 
 
 ├
[V] tag:AliasDef The alias definition.
 
 
 ├
[V] tag:Def Tags define the label parameters and enables the classifying of the objects that can and cannot communicate with one another.
 
 ├
[V] telemetry:AFilter 
 
 
 ├
[V] telemetry:SubnetFilter 
 
 
 ├
[V] telemetry:SubnetFilterDef 
 
 ├
[V] telemetry:FilterPolicy 
 
 ├
[V] topoctrl:SecurityToken  Concrete Mo to Holds the internal fabric security token (for various protocols - coop, isis) Parallel to uni/fabric/SecurityToken
 
 ├
[V] vmm:ACapObj 
 
 
 ├
[V] vmm:ACapInfo 
 
 
 
 ├
[V] vmm:CapInfo 
 
 ├
[V] vmm:EpValidatorPol  Currently only used by OpenStack VMMs
 
 ├
[V] vmm:HvAvailPol 
 
 ├
[V] vmm:HvDesiredSt 
 
 ├
[V] vmm:ProtectedVmGroup 
 
 ├
[V] vns:VConn A virtual connector defines connectivity for a function on a service device such as a firewall, load balancer, or SSL offload.
 
 ├
[V] vz:ARuleOwner 
 
 
 ├
[V] vz:ObservableRuleOwner 
 
 
 ├
[V] vz:RuleOwner 
 
 ├
[V] vz:ContractCfgReprocessor  Tracks Reprocessing of Contracts in node
 
 ├
[V] vz:ContractHookMarkerCont 
 
 ├
[V] vz:CreatedBy A container that captures information about the creator of an object.
 
 ├
[V] vz:TrCreatedBy  Tracks the resource that created a Taboo rule.


Events
                


Faults
                


Fsms
                


Properties Summary
Defined in: pol:Obj
naming:Name
          string:Basic
name  (pol:Obj:name)
           Overrides:naming:NamedObject:name
           null
Defined in: naming:NamedObject
naming:NameAlias
          string:Basic
nameAlias  (naming:NamedObject:nameAlias)
           NO COMMENTS
Defined in: mo:TopProps
mo:ModificationChildAction
          scalar:Bitmask32
childAction  (mo:TopProps:childAction)
           Delete or ignore. For internal use only.
reference:BinRef dn  (mo:TopProps:dn)
           A tag or metadata is a non-hierarchical keyword or term assigned to the fabric module.
reference:BinRN rn  (mo:TopProps:rn)
           Identifies an object from its siblings within the context of its parent object. The distinguished name contains a sequence of relative names.
mo:ModificationStatus
          scalar:Bitmask32
status  (mo:TopProps:status)
           The upgrade status. This property is for internal use only.
Properties Detail

childAction

Type: mo:ModificationChildAction
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelChildAction
    Comments:
Delete or ignore. For internal use only.
Constants
deleteAll 16384u deleteAll NO COMMENTS
ignore 4096u ignore NO COMMENTS
deleteNonPresent 8192u deleteNonPresent NO COMMENTS
DEFAULT 0 --- This type is used to





dn

Type: reference:BinRef

Units: null
Encrypted: false
Access: implicit
Category: TopLevelDn
    Comments:
A tag or metadata is a non-hierarchical keyword or term assigned to the fabric module.



name

Type: naming:Name
Primitive Type: string:Basic

Overrides:naming:NamedObject:name
Units: null Encrypted: false Access: admin Category: TopLevelRegular Property Validators: Range: min: "0" max: "64" Allowed Chars: Regex: [a-zA-Z0-9_.:-]+
    Comments:
null



nameAlias

Type: naming:NameAlias
Primitive Type: string:Basic

Units: null
Encrypted: false
Access: admin
Category: TopLevelRegular
Property Validators:
    Range:  min: "0"  max: "63"
        Allowed Chars:
            Regex: [a-zA-Z0-9_.-]+
    Comments:
NO COMMENTS



rn

Type: reference:BinRN

Units: null
Encrypted: false
Access: implicit
Category: TopLevelRn
    Comments:
Identifies an object from its siblings within the context of its parent object. The distinguished name contains a sequence of relative names.



status

Type: mo:ModificationStatus
Primitive Type: scalar:Bitmask32

Units: null
Encrypted: false
Access: implicit
Category: TopLevelStatus
    Comments:
The upgrade status. This property is for internal use only.
Constants
created 2u created In a setter method: specifies that an object should be created. An error is returned if the object already exists.
In the return value of a setter method: indicates that an object has been created.
modified 4u modified In a setter method: specifies that an object should be modified
In the return value of a setter method: indicates that an object has been modified.
deleted 8u deleted In a setter method: specifies that an object should be deleted.
In the return value of a setter method: indicates that an object has been deleted.
DEFAULT 0 --- This type controls the life cycle of objects passed in the XML API.

When used in a setter method (such as configConfMo), the ModificationStatus specifies whether an object should be created, modified, deleted or removed.
In the return value of a setter method, the ModificationStatus indicates the actual operation that was performed. For example, the ModificationStatus is set to "created" if the object was created. The ModificationStatus is not set if the object was neither created, modified, deleted or removed.

When invoking a setter method, the ModificationStatus is optional:
If a setter method such as configConfMo is invoked and the ModificationStatus is not set, the system automatically determines if the object should be created or modified.