nuegressadvfwdentrytemplate¶
-
nuegressadvfwdentrytemplate.NUEgressAdvFwdEntryTemplate(bambou.nurest_object.NUMetaRESTObject,):
Egress forwarding policy rules define what action to take for a particular type of traffic, based on its origin, destination, protocol, EtherType, ports, DSCP value and other information. Supported actions are to redirect traffic, change the forwarding class of the traffic or to allow traffic to pass untouched.
Attributes¶
acl_template_name
: The name of the parent Template for this acl entryicmp_code
: The ICMP Code when protocol selected is ICMP.icmp_type
: The ICMP Type when protocol selected is ICMP.fc_override
: Value of the Service Class to be overridden in the packet when the match conditions are satisfied Possible values are NONE, A, B, C, D, E, F, G, H, .ipv6_address_override
: Overrides destination IPv6 match for Egress.dscp
(Mandatory): DSCP match condition to be set in the rule. It is either * or from 0-63failsafe_datapath
: Backup datapath option if VNF/VM is downlast_updated_by
: ID of the user who last updated the object.last_updated_date
: Time stamp when this object was last updated.action
(Mandatory): The action of the ACL entry. Possible values are DROP, FORWARD, REDIRECT. Action REDIRECT is allowed only for EgressAdvancedForwardingEntry.address_override
: Overrides destination IP match for Egress.web_filter_id
: ID of web filter category or web domain name entity usedweb_filter_stats_logging_enabled
: Indicates if web filter statistics logging is enabled for this particular templateweb_filter_type
: Indicates type of web filter being setredirect_vport_tag_id
: VPort tag to which traffic will be redirected to, when ACL entry match criteria succeedsredirection_target_entity_type
: Indicates whether the Redirection Target of ACL Entry was derived from a L3 Domain template or instance. Possible Values: REDIRECTIONTARGET, REDIRECTIONTARGETTEMPLATE.description
: Description of the ACL entrydestination_port
: The destination port to be matched if protocol is UDP or TCP. Value should be either * or single port number or a port rangenetwork_entity_type
: Indicates whether the Network Entity of ACL Entry was derived from a L2/L3 Domain template or instance. Possible Values: ENTERPRISENETWORK, NETWORKMACROGROUP, PGEXPRESSION, PGEXPRESSIONTEMPLATE, POLICYGROUP, POLICYGROUPTEMPLATE, PUBLICNETWORK, SAASAPPLICATIONGROUP, SUBNET, SUBNETTEMPLATE, ZONE, ZONETEMPLATE.network_id
: The source network entity id that is referenced(subnet/zone/macro/PolicyGroupExpression)network_type
: Type of the source network.mirror_destination_group_id
: ID of the associated Mirror Destination Group.mirror_destination_id
: Destination ID of the mirror destination object.flow_logging_enabled
: Is flow logging enabled for this particular templateembedded_metadata
: Metadata objects associated with this entity. This will contain a list of Metadata objects if the API request is made using the special flag to enable the embedded Metadata feature. Only a maximum of Metadata objects is returned based on the value set in the system configuration.enterprise_name
: The name of the enterprise for the domains parententity_scope
: Specify if scope of entity is Data center or Enterprise levellocation_entity_type
: Indicates whether the Location Entity of ACL Entry was derived from a L2/L3 Domain template or instance. Possible Values: ENTERPRISENETWORK, NETWORKMACROGROUP, PGEXPRESSION, PGEXPRESSIONTEMPLATE, POLICYGROUP, POLICYGROUPTEMPLATE, PUBLICNETWORK, REDIRECTIONTARGET, REDIRECTIONTARGETTEMPLATE, SUBNET, SUBNETTEMPLATE, ZONE, ZONETEMPLATE.location_id
: The ID of the destination location entity (Subnet/Zone/VportTag/PolicyGroupExpression)location_type
(Mandatory): Type of the destination location entity.policy_state
: State of the policy. Possible values are DRAFT, LIVE, .domain_name
: The name of the domain/domain template for the aclTemplateNames parentsource_port
: Source port to be matched if protocol is UDP or TCP. Value can be either * or single port number or a port rangeuplink_preference
: Indicates the preferencial path selection for network traffic for this ACL - default is DEFAULT when the attribute is applicable.creation_date
: Time stamp when this object was created.priority
: The priority of the ACL entry that determines the order of entriesprotocol
: Protocol number that must be matchedassociated_live_entity_id
: In the draft mode, the ACL entry refers to this LiveEntity. In non-drafted mode, this is null.associated_live_template_id
: In the draft mode, the ACL entity refers to this live entity parent. In non-drafted mode, this is nullassociated_traffic_type
: The associated Traffic type. L4 Service / L4 Service Groupassociated_traffic_type_id
: The associated Traffic Type IDassociated_virtual_firewall_rule_id
: The ID of the Virtual Firewall Rule, if this was derived as part of the Virtual Firewall Rule creationstats_id
: The statsID that is created in the VSD and identifies this ACL Template Entry. This is auto-generated by VSDstats_logging_enabled
: Indicates if stats logging is enabled for this particular templateether_type
(Mandatory): Ether type of the packet to be matched. etherType can be * or a valid hexadecimal valueowner
: Identifies the user that has created this object.external_id
: External object ID. Used for integration with third party systems
Children¶
class | fetcher |
nupermission.NUPermission | permissions |
numetadata.NUMetadata | metadatas |
nuglobalmetadata.NUGlobalMetadata | global_metadatas |