Documentation ¶
Overview ¶
Package acl is a generated protocol buffer package.
It is generated from these files:
acl.proto
It has these top-level messages:
AccessLists
Index ¶
- Variables
- func Key(aclName string) string
- func KeyPrefix() string
- type AccessLists
- type AccessLists_Acl
- type AccessLists_Acl_Interfaces
- type AccessLists_Acl_Rule
- type AccessLists_Acl_Rule_Actions
- type AccessLists_Acl_Rule_Matches
- func (m *AccessLists_Acl_Rule_Matches) GetIpRule() *AccessLists_Acl_Rule_Matches_IpRule
- func (m *AccessLists_Acl_Rule_Matches) GetMacipRule() *AccessLists_Acl_Rule_Matches_MacIpRule
- func (*AccessLists_Acl_Rule_Matches) ProtoMessage()
- func (m *AccessLists_Acl_Rule_Matches) Reset()
- func (m *AccessLists_Acl_Rule_Matches) String() string
- type AccessLists_Acl_Rule_Matches_IpRule
- func (m *AccessLists_Acl_Rule_Matches_IpRule) GetIcmp() *AccessLists_Acl_Rule_Matches_IpRule_Icmp
- func (m *AccessLists_Acl_Rule_Matches_IpRule) GetIp() *AccessLists_Acl_Rule_Matches_IpRule_Ip
- func (m *AccessLists_Acl_Rule_Matches_IpRule) GetOther() *AccessLists_Acl_Rule_Matches_IpRule_Other
- func (m *AccessLists_Acl_Rule_Matches_IpRule) GetTcp() *AccessLists_Acl_Rule_Matches_IpRule_Tcp
- func (m *AccessLists_Acl_Rule_Matches_IpRule) GetUdp() *AccessLists_Acl_Rule_Matches_IpRule_Udp
- func (*AccessLists_Acl_Rule_Matches_IpRule) ProtoMessage()
- func (m *AccessLists_Acl_Rule_Matches_IpRule) Reset()
- func (m *AccessLists_Acl_Rule_Matches_IpRule) String() string
- type AccessLists_Acl_Rule_Matches_IpRule_Icmp
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) GetIcmpCodeRange() *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) GetIcmpTypeRange() *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange
- func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) ProtoMessage()
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) Reset()
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) String() string
- type AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange
- type AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange
- type AccessLists_Acl_Rule_Matches_IpRule_Ip
- type AccessLists_Acl_Rule_Matches_IpRule_Other
- type AccessLists_Acl_Rule_Matches_IpRule_Tcp
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) GetDestinationPortRange() *AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) GetSourcePortRange() *AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange
- func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) ProtoMessage()
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) Reset()
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) String() string
- type AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange
- type AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange
- type AccessLists_Acl_Rule_Matches_IpRule_Udp
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) GetDestinationPortRange() *AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) GetSourcePortRange() *AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange
- func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) ProtoMessage()
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) Reset()
- func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) String() string
- type AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange
- type AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange
- type AccessLists_Acl_Rule_Matches_MacIpRule
- type AclAction
Constants ¶
This section is empty.
Variables ¶
var AclAction_name = map[int32]string{
0: "DENY",
1: "PERMIT",
}
var AclAction_value = map[string]int32{
"DENY": 0,
"PERMIT": 1,
}
Functions ¶
Types ¶
type AccessLists ¶
type AccessLists struct {
Acl []*AccessLists_Acl `protobuf:"bytes,1,rep,name=acl" json:"acl,omitempty"`
}
This is a top level container for Access Control Lists. It can have one or more Access Control Lists.
func (*AccessLists) GetAcl ¶
func (m *AccessLists) GetAcl() []*AccessLists_Acl
func (*AccessLists) ProtoMessage ¶
func (*AccessLists) ProtoMessage()
func (*AccessLists) Reset ¶
func (m *AccessLists) Reset()
func (*AccessLists) String ¶
func (m *AccessLists) String() string
type AccessLists_Acl ¶
type AccessLists_Acl struct { Rules []*AccessLists_Acl_Rule `protobuf:"bytes,1,rep,name=rules" json:"rules,omitempty"` // The name of access-list. A device MAY restrict the length // and value of this name, possibly spRule and special // characters are not allowed. AclName string `protobuf:"bytes,3,opt,name=acl_name,proto3" json:"acl_name,omitempty"` // The set of interfRules that has assigned this ACL on ingres or egress Interfaces *AccessLists_Acl_Interfaces `protobuf:"bytes,2,opt,name=interfaces" json:"interfaces,omitempty"` }
An Access Control List(ACL) is an ordered list of Access List Rules. Each Access Control Rule has a list of match criteria and a list of actions.
func (*AccessLists_Acl) GetInterfaces ¶
func (m *AccessLists_Acl) GetInterfaces() *AccessLists_Acl_Interfaces
func (*AccessLists_Acl) GetRules ¶
func (m *AccessLists_Acl) GetRules() []*AccessLists_Acl_Rule
func (*AccessLists_Acl) ProtoMessage ¶
func (*AccessLists_Acl) ProtoMessage()
func (*AccessLists_Acl) Reset ¶
func (m *AccessLists_Acl) Reset()
func (*AccessLists_Acl) String ¶
func (m *AccessLists_Acl) String() string
type AccessLists_Acl_Interfaces ¶
type AccessLists_Acl_Interfaces struct { Egress []string `protobuf:"bytes,1,rep,name=egress" json:"egress,omitempty"` Ingress []string `protobuf:"bytes,2,rep,name=ingress" json:"ingress,omitempty"` }
func (*AccessLists_Acl_Interfaces) ProtoMessage ¶
func (*AccessLists_Acl_Interfaces) ProtoMessage()
func (*AccessLists_Acl_Interfaces) Reset ¶
func (m *AccessLists_Acl_Interfaces) Reset()
func (*AccessLists_Acl_Interfaces) String ¶
func (m *AccessLists_Acl_Interfaces) String() string
type AccessLists_Acl_Rule ¶
type AccessLists_Acl_Rule struct { Actions *AccessLists_Acl_Rule_Actions `protobuf:"bytes,2,opt,name=actions" json:"actions,omitempty"` Matches *AccessLists_Acl_Rule_Matches `protobuf:"bytes,3,opt,name=matches" json:"matches,omitempty"` // Access List entry that can define: // - IP4/IP6 src ip prefix // - src MAC address mask // - src MAC address value // - can be used only for static ACLs. // A unique name identifying this Access List // Entry(Rule). RuleName string `protobuf:"bytes,5,opt,name=rule_name,proto3" json:"rule_name,omitempty"` }
List of access list entries(Rule)
func (*AccessLists_Acl_Rule) GetActions ¶
func (m *AccessLists_Acl_Rule) GetActions() *AccessLists_Acl_Rule_Actions
func (*AccessLists_Acl_Rule) GetMatches ¶
func (m *AccessLists_Acl_Rule) GetMatches() *AccessLists_Acl_Rule_Matches
func (*AccessLists_Acl_Rule) ProtoMessage ¶
func (*AccessLists_Acl_Rule) ProtoMessage()
func (*AccessLists_Acl_Rule) Reset ¶
func (m *AccessLists_Acl_Rule) Reset()
func (*AccessLists_Acl_Rule) String ¶
func (m *AccessLists_Acl_Rule) String() string
type AccessLists_Acl_Rule_Actions ¶
type AccessLists_Acl_Rule_Actions struct {
AclAction AclAction `protobuf:"varint,1,opt,name=acl_action,proto3,enum=acl.AclAction" json:"acl_action,omitempty"`
}
Definitions of action criteria for this Access List Rule
func (*AccessLists_Acl_Rule_Actions) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Actions) ProtoMessage()
func (*AccessLists_Acl_Rule_Actions) Reset ¶
func (m *AccessLists_Acl_Rule_Actions) Reset()
func (*AccessLists_Acl_Rule_Actions) String ¶
func (m *AccessLists_Acl_Rule_Actions) String() string
type AccessLists_Acl_Rule_Matches ¶
type AccessLists_Acl_Rule_Matches struct { IpRule *AccessLists_Acl_Rule_Matches_IpRule `protobuf:"bytes,1,opt,name=ip_rule" json:"ip_rule,omitempty"` MacipRule *AccessLists_Acl_Rule_Matches_MacIpRule `protobuf:"bytes,4,opt,name=macip_rule" json:"macip_rule,omitempty"` }
Definitions for match criteria for this Access List Rule
func (*AccessLists_Acl_Rule_Matches) GetIpRule ¶
func (m *AccessLists_Acl_Rule_Matches) GetIpRule() *AccessLists_Acl_Rule_Matches_IpRule
func (*AccessLists_Acl_Rule_Matches) GetMacipRule ¶
func (m *AccessLists_Acl_Rule_Matches) GetMacipRule() *AccessLists_Acl_Rule_Matches_MacIpRule
func (*AccessLists_Acl_Rule_Matches) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches) Reset ¶
func (m *AccessLists_Acl_Rule_Matches) Reset()
func (*AccessLists_Acl_Rule_Matches) String ¶
func (m *AccessLists_Acl_Rule_Matches) String() string
type AccessLists_Acl_Rule_Matches_IpRule ¶
type AccessLists_Acl_Rule_Matches_IpRule struct { Ip *AccessLists_Acl_Rule_Matches_IpRule_Ip `protobuf:"bytes,1,opt,name=ip" json:"ip,omitempty"` Icmp *AccessLists_Acl_Rule_Matches_IpRule_Icmp `protobuf:"bytes,2,opt,name=icmp" json:"icmp,omitempty"` Tcp *AccessLists_Acl_Rule_Matches_IpRule_Tcp `protobuf:"bytes,4,opt,name=tcp" json:"tcp,omitempty"` Udp *AccessLists_Acl_Rule_Matches_IpRule_Udp `protobuf:"bytes,5,opt,name=udp" json:"udp,omitempty"` Other *AccessLists_Acl_Rule_Matches_IpRule_Other `protobuf:"bytes,3,opt,name=other" json:"other,omitempty"` }
Access List entry that can define: - IP4/IP6 src/dst ip prefix- Internet Protocol number - Internet Protocol number - selected L4 headers:
- ICMP (type range)
- UDP (port range)
- TCP (port range, flags mask, flags value)
func (*AccessLists_Acl_Rule_Matches_IpRule) GetIcmp ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) GetIcmp() *AccessLists_Acl_Rule_Matches_IpRule_Icmp
func (*AccessLists_Acl_Rule_Matches_IpRule) GetIp ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) GetIp() *AccessLists_Acl_Rule_Matches_IpRule_Ip
func (*AccessLists_Acl_Rule_Matches_IpRule) GetOther ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) GetOther() *AccessLists_Acl_Rule_Matches_IpRule_Other
func (*AccessLists_Acl_Rule_Matches_IpRule) GetTcp ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) GetTcp() *AccessLists_Acl_Rule_Matches_IpRule_Tcp
func (*AccessLists_Acl_Rule_Matches_IpRule) GetUdp ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) GetUdp() *AccessLists_Acl_Rule_Matches_IpRule_Udp
func (*AccessLists_Acl_Rule_Matches_IpRule) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Icmp ¶
type AccessLists_Acl_Rule_Matches_IpRule_Icmp struct { // ICMPv6 flag, if false ICMPv4 will be used Icmpv6 bool `protobuf:"varint,1,opt,proto3" json:"Icmpv6,omitempty"` IcmpCodeRange *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange `protobuf:"bytes,2,opt,name=icmp_code_range" json:"icmp_code_range,omitempty"` IcmpTypeRange *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange `protobuf:"bytes,3,opt,name=icmp_type_range" json:"icmp_type_range,omitempty"` }
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) GetIcmpCodeRange ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) GetIcmpCodeRange() *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) GetIcmpTypeRange ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) GetIcmpTypeRange() *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange ¶
type AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange struct { // Lower boundary for range First uint32 `protobuf:"varint,1,opt,name=first,proto3" json:"first,omitempty"` // Upper boundary for range Last uint32 `protobuf:"varint,2,opt,name=last,proto3" json:"last,omitempty"` }
Inclusive range representing icmp codes to be used.
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpCodeRange) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange ¶
type AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange struct { // Lower boundary for range First uint32 `protobuf:"varint,1,opt,name=first,proto3" json:"first,omitempty"` // Upper boundary for range Last uint32 `protobuf:"varint,2,opt,name=last,proto3" json:"last,omitempty"` }
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Icmp_IcmpTypeRange) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Ip ¶
type AccessLists_Acl_Rule_Matches_IpRule_Ip struct { // Destination IPv4/IPv6 network address (<ip>/<network>) DestinationNetwork string `protobuf:"bytes,1,opt,name=destination_network,proto3" json:"destination_network,omitempty"` // Destination IPv4/IPv6 network address (<ip>/<network>) SourceNetwork string `protobuf:"bytes,2,opt,name=source_network,proto3" json:"source_network,omitempty"` }
IP version used in this Access List Entry.
func (*AccessLists_Acl_Rule_Matches_IpRule_Ip) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Ip) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Ip) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Ip) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Ip) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Ip) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Other ¶
type AccessLists_Acl_Rule_Matches_IpRule_Other struct { // Internet Protocol number. Protocol uint32 `protobuf:"varint,1,opt,name=protocol,proto3" json:"protocol,omitempty"` }
func (*AccessLists_Acl_Rule_Matches_IpRule_Other) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Other) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Other) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Other) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Other) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Other) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Tcp ¶
type AccessLists_Acl_Rule_Matches_IpRule_Tcp struct { DestinationPortRange *AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange `protobuf:"bytes,1,opt,name=destination_port_range" json:"destination_port_range,omitempty"` SourcePortRange *AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange `protobuf:"bytes,2,opt,name=source_port_range" json:"source_port_range,omitempty"` // Binary mask for tcp flags to match. MSB order (FIN at position 0). // Applied as logical AND to tcp flags field of the packet being matched, // before it is compared with tcp-flags-value. TcpFlagsMask uint32 `protobuf:"varint,3,opt,name=tcp_flags_mask,proto3" json:"tcp_flags_mask,omitempty"` // Binary value for tcp flags to match. MSB order (FIN at position 0). // Before tcp-flags-value is compared with tcp flags field of the packet being matched, // tcp-flags-mask is applied to packet field value. TcpFlagsValue uint32 `protobuf:"varint,4,opt,name=tcp_flags_value,proto3" json:"tcp_flags_value,omitempty"` }
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) GetDestinationPortRange ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) GetDestinationPortRange() *AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) GetSourcePortRange ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) GetSourcePortRange() *AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange ¶
type AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange struct { // Lower boundary for port. LowerPort uint32 `protobuf:"varint,1,opt,name=lower_port,proto3" json:"lower_port,omitempty"` // Upper boundary for port. If existing, the upper port must // be greater or equal to lower-port UpperPort uint32 `protobuf:"varint,2,opt,name=upper_port,proto3" json:"upper_port,omitempty"` }
Inclusive range representing destination ports to be used. When only lower-port is present, it represents a single port.
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp_DestinationPortRange) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange ¶
type AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange struct { // Lower boundary for port. LowerPort uint32 `protobuf:"varint,1,opt,name=lower_port,proto3" json:"lower_port,omitempty"` // Upper boundary for port . If existing, the upper port // must be greater or equal to lower-port. UpperPort uint32 `protobuf:"varint,2,opt,name=upper_port,proto3" json:"upper_port,omitempty"` }
Inclusive range representing source ports to be used. When only lower-port is present, it represents a single port.
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Tcp_SourcePortRange) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Udp ¶
type AccessLists_Acl_Rule_Matches_IpRule_Udp struct { DestinationPortRange *AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange `protobuf:"bytes,1,opt,name=destination_port_range" json:"destination_port_range,omitempty"` SourcePortRange *AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange `protobuf:"bytes,2,opt,name=source_port_range" json:"source_port_range,omitempty"` }
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) GetDestinationPortRange ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) GetDestinationPortRange() *AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) GetSourcePortRange ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) GetSourcePortRange() *AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange ¶
type AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange struct { // Lower boundary for port. LowerPort uint32 `protobuf:"varint,1,opt,name=lower_port,proto3" json:"lower_port,omitempty"` // Upper boundary for port. If existing, the upper port must // be greater or equal to lower-port UpperPort uint32 `protobuf:"varint,2,opt,name=upper_port,proto3" json:"upper_port,omitempty"` }
Inclusive range representing destination ports to be used. When only lower-port is present, it represents a single port.
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp_DestinationPortRange) String() string
type AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange ¶
type AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange struct { // Lower boundary for port. LowerPort uint32 `protobuf:"varint,1,opt,name=lower_port,proto3" json:"lower_port,omitempty"` // Upper boundary for port . If existing, the upper port // must be greater or equal to lower-port. UpperPort uint32 `protobuf:"varint,2,opt,name=upper_port,proto3" json:"upper_port,omitempty"` }
Inclusive range representing source ports to be used. When only lower-port is present, it represents a single port.
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange) Reset()
func (*AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange) String ¶
func (m *AccessLists_Acl_Rule_Matches_IpRule_Udp_SourcePortRange) String() string
type AccessLists_Acl_Rule_Matches_MacIpRule ¶
type AccessLists_Acl_Rule_Matches_MacIpRule struct { // Source IPv4/Ipv6 address SourceAddress string `protobuf:"bytes,1,opt,name=source_address,proto3" json:"source_address,omitempty"` // Source IPv4/Ipv6 address prefix SourceAddressPrefix uint32 `protobuf:"varint,2,opt,name=source_address_prefix,proto3" json:"source_address_prefix,omitempty"` // Source IEEE 802 MAC address. // Before source-mac-address is compared with source mac address field of the packet being matched, // source-mac-address-mask is applied to packet field value. SourceMacAddress string `protobuf:"bytes,3,opt,name=source_mac_address,proto3" json:"source_mac_address,omitempty"` // Source IEEE 802 MAC address mask. // Applied as logical AND with source mac address field of the packet being matched, // before it is compared with source-mac-address. SourceMacAddressMask string `protobuf:"bytes,4,opt,name=source_mac_address_mask,proto3" json:"source_mac_address_mask,omitempty"` }
func (*AccessLists_Acl_Rule_Matches_MacIpRule) ProtoMessage ¶
func (*AccessLists_Acl_Rule_Matches_MacIpRule) ProtoMessage()
func (*AccessLists_Acl_Rule_Matches_MacIpRule) Reset ¶
func (m *AccessLists_Acl_Rule_Matches_MacIpRule) Reset()
func (*AccessLists_Acl_Rule_Matches_MacIpRule) String ¶
func (m *AccessLists_Acl_Rule_Matches_MacIpRule) String() string