vpp_acl

package
v2.5.0-alpha+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Oct 22, 2019 License: Apache-2.0 Imports: 5 Imported by: 0

Documentation

Index

Constants

View Source
const (

	// IngressFlow represents ingress packet flow
	IngressFlow = "ingress"
	// EgressFlow represents egress packet flow
	EgressFlow = "egress"
)
View Source
const (
	// InvalidKeyPart is used in key for parts which are invalid
	InvalidKeyPart = "<invalid>"
)
View Source
const ModuleName = "vpp.acls"

ModuleName is the module name used for models.

Variables

View Source
var ACL_Rule_Action_name = map[int32]string{
	0: "DENY",
	1: "PERMIT",
	2: "REFLECT",
}
View Source
var ACL_Rule_Action_value = map[string]int32{
	"DENY":    0,
	"PERMIT":  1,
	"REFLECT": 2,
}
View Source
var (
	ModelACL = models.Register(&ACL{}, models.Spec{
		Module:  ModuleName,
		Version: "v2",
		Type:    "acl",
	})
)

Functions

func Key

func Key(aclName string) string

Key returns the prefix used in ETCD to store vpp ACL config of a particular ACL in selected vpp instance.

func ParseACLToInterfaceKey

func ParseACLToInterfaceKey(key string) (acl, iface, flow string, isACLToInterface bool)

ParseACLToInterfaceKey parses ACL to interface key

func ToInterfaceKey

func ToInterfaceKey(acl, iface, flow string) string

ToInterfaceKey returns key for ACL to interface

Types

type ACL

type ACL struct {
	// The name of an access list. A device MAY restrict the length
	// and value of this name, possibly spaces and special
	// characters are not allowed.
	Name                 string          `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
	Rules                []*ACL_Rule     `protobuf:"bytes,2,rep,name=rules,proto3" json:"rules,omitempty"`
	Interfaces           *ACL_Interfaces `protobuf:"bytes,3,opt,name=interfaces,proto3" json:"interfaces,omitempty"`
	XXX_NoUnkeyedLiteral struct{}        `json:"-"`
	XXX_unrecognized     []byte          `json:"-"`
	XXX_sizecache        int32           `json:"-"`
}

ACL defines Access Control List.

func (*ACL) Descriptor

func (*ACL) Descriptor() ([]byte, []int)

func (*ACL) GetInterfaces

func (m *ACL) GetInterfaces() *ACL_Interfaces

func (*ACL) GetName

func (m *ACL) GetName() string

func (*ACL) GetRules

func (m *ACL) GetRules() []*ACL_Rule

func (*ACL) ProtoMessage

func (*ACL) ProtoMessage()

func (*ACL) Reset

func (m *ACL) Reset()

func (*ACL) String

func (m *ACL) String() string

func (*ACL) XXX_DiscardUnknown

func (m *ACL) XXX_DiscardUnknown()

func (*ACL) XXX_Marshal

func (m *ACL) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL) XXX_Merge

func (m *ACL) XXX_Merge(src proto.Message)

func (*ACL) XXX_Size

func (m *ACL) XXX_Size() int

func (*ACL) XXX_Unmarshal

func (m *ACL) XXX_Unmarshal(b []byte) error

type ACL_Interfaces

type ACL_Interfaces struct {
	Egress               []string `protobuf:"bytes,1,rep,name=egress,proto3" json:"egress,omitempty"`
	Ingress              []string `protobuf:"bytes,2,rep,name=ingress,proto3" json:"ingress,omitempty"`
	XXX_NoUnkeyedLiteral struct{} `json:"-"`
	XXX_unrecognized     []byte   `json:"-"`
	XXX_sizecache        int32    `json:"-"`
}

The set of interfaces that has assigned this ACL on ingres or egress.

func (*ACL_Interfaces) Descriptor

func (*ACL_Interfaces) Descriptor() ([]byte, []int)

func (*ACL_Interfaces) GetEgress

func (m *ACL_Interfaces) GetEgress() []string

func (*ACL_Interfaces) GetIngress

func (m *ACL_Interfaces) GetIngress() []string

func (*ACL_Interfaces) ProtoMessage

func (*ACL_Interfaces) ProtoMessage()

func (*ACL_Interfaces) Reset

func (m *ACL_Interfaces) Reset()

func (*ACL_Interfaces) String

func (m *ACL_Interfaces) String() string

func (*ACL_Interfaces) XXX_DiscardUnknown

func (m *ACL_Interfaces) XXX_DiscardUnknown()

func (*ACL_Interfaces) XXX_Marshal

func (m *ACL_Interfaces) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Interfaces) XXX_Merge

func (m *ACL_Interfaces) XXX_Merge(src proto.Message)

func (*ACL_Interfaces) XXX_Size

func (m *ACL_Interfaces) XXX_Size() int

func (*ACL_Interfaces) XXX_Unmarshal

func (m *ACL_Interfaces) XXX_Unmarshal(b []byte) error

type ACL_Rule

type ACL_Rule struct {
	Action               ACL_Rule_Action     `protobuf:"varint,1,opt,name=action,proto3,enum=vpp.acl.ACL_Rule_Action" json:"action,omitempty"`
	IpRule               *ACL_Rule_IpRule    `protobuf:"bytes,2,opt,name=ip_rule,json=ipRule,proto3" json:"ip_rule,omitempty"`
	MacipRule            *ACL_Rule_MacIpRule `protobuf:"bytes,3,opt,name=macip_rule,json=macipRule,proto3" json:"macip_rule,omitempty"`
	XXX_NoUnkeyedLiteral struct{}            `json:"-"`
	XXX_unrecognized     []byte              `json:"-"`
	XXX_sizecache        int32               `json:"-"`
}

List of access list entries (Rules). Each Access Control Rule has a list of match criteria and a list of actions. Access List entry that can define: - IPv4/IPv6 src ip prefix - src MAC address mask - src MAC address value - can be used only for static ACLs.

func (*ACL_Rule) Descriptor

func (*ACL_Rule) Descriptor() ([]byte, []int)

func (*ACL_Rule) GetAction

func (m *ACL_Rule) GetAction() ACL_Rule_Action

func (*ACL_Rule) GetIpRule

func (m *ACL_Rule) GetIpRule() *ACL_Rule_IpRule

func (*ACL_Rule) GetMacipRule

func (m *ACL_Rule) GetMacipRule() *ACL_Rule_MacIpRule

func (*ACL_Rule) ProtoMessage

func (*ACL_Rule) ProtoMessage()

func (*ACL_Rule) Reset

func (m *ACL_Rule) Reset()

func (*ACL_Rule) String

func (m *ACL_Rule) String() string

func (*ACL_Rule) XXX_DiscardUnknown

func (m *ACL_Rule) XXX_DiscardUnknown()

func (*ACL_Rule) XXX_Marshal

func (m *ACL_Rule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule) XXX_Merge

func (m *ACL_Rule) XXX_Merge(src proto.Message)

func (*ACL_Rule) XXX_Size

func (m *ACL_Rule) XXX_Size() int

func (*ACL_Rule) XXX_Unmarshal

func (m *ACL_Rule) XXX_Unmarshal(b []byte) error

type ACL_Rule_Action

type ACL_Rule_Action int32
const (
	ACL_Rule_DENY    ACL_Rule_Action = 0
	ACL_Rule_PERMIT  ACL_Rule_Action = 1
	ACL_Rule_REFLECT ACL_Rule_Action = 2
)

func (ACL_Rule_Action) EnumDescriptor

func (ACL_Rule_Action) EnumDescriptor() ([]byte, []int)

func (ACL_Rule_Action) String

func (x ACL_Rule_Action) String() string

type ACL_Rule_IpRule

type ACL_Rule_IpRule struct {
	Ip                   *ACL_Rule_IpRule_Ip   `protobuf:"bytes,1,opt,name=ip,proto3" json:"ip,omitempty"`
	Icmp                 *ACL_Rule_IpRule_Icmp `protobuf:"bytes,2,opt,name=icmp,proto3" json:"icmp,omitempty"`
	Tcp                  *ACL_Rule_IpRule_Tcp  `protobuf:"bytes,3,opt,name=tcp,proto3" json:"tcp,omitempty"`
	Udp                  *ACL_Rule_IpRule_Udp  `protobuf:"bytes,4,opt,name=udp,proto3" json:"udp,omitempty"`
	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
	XXX_unrecognized     []byte                `json:"-"`
	XXX_sizecache        int32                 `json:"-"`
}

func (*ACL_Rule_IpRule) Descriptor

func (*ACL_Rule_IpRule) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule) GetIcmp

func (m *ACL_Rule_IpRule) GetIcmp() *ACL_Rule_IpRule_Icmp

func (*ACL_Rule_IpRule) GetIp

func (m *ACL_Rule_IpRule) GetIp() *ACL_Rule_IpRule_Ip

func (*ACL_Rule_IpRule) GetTcp

func (m *ACL_Rule_IpRule) GetTcp() *ACL_Rule_IpRule_Tcp

func (*ACL_Rule_IpRule) GetUdp

func (m *ACL_Rule_IpRule) GetUdp() *ACL_Rule_IpRule_Udp

func (*ACL_Rule_IpRule) ProtoMessage

func (*ACL_Rule_IpRule) ProtoMessage()

func (*ACL_Rule_IpRule) Reset

func (m *ACL_Rule_IpRule) Reset()

func (*ACL_Rule_IpRule) String

func (m *ACL_Rule_IpRule) String() string

func (*ACL_Rule_IpRule) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule) XXX_Marshal

func (m *ACL_Rule_IpRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule) XXX_Merge

func (m *ACL_Rule_IpRule) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule) XXX_Size

func (m *ACL_Rule_IpRule) XXX_Size() int

func (*ACL_Rule_IpRule) XXX_Unmarshal

func (m *ACL_Rule_IpRule) XXX_Unmarshal(b []byte) error

type ACL_Rule_IpRule_Icmp

type ACL_Rule_IpRule_Icmp struct {
	// ICMPv6 flag, if false ICMPv4 will be used
	Icmpv6 bool `protobuf:"varint,1,opt,name=icmpv6,proto3" json:"icmpv6,omitempty"`
	// Inclusive range representing icmp codes to be used.
	IcmpCodeRange        *ACL_Rule_IpRule_Icmp_Range `protobuf:"bytes,2,opt,name=icmp_code_range,json=icmpCodeRange,proto3" json:"icmp_code_range,omitempty"`
	IcmpTypeRange        *ACL_Rule_IpRule_Icmp_Range `protobuf:"bytes,3,opt,name=icmp_type_range,json=icmpTypeRange,proto3" json:"icmp_type_range,omitempty"`
	XXX_NoUnkeyedLiteral struct{}                    `json:"-"`
	XXX_unrecognized     []byte                      `json:"-"`
	XXX_sizecache        int32                       `json:"-"`
}

func (*ACL_Rule_IpRule_Icmp) Descriptor

func (*ACL_Rule_IpRule_Icmp) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule_Icmp) GetIcmpCodeRange

func (m *ACL_Rule_IpRule_Icmp) GetIcmpCodeRange() *ACL_Rule_IpRule_Icmp_Range

func (*ACL_Rule_IpRule_Icmp) GetIcmpTypeRange

func (m *ACL_Rule_IpRule_Icmp) GetIcmpTypeRange() *ACL_Rule_IpRule_Icmp_Range

func (*ACL_Rule_IpRule_Icmp) GetIcmpv6

func (m *ACL_Rule_IpRule_Icmp) GetIcmpv6() bool

func (*ACL_Rule_IpRule_Icmp) ProtoMessage

func (*ACL_Rule_IpRule_Icmp) ProtoMessage()

func (*ACL_Rule_IpRule_Icmp) Reset

func (m *ACL_Rule_IpRule_Icmp) Reset()

func (*ACL_Rule_IpRule_Icmp) String

func (m *ACL_Rule_IpRule_Icmp) String() string

func (*ACL_Rule_IpRule_Icmp) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule_Icmp) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule_Icmp) XXX_Marshal

func (m *ACL_Rule_IpRule_Icmp) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule_Icmp) XXX_Merge

func (m *ACL_Rule_IpRule_Icmp) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule_Icmp) XXX_Size

func (m *ACL_Rule_IpRule_Icmp) XXX_Size() int

func (*ACL_Rule_IpRule_Icmp) XXX_Unmarshal

func (m *ACL_Rule_IpRule_Icmp) XXX_Unmarshal(b []byte) error

type ACL_Rule_IpRule_Icmp_Range

type ACL_Rule_IpRule_Icmp_Range struct {
	First                uint32   `protobuf:"varint,1,opt,name=first,proto3" json:"first,omitempty"`
	Last                 uint32   `protobuf:"varint,2,opt,name=last,proto3" json:"last,omitempty"`
	XXX_NoUnkeyedLiteral struct{} `json:"-"`
	XXX_unrecognized     []byte   `json:"-"`
	XXX_sizecache        int32    `json:"-"`
}

func (*ACL_Rule_IpRule_Icmp_Range) Descriptor

func (*ACL_Rule_IpRule_Icmp_Range) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule_Icmp_Range) GetFirst

func (m *ACL_Rule_IpRule_Icmp_Range) GetFirst() uint32

func (*ACL_Rule_IpRule_Icmp_Range) GetLast

func (m *ACL_Rule_IpRule_Icmp_Range) GetLast() uint32

func (*ACL_Rule_IpRule_Icmp_Range) ProtoMessage

func (*ACL_Rule_IpRule_Icmp_Range) ProtoMessage()

func (*ACL_Rule_IpRule_Icmp_Range) Reset

func (m *ACL_Rule_IpRule_Icmp_Range) Reset()

func (*ACL_Rule_IpRule_Icmp_Range) String

func (m *ACL_Rule_IpRule_Icmp_Range) String() string

func (*ACL_Rule_IpRule_Icmp_Range) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule_Icmp_Range) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule_Icmp_Range) XXX_Marshal

func (m *ACL_Rule_IpRule_Icmp_Range) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule_Icmp_Range) XXX_Merge

func (m *ACL_Rule_IpRule_Icmp_Range) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule_Icmp_Range) XXX_Size

func (m *ACL_Rule_IpRule_Icmp_Range) XXX_Size() int

func (*ACL_Rule_IpRule_Icmp_Range) XXX_Unmarshal

func (m *ACL_Rule_IpRule_Icmp_Range) XXX_Unmarshal(b []byte) error

type ACL_Rule_IpRule_Ip

type ACL_Rule_IpRule_Ip struct {
	// Destination IPv4/IPv6 network address (<ip>/<network>)
	DestinationNetwork string `protobuf:"bytes,1,opt,name=destination_network,json=destinationNetwork,proto3" json:"destination_network,omitempty"`
	// Destination IPv4/IPv6 network address (<ip>/<network>)
	SourceNetwork        string   `protobuf:"bytes,2,opt,name=source_network,json=sourceNetwork,proto3" json:"source_network,omitempty"`
	XXX_NoUnkeyedLiteral struct{} `json:"-"`
	XXX_unrecognized     []byte   `json:"-"`
	XXX_sizecache        int32    `json:"-"`
}

IP used in this Access List Entry.

func (*ACL_Rule_IpRule_Ip) Descriptor

func (*ACL_Rule_IpRule_Ip) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule_Ip) GetDestinationNetwork

func (m *ACL_Rule_IpRule_Ip) GetDestinationNetwork() string

func (*ACL_Rule_IpRule_Ip) GetSourceNetwork

func (m *ACL_Rule_IpRule_Ip) GetSourceNetwork() string

func (*ACL_Rule_IpRule_Ip) ProtoMessage

func (*ACL_Rule_IpRule_Ip) ProtoMessage()

func (*ACL_Rule_IpRule_Ip) Reset

func (m *ACL_Rule_IpRule_Ip) Reset()

func (*ACL_Rule_IpRule_Ip) String

func (m *ACL_Rule_IpRule_Ip) String() string

func (*ACL_Rule_IpRule_Ip) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule_Ip) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule_Ip) XXX_Marshal

func (m *ACL_Rule_IpRule_Ip) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule_Ip) XXX_Merge

func (m *ACL_Rule_IpRule_Ip) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule_Ip) XXX_Size

func (m *ACL_Rule_IpRule_Ip) XXX_Size() int

func (*ACL_Rule_IpRule_Ip) XXX_Unmarshal

func (m *ACL_Rule_IpRule_Ip) XXX_Unmarshal(b []byte) error

type ACL_Rule_IpRule_PortRange

type ACL_Rule_IpRule_PortRange struct {
	LowerPort uint32 `protobuf:"varint,1,opt,name=lower_port,json=lowerPort,proto3" json:"lower_port,omitempty"`
	// If upper port is set, it must
	// be greater or equal to lower port
	UpperPort            uint32   `protobuf:"varint,2,opt,name=upper_port,json=upperPort,proto3" json:"upper_port,omitempty"`
	XXX_NoUnkeyedLiteral struct{} `json:"-"`
	XXX_unrecognized     []byte   `json:"-"`
	XXX_sizecache        int32    `json:"-"`
}

Inclusive range representing destination ports to be used. When only lower-port is present, it represents a single port.

func (*ACL_Rule_IpRule_PortRange) Descriptor

func (*ACL_Rule_IpRule_PortRange) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule_PortRange) GetLowerPort

func (m *ACL_Rule_IpRule_PortRange) GetLowerPort() uint32

func (*ACL_Rule_IpRule_PortRange) GetUpperPort

func (m *ACL_Rule_IpRule_PortRange) GetUpperPort() uint32

func (*ACL_Rule_IpRule_PortRange) ProtoMessage

func (*ACL_Rule_IpRule_PortRange) ProtoMessage()

func (*ACL_Rule_IpRule_PortRange) Reset

func (m *ACL_Rule_IpRule_PortRange) Reset()

func (*ACL_Rule_IpRule_PortRange) String

func (m *ACL_Rule_IpRule_PortRange) String() string

func (*ACL_Rule_IpRule_PortRange) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule_PortRange) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule_PortRange) XXX_Marshal

func (m *ACL_Rule_IpRule_PortRange) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule_PortRange) XXX_Merge

func (m *ACL_Rule_IpRule_PortRange) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule_PortRange) XXX_Size

func (m *ACL_Rule_IpRule_PortRange) XXX_Size() int

func (*ACL_Rule_IpRule_PortRange) XXX_Unmarshal

func (m *ACL_Rule_IpRule_PortRange) XXX_Unmarshal(b []byte) error

type ACL_Rule_IpRule_Tcp

type ACL_Rule_IpRule_Tcp struct {
	DestinationPortRange *ACL_Rule_IpRule_PortRange `protobuf:"bytes,1,opt,name=destination_port_range,json=destinationPortRange,proto3" json:"destination_port_range,omitempty"`
	SourcePortRange      *ACL_Rule_IpRule_PortRange `protobuf:"bytes,2,opt,name=source_port_range,json=sourcePortRange,proto3" json:"source_port_range,omitempty"`
	// Binary mask for tcp flags to match. MSB order (FIN at position 0).
	// Applied as logical AND to tcp flags field of the packet being matched,
	// before it is compared with tcp-flags-value.
	TcpFlagsMask uint32 `protobuf:"varint,3,opt,name=tcp_flags_mask,json=tcpFlagsMask,proto3" json:"tcp_flags_mask,omitempty"`
	// Binary value for tcp flags to match. MSB order (FIN at position 0).
	// Before tcp-flags-value is compared with tcp flags field of the packet being matched,
	// tcp-flags-mask is applied to packet field value.
	TcpFlagsValue        uint32   `protobuf:"varint,4,opt,name=tcp_flags_value,json=tcpFlagsValue,proto3" json:"tcp_flags_value,omitempty"`
	XXX_NoUnkeyedLiteral struct{} `json:"-"`
	XXX_unrecognized     []byte   `json:"-"`
	XXX_sizecache        int32    `json:"-"`
}

func (*ACL_Rule_IpRule_Tcp) Descriptor

func (*ACL_Rule_IpRule_Tcp) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule_Tcp) GetDestinationPortRange

func (m *ACL_Rule_IpRule_Tcp) GetDestinationPortRange() *ACL_Rule_IpRule_PortRange

func (*ACL_Rule_IpRule_Tcp) GetSourcePortRange

func (m *ACL_Rule_IpRule_Tcp) GetSourcePortRange() *ACL_Rule_IpRule_PortRange

func (*ACL_Rule_IpRule_Tcp) GetTcpFlagsMask

func (m *ACL_Rule_IpRule_Tcp) GetTcpFlagsMask() uint32

func (*ACL_Rule_IpRule_Tcp) GetTcpFlagsValue

func (m *ACL_Rule_IpRule_Tcp) GetTcpFlagsValue() uint32

func (*ACL_Rule_IpRule_Tcp) ProtoMessage

func (*ACL_Rule_IpRule_Tcp) ProtoMessage()

func (*ACL_Rule_IpRule_Tcp) Reset

func (m *ACL_Rule_IpRule_Tcp) Reset()

func (*ACL_Rule_IpRule_Tcp) String

func (m *ACL_Rule_IpRule_Tcp) String() string

func (*ACL_Rule_IpRule_Tcp) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule_Tcp) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule_Tcp) XXX_Marshal

func (m *ACL_Rule_IpRule_Tcp) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule_Tcp) XXX_Merge

func (m *ACL_Rule_IpRule_Tcp) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule_Tcp) XXX_Size

func (m *ACL_Rule_IpRule_Tcp) XXX_Size() int

func (*ACL_Rule_IpRule_Tcp) XXX_Unmarshal

func (m *ACL_Rule_IpRule_Tcp) XXX_Unmarshal(b []byte) error

type ACL_Rule_IpRule_Udp

type ACL_Rule_IpRule_Udp struct {
	DestinationPortRange *ACL_Rule_IpRule_PortRange `protobuf:"bytes,1,opt,name=destination_port_range,json=destinationPortRange,proto3" json:"destination_port_range,omitempty"`
	SourcePortRange      *ACL_Rule_IpRule_PortRange `protobuf:"bytes,2,opt,name=source_port_range,json=sourcePortRange,proto3" json:"source_port_range,omitempty"`
	XXX_NoUnkeyedLiteral struct{}                   `json:"-"`
	XXX_unrecognized     []byte                     `json:"-"`
	XXX_sizecache        int32                      `json:"-"`
}

func (*ACL_Rule_IpRule_Udp) Descriptor

func (*ACL_Rule_IpRule_Udp) Descriptor() ([]byte, []int)

func (*ACL_Rule_IpRule_Udp) GetDestinationPortRange

func (m *ACL_Rule_IpRule_Udp) GetDestinationPortRange() *ACL_Rule_IpRule_PortRange

func (*ACL_Rule_IpRule_Udp) GetSourcePortRange

func (m *ACL_Rule_IpRule_Udp) GetSourcePortRange() *ACL_Rule_IpRule_PortRange

func (*ACL_Rule_IpRule_Udp) ProtoMessage

func (*ACL_Rule_IpRule_Udp) ProtoMessage()

func (*ACL_Rule_IpRule_Udp) Reset

func (m *ACL_Rule_IpRule_Udp) Reset()

func (*ACL_Rule_IpRule_Udp) String

func (m *ACL_Rule_IpRule_Udp) String() string

func (*ACL_Rule_IpRule_Udp) XXX_DiscardUnknown

func (m *ACL_Rule_IpRule_Udp) XXX_DiscardUnknown()

func (*ACL_Rule_IpRule_Udp) XXX_Marshal

func (m *ACL_Rule_IpRule_Udp) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_IpRule_Udp) XXX_Merge

func (m *ACL_Rule_IpRule_Udp) XXX_Merge(src proto.Message)

func (*ACL_Rule_IpRule_Udp) XXX_Size

func (m *ACL_Rule_IpRule_Udp) XXX_Size() int

func (*ACL_Rule_IpRule_Udp) XXX_Unmarshal

func (m *ACL_Rule_IpRule_Udp) XXX_Unmarshal(b []byte) error

type ACL_Rule_MacIpRule

type ACL_Rule_MacIpRule struct {
	SourceAddress       string `protobuf:"bytes,1,opt,name=source_address,json=sourceAddress,proto3" json:"source_address,omitempty"`
	SourceAddressPrefix uint32 `protobuf:"varint,2,opt,name=source_address_prefix,json=sourceAddressPrefix,proto3" json:"source_address_prefix,omitempty"`
	// Before source-mac-address is compared with source mac address field of the packet
	// being matched, source-mac-address-mask is applied to packet field value.
	SourceMacAddress string `protobuf:"bytes,3,opt,name=source_mac_address,json=sourceMacAddress,proto3" json:"source_mac_address,omitempty"`
	// Source MAC address mask.
	// Applied as logical AND with source mac address field of the packet being matched,
	// before it is compared with source-mac-address.
	SourceMacAddressMask string   `protobuf:"bytes,4,opt,name=source_mac_address_mask,json=sourceMacAddressMask,proto3" json:"source_mac_address_mask,omitempty"`
	XXX_NoUnkeyedLiteral struct{} `json:"-"`
	XXX_unrecognized     []byte   `json:"-"`
	XXX_sizecache        int32    `json:"-"`
}

func (*ACL_Rule_MacIpRule) Descriptor

func (*ACL_Rule_MacIpRule) Descriptor() ([]byte, []int)

func (*ACL_Rule_MacIpRule) GetSourceAddress

func (m *ACL_Rule_MacIpRule) GetSourceAddress() string

func (*ACL_Rule_MacIpRule) GetSourceAddressPrefix

func (m *ACL_Rule_MacIpRule) GetSourceAddressPrefix() uint32

func (*ACL_Rule_MacIpRule) GetSourceMacAddress

func (m *ACL_Rule_MacIpRule) GetSourceMacAddress() string

func (*ACL_Rule_MacIpRule) GetSourceMacAddressMask

func (m *ACL_Rule_MacIpRule) GetSourceMacAddressMask() string

func (*ACL_Rule_MacIpRule) ProtoMessage

func (*ACL_Rule_MacIpRule) ProtoMessage()

func (*ACL_Rule_MacIpRule) Reset

func (m *ACL_Rule_MacIpRule) Reset()

func (*ACL_Rule_MacIpRule) String

func (m *ACL_Rule_MacIpRule) String() string

func (*ACL_Rule_MacIpRule) XXX_DiscardUnknown

func (m *ACL_Rule_MacIpRule) XXX_DiscardUnknown()

func (*ACL_Rule_MacIpRule) XXX_Marshal

func (m *ACL_Rule_MacIpRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)

func (*ACL_Rule_MacIpRule) XXX_Merge

func (m *ACL_Rule_MacIpRule) XXX_Merge(src proto.Message)

func (*ACL_Rule_MacIpRule) XXX_Size

func (m *ACL_Rule_MacIpRule) XXX_Size() int

func (*ACL_Rule_MacIpRule) XXX_Unmarshal

func (m *ACL_Rule_MacIpRule) XXX_Unmarshal(b []byte) error

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL