| Overview | Package | Class | Deprecated | Help |
| Properties | |
|---|---|
| excludeCdp |
Specifies whether packets with Cisco Discovery Protocol
will be excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=CDP (/Excluded Protocols) |
| excludeEapolStart |
Specifies whether packets with Extensible Authentication Protocol over Lan
will be excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=EAPoL (/Excluded Protocols) |
| excludeEfmOam |
Specifies whether packets with ethernet OAM
will be excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=EFM OAM (/Excluded Protocols) |
| excludeEthCfm |
Specifies whether packets with Ethernet Connectivity Fault Management will be excluded
from MACsec on this port.
type=boolean default=false Displayed(tab/group)=Ethernet CFM (/Excluded Protocols) |
| excludeLacp |
Specifies whether packets with Link Aggregation Control Protocol
will be excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=LACP (/Excluded Protocols) |
| excludeLldp |
Specifies whether packets with Link Layer Discovery Protocol
will be excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=LLDP (/Excluded Protocols) |
| excludeMacPolicyPtr |
Specifies the MAC policy to be used for excluding destination MAC addresses for MACsec on this
port.
type=Pointer default= Displayed(tab/group)=MAC Policy To Exclude MAC Addresses |
| excludePtp |
Specifies whether peer to peer packets will be excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=PTP (/Excluded Protocols) |
| excludeUbfd |
Specifies whether packets with micro Bidirectional Forwarding Detection protocol will be
excluded from MACsec on this port
type=boolean default=false Displayed(tab/group)=UBFD (/Excluded Protocols) |
| portName |
The port Name associated with the port.
type=string access=read-only default= Displayed(tab/group)=Port Name |
| portPointer |
type=Pointer access=read-create default= Mandatory on create Displayed(tab/group)=Port |
| rxTrafficEncryption |
Specifies whether received traffic must be encrypted.
'true' - all received traffic that is not MACsec-secured will be dropped.
'false'- all received traffic will be accepted whether MACsec secured or not.
type=boolean default=false Displayed(tab/group)=Receiving Traffic Encryption |
| siteId |
type=string access=read-only default=0.0.0.0 Displayed(tab/group)=Site ID |
| snmpPortId |
type=long access=read-only default=0 |
| Properties inherited from ManagedObject |
|---|
| actionMask, children-Set, deploymentState, isFaultSquelched, name, objectFullName, selfAlarmed |
| Supported Network Elements | |
|---|---|
| 7705 SAR | Supported from 24.10.R3 |
| 7750 SR | Supported from 16.0.R1 |
| 7705 SAR Gen 2 | |
| 7450 ESS | Supported from 16.0.R1 |
| 7210 SAS K |
Supported from 11.0.R6
|
| 7210 SAS Dxp |
Supported from 22.9.R1
|
| 7250 IXR |
Supported from 20.10.R1 until 21.2.R1
|
| Product Specifics | |
| 7210 SAS Dxp 22.0 | |
| 7210 SAS Dxp 23.0 | |
| 7210 SAS Dxp 24.0 | |
| 7210 SAS Dxp 25.0 | |
| 7210 SAS K (all versions) | |
| 7210 SAS K 20.0 | |
| 7210 SAS K 21.0 | |
| 7210 SAS K 22.0 | |
| 7210 SAS K 23.0 | |
| 7210 SAS K 24.0 | |
| 7210 SAS K 25.0 | |
| 7250 IXR 20.0 | |
| 7250 IXR 21.0 | |
| 7250 IXR 22.0 | |
| 7250 IXR 23.0 | |
| 7250 IXR 24.0 | |
| 7250 IXR 25.0 | |
| 7450 ESS 20.0 | |
| 7450 ESS 21.0 | |
| 7450 ESS 22.0 | |
| 7450 ESS 23.0 | |
| 7450 ESS 24.0 | |
| 7450 ESS 25.0 | |
| 7705 SAR Gen 2 25.0 | |
| 7750 SR 20.0 | |
| 7750 SR 21.0 | |
| 7750 SR 22.0 | |
| 7750 SR 23.0 | |
| 7750 SR 24.0 | |
| 7750 SR 25.0 | |