summaryrefslogtreecommitdiffstats
path: root/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/cmd_global2.txt
diff options
context:
space:
mode:
Diffstat (limited to 'Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/cmd_global2.txt')
-rw-r--r--Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/cmd_global2.txt1442
1 files changed, 1442 insertions, 0 deletions
diff --git a/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/cmd_global2.txt b/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/cmd_global2.txt
new file mode 100644
index 0000000..37c1a21
--- /dev/null
+++ b/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/cmd_global2.txt
@@ -0,0 +1,1442 @@
+ /* globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["gt"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ */
+ globalC["access-list"]["<100-199>"].permit.udp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<100-199>"].permit.udp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<100-199>"].permit.udp.any.addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("<0-65535>", "Port number");
+ /* globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<100-199>"].permit.udp.any["lt"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ */
+ globalC["access-list"]["<100-199>"].permit.udp.any.addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("<0-65535>", "Port number");
+ /* globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("time", "Time (37)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.neq.addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ */
+ globalC["access-list"]["<100-199>"].permit.udp.any.addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("<0-65535>", "Port number");
+ /* globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("time", "Time (37)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<100-199>"].permit.udp.any.range.addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ */
+ globalC["access-list"]["<100-199>"].permit.udp.addSC("host", "A single source host");
+ globalC["access-list"]["<100-199>"].permit.udp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<100-199>"].permit.udp.host["Hostname or A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<100-199>"].addSC("remark", "Access list entry comment");
+ globalC["access-list"]["<100-199>"].remark.addSC("LINE", "Comment up to 100 characters");
+ globalC["access-list"].addSC("<1000-1099>", "IPX SAP access list");
+ globalC["access-list"]["<1000-1099>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<1000-1099>"].deny.addSC("-1", "Any IPX net");
+ globalC["access-list"]["<1000-1099>"].deny["-1"].addSC("<0-FFFF>", "Service type-code (0 matches all services)");
+ globalC["access-list"]["<1000-1099>"].deny["-1"]["<0-FFFF>"].addSC("WORD", "A SAP server name");
+ globalC["access-list"]["<1000-1099>"].deny["-1"].addSC("N.H.H.H", "Source net.host mask");
+ globalC["access-list"]["<1000-1099>"].deny.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<1000-1099>"].deny["<0-FFFFFFFF>"].addSC("<0-FFFF>", "Service type-code (0 matches all services)");
+ globalC["access-list"]["<1000-1099>"].deny["<0-FFFFFFFF>"]["<0-FFFF>"].addSC("WORD", "A SAP server name");
+ globalC["access-list"]["<1000-1099>"].deny["<0-FFFFFFFF>"].addSC("N.H.H.H", "Source net.host mask");
+ globalC["access-list"]["<1000-1099>"].deny.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<1000-1099>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<1000-1099>"].permit.addSC("-1", "Any IPX net");
+ globalC["access-list"]["<1000-1099>"].permit["-1"].addSC("<0-FFFF>", "Service type-code (0 matches all services)");
+ globalC["access-list"]["<1000-1099>"].permit["-1"]["<0-FFFF>"].addSC("WORD", "A SAP server name");
+ globalC["access-list"]["<1000-1099>"].permit["-1"].addSC("N.H.H.H", "Source net.host mask");
+ globalC["access-list"]["<1000-1099>"].permit.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<1000-1099>"].permit["<0-FFFFFFFF>"].addSC("<0-FFFF>", "Service type-code (0 matches all services)");
+ globalC["access-list"]["<1000-1099>"].permit["<0-FFFFFFFF>"]["<0-FFFF>"].addSC("WORD", "A SAP server name");
+ globalC["access-list"]["<1000-1099>"].permit["<0-FFFFFFFF>"].addSC("N.H.H.H", "Source net.host mask");
+ globalC["access-list"]["<1000-1099>"].permit.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"].addSC("<1100-1199>", "Extended 48-bit MAC address access list");
+ globalC["access-list"]["<1100-1199>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<1100-1199>"].deny.addSC("H.H.H", "48-bit hardware source address");
+ globalC["access-list"]["<1100-1199>"].deny["H.H.H"].addSC("H.H.H", "48-bit hardware source address mask");
+ globalC["access-list"]["<1100-1199>"].deny["H.H.H"]["H.H.H"].addSC("H.H.H", "48-bit hardware dest address");
+ globalC["access-list"]["<1100-1199>"].deny["H.H.H"]["H.H.H"]["H.H.H"].addSC("H.H.H", "48-bit hardware dest address mask");
+ globalC["access-list"]["<1100-1199>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<1100-1199>"].permit.addSC("H.H.H", "48-bit hardware source address");
+ globalC["access-list"]["<1100-1199>"].permit["H.H.H"].addSC("H.H.H", "48-bit hardware source address mask");
+ globalC["access-list"]["<1100-1199>"].permit["H.H.H"]["H.H.H"].addSC("H.H.H", "48-bit hardware dest address");
+ globalC["access-list"]["<1100-1199>"].permit["H.H.H"]["H.H.H"]["H.H.H"].addSC("H.H.H", "48-bit hardware dest address mask");
+ globalC["access-list"].addSC("<1200-1299>", "IPX summary address access list");
+ /* globalC["access-list"]["<1200-1299>"].addSC("deny", "Specify addresses to reject");
+ globalC["access-list"]["<1200-1299>"].deny.addSC("-1", "Any IPX net");
+ globalC["access-list"]["<1200-1299>"].deny["-1"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].deny["-1"]["area-count"].addSC("<1-255>", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].deny["-1"].addSC("ticks", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].deny["-1"].ticks.addSC("<1-65535>", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].deny["-1"].ticks["<1-65535>"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].deny.addSC("<0-FFFFFFFE>", "IPX network address");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("<0-FFFFFFFF>", "IPX network mask");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Async", "Async interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Async.addSC("<1-129>", "Async interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("BRI", "ISDN Basic Rate Interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].BRI.addSC("<0-6>", "BRI interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("BVI", "Bridge-Group Virtual Interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].BVI.addSC("<1-255>", "BVI interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("CTunnel", "CTunnel interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].CTunnel.addSC("<0-2147483647>", "CTunnel interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Dialer", "Dialer interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Dialer.addSC("<0-799>", "Dialer interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Ethernet", "IEEE 802.3");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Ethernet.addSC("<0-6>", "Ethernet interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Lex", "Lex interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Lex.addSC("<0-2147483647>", "Lex interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Loopback", "Loopback interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Loopback.addSC("<0-2147483647>", "Loopback interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Multilink", "Multilink-group interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Multilink.addSC("<1-2147483647>", "Multilink interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Null", "Null interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Null.addSC("<0-0>", "Null interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Serial", "Serial");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Serial.addSC("<0-6>", "Serial interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Tunnel", "Tunnel interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Tunnel.addSC("<0-2147483647>", "Tunnel interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Vif", "PGM Multicast Host interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].Vif.addSC("<1-1>", "Vif interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Virtual-Template", "Virtual Template interface");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"]["Virtual-Template"].addSC("<1-25>", "Virtual-Template interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("Virtual-TokenRing", "Virtual TokenRing");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"]["Virtual-TokenRing"].addSC("<0-2147483647>", "Virtual-TokenRing interface number");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"]["area-count"].addSC("<1-255>", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].addSC("ticks", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].ticks.addSC("<1-65535>", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].deny["<0-FFFFFFFE>"].ticks["<1-65535>"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].addSC("permit", "Specify addresses to permit");
+ globalC["access-list"]["<1200-1299>"].permit.addSC("-1", "Any IPX net");
+ globalC["access-list"]["<1200-1299>"].permit["-1"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].permit["-1"]["area-count"].addSC("<1-255>", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].permit["-1"].addSC("ticks", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].permit["-1"].ticks.addSC("<1-65535>", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].permit["-1"].ticks["<1-65535>"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].permit.addSC("<0-FFFFFFFE>", "IPX network address");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("<0-FFFFFFFF>", "IPX network mask");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Async", "Async interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Async.addSC("<1-129>", "Async interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("BRI", "ISDN Basic Rate Interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].BRI.addSC("<0-6>", "BRI interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("BVI", "Bridge-Group Virtual Interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].BVI.addSC("<1-255>", "BVI interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("CTunnel", "CTunnel interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].CTunnel.addSC("<0-2147483647>", "CTunnel interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Dialer", "Dialer interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Dialer.addSC("<0-799>", "Dialer interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Ethernet", "IEEE 802.3");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Ethernet.addSC("<0-6>", "Ethernet interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Lex", "Lex interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Lex.addSC("<0-2147483647>", "Lex interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Loopback", "Loopback interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Loopback.addSC("<0-2147483647>", "Loopback interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Multilink", "Multilink-group interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Multilink.addSC("<1-2147483647>", "Multilink interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Null", "Null interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Null.addSC("<0-0>", "Null interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Serial", "Serial");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Serial.addSC("<0-6>", "Serial interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Tunnel", "Tunnel interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Tunnel.addSC("<0-2147483647>", "Tunnel interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Vif", "PGM Multicast Host interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].Vif.addSC("<1-1>", "Vif interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Virtual-Template", "Virtual Template interface");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"]["Virtual-Template"].addSC("<1-25>", "Virtual-Template interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("Virtual-TokenRing", "Virtual TokenRing");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"]["Virtual-TokenRing"].addSC("<0-2147483647>", "Virtual-TokenRing interface number");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("area-count", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"]["area-count"].addSC("<1-255>", "IPX area count");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].addSC("ticks", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].ticks.addSC("<1-65535>", "IPX ticks count");
+ globalC["access-list"]["<1200-1299>"].permit["<0-FFFFFFFE>"].ticks["<1-65535>"].addSC("area-count", "IPX area count");
+
+ globalC["access-list"].addSC("<1300-1999>", "IP standard access list (expanded range)");
+ globalC["access-list"]["<1300-1999>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<1300-1999>"].deny.addSC("Hostname or A.B.C.D", "Address to match");
+ globalC["access-list"]["<1300-1999>"].deny["Hostname or A.B.C.D"].addSC("A.B.C.D", "Wildcard bits");
+ globalC["access-list"]["<1300-1999>"].deny["Hostname or A.B.C.D"].addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<1300-1999>"].deny.addSC("any", "Any source host");
+ globalC["access-list"]["<1300-1999>"].deny.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<1300-1999>"].deny.addSC("host", "A single host address");
+ globalC["access-list"]["<1300-1999>"].deny.host.addSC("Hostname or A.B.C.D", "Host address");
+ globalC["access-list"]["<1300-1999>"].deny.host["Hostname or A.B.C.D"].addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<1300-1999>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<1300-1999>"].permit.addSC("Hostname or A.B.C.D", "Address to match");
+ globalC["access-list"]["<1300-1999>"].permit["Hostname or A.B.C.D"].addSC("A.B.C.D", "Wildcard bits");
+ globalC["access-list"]["<1300-1999>"].permit["Hostname or A.B.C.D"].addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<1300-1999>"].permit.addSC("any", "Any source host");
+ globalC["access-list"]["<1300-1999>"].permit.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<1300-1999>"].permit.addSC("host", "A single host address");
+ globalC["access-list"]["<1300-1999>"].permit.host.addSC("Hostname or A.B.C.D", "Host address");
+ globalC["access-list"]["<1300-1999>"].permit.host["Hostname or A.B.C.D"].addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<1300-1999>"].addSC("remark", "Access list entry comment");
+ globalC["access-list"]["<1300-1999>"].remark.addSC("LINE", "Comment up to 100 characters");
+ globalC["access-list"].addSC("<200-299>", "Protocol type-code access list");
+ globalC["access-list"]["<200-299>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<200-299>"].deny.addSC("<0x0-0xFFFF>", "Protocol type-code");
+ globalC["access-list"]["<200-299>"].deny["<0x0-0xFFFF>"].addSC("<0x0-0xFFFF>", "Protocol type-code mask");
+ globalC["access-list"]["<200-299>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<200-299>"].permit.addSC("<0x0-0xFFFF>", "Protocol type-code");
+ globalC["access-list"]["<200-299>"].permit["<0x0-0xFFFF>"].addSC("<0x0-0xFFFF>", "Protocol type-code mask");
+ globalC["access-list"].addSC("<2000-2699>", "IP extended access list (expanded range)");
+ globalC["access-list"]["<2000-2699>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("<0-255>", "An IP protocol number");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"]["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"]["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"]["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"]["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny["<0-255>"].host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("ahp", "Authentication Header Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ahp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ahp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ahp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ahp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("eigrp", "Cisco's EIGRP routing protocol");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.eigrp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("esp", "Encapsulation Security Payload");
+ globalC["access-list"]["<2000-2699>"].deny.esp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.esp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.esp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.esp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.esp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.esp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.esp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.esp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.esp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.esp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.esp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.esp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("gre", "Cisco's GRE tunneling");
+ globalC["access-list"]["<2000-2699>"].deny.gre.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.gre["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.gre["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.gre["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.gre["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.gre.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.gre.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.gre.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.gre.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.gre.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.gre.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.gre.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("icmp", "Internet Control Message Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.icmp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("<0-255>", "ICMP message type");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("administratively-prohibited", "Administratively prohibited");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("alternate-address", "Alternate address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("conversion-error", "Datagram conversion");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("dod-host-prohibited", "Host prohibited");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("dod-net-prohibited", "Net prohibited");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("echo", "Echo (ping)");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("echo-reply", "Echo reply");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("general-parameter-problem", "Parameter problem");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-isolated", "Host isolated");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-precedence-unreachable", "Host unreachable for precedence");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-redirect", "Host redirect");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-tos-redirect", "Host redirect for TOS");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-tos-unreachable", "Host unreachable for TOS");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-unknown", "Host unknown");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("host-unreachable", "Host unreachable");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("information-reply", "Information replies");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("information-request", "Information requests");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("mask-reply", "Mask replies");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("mask-request", "Mask requests");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("mobile-redirect", "Mobile host redirect");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("net-redirect", "Network redirect");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("net-tos-redirect", "Net redirect for TOS");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("net-tos-unreachable", "Network unreachable for TOS");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("net-unreachable", "Net unreachable");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("network-unknown", "Network unknown");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("no-room-for-option", "Parameter required but no room");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("option-missing", "Parameter required but not present");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("packet-too-big", "Fragmentation needed and DF set");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("parameter-problem", "All parameter problems");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("port-unreachable", "Port unreachable");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("precedence-unreachable", "Precedence cutoff");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("protocol-unreachable", "Protocol unreachable");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("reassembly-timeout", "Reassembly timeout");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("redirect", "All redirects");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("router-advertisement", "Router discovery advertisements");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("router-solicitation", "Router discovery solicitations");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("source-quench", "Source quenches");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("source-route-failed", "Source route failed");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("time-exceeded", "All time exceededs");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("timestamp-reply", "Timestamp replies");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("timestamp-request", "Timestamp requests");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("traceroute", "Traceroute");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("ttl-exceeded", "TTL exceeded");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.any.addSC("unreachable", "All unreachables");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.icmp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("igmp", "Internet Gateway Message Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.igmp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.igmp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igmp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("<0-15>", "IGMP message type");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("dvmrp", "Distance Vector Multicast Routing Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("host-query", "Host query");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("host-report", "Host report");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.any.addSC("trace", "Multicast trace");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igmp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("igrp", "Cisco's IGRP routing protocol");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.igrp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.igrp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igrp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.igrp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("ip", "Any Internet Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.ip.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ip["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ip["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ip["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ip["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ip.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ip.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ip.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.ip.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ip.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ip.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ip.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("ipinip", "IP in IP tunneling");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ipinip.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("nos", "KA9Q NOS compatible IP over IP tunneling");
+ globalC["access-list"]["<2000-2699>"].deny.nos.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.nos["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.nos["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.nos["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.nos["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.nos.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.nos.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.nos.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.nos.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.nos.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.nos.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.nos.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("ospf", "OSPF routing protocol");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ospf["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ospf["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ospf["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.ospf.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("pcp", "Payload Compression Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.pcp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.pcp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pcp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pcp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("pim", "Protocol Independent Multicast");
+ globalC["access-list"]["<2000-2699>"].deny.pim.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.pim["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.pim["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pim["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pim["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pim.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pim.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pim.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.pim.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.pim.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.pim.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.pim.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("tcp", "Transmission Control Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp["A.B.C.D"]["A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("ack", "Match on the ACK bit");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("established", "Match established connections");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("fin", "Match on the FIN bit");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("psh", "Match on the PSH bit");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("rst", "Match on the RST bit");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("syn", "Match on the SYN bit");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.any.addSC("urg", "Match on the URG bit");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["eq"].addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["gt"].addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any["lt"].addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.neq.addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.any.range.addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.tcp.host["Hostname or A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].deny.addSC("udp", "User Datagram Protocol");
+ globalC["access-list"]["<2000-2699>"].deny.udp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp["A.B.C.D"]["A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].deny.udp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["eq"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["gt"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any["lt"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.neq.addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.any.range.addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].deny.udp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].deny.udp.host["Hostname or A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].addSC("dynamic", "Specify a DYNAMIC list of PERMITs or DENYs");
+ globalC["access-list"]["<2000-2699>"].dynamic.addSC("WORD", "Name of a Dynamic list");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("<0-255>", "An IP protocol number");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny["<0-255>"].addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny["<0-255>"].addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny["<0-255>"].addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("ahp", "Authentication Header Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ahp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ahp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ahp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("eigrp", "Cisco's EIGRP routing protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.eigrp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.eigrp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.eigrp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("esp", "Encapsulation Security Payload");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.esp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.esp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.esp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("gre", "Cisco's GRE tunneling");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.gre.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.gre.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.gre.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("icmp", "Internet Control Message Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.icmp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.icmp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.icmp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("igmp", "Internet Gateway Message Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.igmp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.igmp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.igmp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("igrp", "Cisco's IGRP routing protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.igrp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.igrp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.igrp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("ip", "Any Internet Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ip.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ip.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ip.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("ipinip", "IP in IP tunneling");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ipinip.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ipinip.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ipinip.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("nos", "KA9Q NOS compatible IP over IP tunneling");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.nos.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.nos.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.nos.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("ospf", "OSPF routing protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ospf.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ospf.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.ospf.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("pcp", "Payload Compression Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.pcp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.pcp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.pcp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("pim", "Protocol Independent Multicast");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.pim.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.pim.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.pim.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("tcp", "Transmission Control Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.tcp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.tcp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.tcp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.addSC("udp", "User Datagram Protocol");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.udp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.udp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.deny.udp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.addSC("timeout", "Maximum time for dynamic ACL to live");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.timeout.addSC("<1-9999>", "Maximum time to live");
+ globalC["access-list"]["<2000-2699>"].dynamic.WORD.timeout["<1-9999>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<2000-2699>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("<0-255>", "An IP protocol number");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"]["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"]["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"]["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"]["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit["<0-255>"].host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("ahp", "Authentication Header Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ahp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ahp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ahp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ahp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("eigrp", "Cisco's EIGRP routing protocol");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.eigrp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("esp", "Encapsulation Security Payload");
+ globalC["access-list"]["<2000-2699>"].permit.esp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.esp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.esp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.esp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.esp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.esp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.esp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.esp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.esp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.esp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.esp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.esp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("gre", "Cisco's GRE tunneling");
+ globalC["access-list"]["<2000-2699>"].permit.gre.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.gre["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.gre["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.gre["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.gre["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.gre.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.gre.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.gre.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.gre.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.gre.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.gre.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.gre.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("icmp", "Internet Control Message Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.icmp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("<0-255>", "ICMP message type");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("administratively-prohibited", "Administratively prohibited");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("alternate-address", "Alternate address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("conversion-error", "Datagram conversion");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("dod-host-prohibited", "Host prohibited");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("dod-net-prohibited", "Net prohibited");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("echo", "Echo (ping)");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("echo-reply", "Echo reply");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("general-parameter-problem", "Parameter problem");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-isolated", "Host isolated");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-precedence-unreachable", "Host unreachable for precedence");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-redirect", "Host redirect");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-tos-redirect", "Host redirect for TOS");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-tos-unreachable", "Host unreachable for TOS");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-unknown", "Host unknown");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("host-unreachable", "Host unreachable");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("information-reply", "Information replies");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("information-request", "Information requests");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("mask-reply", "Mask replies");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("mask-request", "Mask requests");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("mobile-redirect", "Mobile host redirect");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("net-redirect", "Network redirect");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("net-tos-redirect", "Net redirect for TOS");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("net-tos-unreachable", "Network unreachable for TOS");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("net-unreachable", "Net unreachable");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("network-unknown", "Network unknown");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("no-room-for-option", "Parameter required but no room");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("option-missing", "Parameter required but not present");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("packet-too-big", "Fragmentation needed and DF set");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("parameter-problem", "All parameter problems");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("port-unreachable", "Port unreachable");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("precedence-unreachable", "Precedence cutoff");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("protocol-unreachable", "Protocol unreachable");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("reassembly-timeout", "Reassembly timeout");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("redirect", "All redirects");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("router-advertisement", "Router discovery advertisements");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("router-solicitation", "Router discovery solicitations");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("source-quench", "Source quenches");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("source-route-failed", "Source route failed");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("time-exceeded", "All time exceededs");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("timestamp-reply", "Timestamp replies");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("timestamp-request", "Timestamp requests");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("traceroute", "Traceroute");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("ttl-exceeded", "TTL exceeded");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.any.addSC("unreachable", "All unreachables");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.icmp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("igmp", "Internet Gateway Message Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.igmp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.igmp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igmp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("<0-15>", "IGMP message type");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("dvmrp", "Distance Vector Multicast Routing Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("host-query", "Host query");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("host-report", "Host report");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.any.addSC("trace", "Multicast trace");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igmp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("igrp", "Cisco's IGRP routing protocol");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.igrp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.igrp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igrp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.igrp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("ip", "Any Internet Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.ip.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ip["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ip["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ip["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ip["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ip.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ip.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ip.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.ip.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ip.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ip.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ip.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("ipinip", "IP in IP tunneling");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ipinip.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+*/
+ globalC["access-list"]["<2000-2699>"].permit.addSC("nos", "KA9Q NOS compatible IP over IP tunneling");
+ globalC["access-list"]["<2000-2699>"].permit.nos.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.nos["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.nos["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.nos["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.nos["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.nos.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.nos.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.nos.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.nos.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.nos.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.nos.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.nos.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");