summaryrefslogtreecommitdiffstats
path: root/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/xcmd_global3.txt
diff options
context:
space:
mode:
Diffstat (limited to 'Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/xcmd_global3.txt')
-rw-r--r--Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/xcmd_global3.txt1520
1 files changed, 1520 insertions, 0 deletions
diff --git a/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/xcmd_global3.txt b/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/xcmd_global3.txt
new file mode 100644
index 0000000..88977af
--- /dev/null
+++ b/Bachelor/CCNA4/en_CCNA4_v30/elabs/Engine/Router 3640/xcmd_global3.txt
@@ -0,0 +1,1520 @@
+ globalC["access-list"]["<2000-2699>"].permit.addSC("ospf", "OSPF routing protocol");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ospf["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ospf["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ospf["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.ospf.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("pcp", "Payload Compression Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.pcp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.pcp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pcp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pcp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("pim", "Protocol Independent Multicast");
+ globalC["access-list"]["<2000-2699>"].permit.pim.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.pim["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.pim["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pim["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pim["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pim.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pim.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pim.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.pim.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.pim.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.pim.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.pim.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("tcp", "Transmission Control Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp["A.B.C.D"]["A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("ack", "Match on the ACK bit");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("established", "Match established connections");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("fin", "Match on the FIN bit");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("psh", "Match on the PSH bit");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("rst", "Match on the RST bit");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("syn", "Match on the SYN bit");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.any.addSC("urg", "Match on the URG bit");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["eq"].addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["gt"].addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any["lt"].addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.neq.addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("bgp", "Border Gateway Protocol (179)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("chargen", "Character generator (19)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("cmd", "Remote commands (rcmd, 514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("daytime", "Daytime (13)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("domain", "Domain Name Service (53)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("exec", "Exec (rsh, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("finger", "Finger (79)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("ftp", "File Transfer Protocol (21)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("ftp-data", "FTP data connections (used infrequently, 20)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("gopher", "Gopher (70)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("hostname", "NIC hostname server (101)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("ident", "Ident Protocol (113)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("irc", "Internet Relay Chat (194)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("klogin", "Kerberos login (543)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("kshell", "Kerberos shell (544)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("login", "Login (rlogin, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("lpd", "Printer service (515)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("nntp", "Network News Transport Protocol (119)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("pop2", "Post Office Protocol v2 (109)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("pop3", "Post Office Protocol v3 (110)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("smtp", "Simple Mail Transport Protocol (25)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("syslog", "Syslog (514)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("telnet", "Telnet (23)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("uucp", "Unix-to-Unix Copy Program (540)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("whois", "Nicname (43)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.any.range.addSC("www", "World Wide Web (HTTP, 80)");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.tcp.host["Hostname or A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].permit.addSC("udp", "User Datagram Protocol");
+ globalC["access-list"]["<2000-2699>"].permit.udp.addSC("A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"].addSC("A.B.C.D", "Source wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp["A.B.C.D"]["A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].permit.udp.addSC("any", "Any source host");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["A.B.C.D"].addSC("A.B.C.D", "Destination wildcard bits");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("dscp", "Match packets with given dscp value");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("fragments", "Check non-initial fragments");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("log-input", "Log matches against this entry, including input interface");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("precedence", "Match packets with given precedence value");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.any.addSC("tos", "Match packets with given TOS value");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["eq"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["gt"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.host.addSC("Hostname or A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any["lt"].addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.neq.addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("<0-65535>", "Port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("biff", "Biff (mail notification, comsat, 512)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("bootpc", "Bootstrap Protocol (BOOTP) client (68)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("bootps", "Bootstrap Protocol (BOOTP) server (67)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("discard", "Discard (9)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("dnsix", "DNSIX security protocol auditing (195)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("domain", "Domain Name Service (DNS, 53)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("echo", "Echo (7)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("isakmp", "Internet Security Association and Key Management Protocol (500)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("mobile-ip", "Mobile IP registration (434)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("nameserver", "IEN116 name service (obsolete, 42)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("netbios-dgm", "NetBios datagram service (138)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("netbios-ns", "NetBios name service (137)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("netbios-ss", "NetBios session service (139)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("ntp", "Network Time Protocol (123)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("pim-auto-rp", "PIM Auto-RP (496)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("rip", "Routing Information Protocol (router, in.routed, 520)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("snmp", "Simple Network Management Protocol (161)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("snmptrap", "SNMP Traps (162)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("sunrpc", "Sun Remote Procedure Call (111)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("syslog", "System Logger (514)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("tacacs", "TAC Access Control System (49)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("talk", "Talk (517)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("tftp", "Trivial File Transfer Protocol (69)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("time", "Time (37)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("who", "Who service (rwho, 513)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.any.range.addSC("xdmcp", "X Display Manager Control Protocol (177)");
+ globalC["access-list"]["<2000-2699>"].permit.udp.addSC("host", "A single source host");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host.addSC("Hostname or A.B.C.D", "Source address");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("A.B.C.D", "Destination address");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("any", "Any destination host");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("eq", "Match only packets on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("gt", "Match only packets with a greater port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("host", "A single destination host");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("lt", "Match only packets with a lower port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("neq", "Match only packets not on a given port number");
+ globalC["access-list"]["<2000-2699>"].permit.udp.host["Hostname or A.B.C.D"].addSC("range", "Match only packets in the range of port numbers");
+ globalC["access-list"]["<2000-2699>"].addSC("remark", "Access list entry comment");
+ globalC["access-list"]["<2000-2699>"].remark.addSC("LINE", "Comment up to 100 characters");
+
+ globalC["access-list"].addSC("<300-399>", "DECnet access list");
+/* globalC["access-list"]["<300-399>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<300-399>"].deny.addSC("N.H", "Decnet source address to match");
+ globalC["access-list"]["<300-399>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<300-399>"].permit.addSC("N.H", "Decnet source address to match");
+*/
+ globalC["access-list"].addSC("<400-499>", "XNS standard access list");
+/* globalC["access-list"]["<400-499>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<400-499>"].deny.addSC("-1", "Any XNS net");
+ globalC["access-list"]["<400-499>"].deny["-1"].addSC("<1-4294967294>", "Destination net");
+ globalC["access-list"]["<400-499>"].deny["-1"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<400-499>"].deny.addSC("<1-4294967294>", "Source net");
+ globalC["access-list"]["<400-499>"].deny["<1-4294967294>"].addSC("-1", "Any XNS net");
+ globalC["access-list"]["<400-499>"].deny["<1-4294967294>"].addSC("<1-4294967294>", "Destination net");
+ globalC["access-list"]["<400-499>"].deny["<1-4294967294>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<400-499>"].deny.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<400-499>"].addSC("permit", "Specify packets to permit");
+ globalC["access-list"]["<400-499>"].permit.addSC("-1", "Any XNS net");
+ globalC["access-list"]["<400-499>"].permit["-1"].addSC("<1-4294967294>", "Destination net");
+ globalC["access-list"]["<400-499>"].permit["-1"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<400-499>"].permit.addSC("<1-4294967294>", "Source net");
+ globalC["access-list"]["<400-499>"].permit["<1-4294967294>"].addSC("-1", "Any XNS net");
+ globalC["access-list"]["<400-499>"].permit["<1-4294967294>"].addSC("<1-4294967294>", "Destination net");
+ globalC["access-list"]["<400-499>"].permit["<1-4294967294>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<400-499>"].permit.addSC("N.H.H.H", "Source net.host address");
+*/
+ globalC["access-list"].addSC("<500-599>", "XNS extended access list");
+/* globalC["access-list"]["<500-599>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<500-599>"].deny.addSC("<0-255>", "Protocol type number");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"].addSC("-1", "Any XNS net");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["-1"].addSC("<0-65535>", "Socket number (0 for all sockets)");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["-1"]["<0-65535>"].addSC("<0-4294967295>", "Destination net");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["-1"]["<0-65535>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"].addSC("<0-4294967295>", "Source net");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["<0-4294967295>"].addSC("<0-65535>", "Socket number (0 for all sockets)");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["<0-4294967295>"]["<0-65535>"].addSC("-1", "Any XNS net");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["<0-4294967295>"]["<0-65535>"].addSC("<0-4294967295>", "Destination net");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"]["<0-4294967295>"]["<0-65535>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<500-599>"].deny["<0-255>"].addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<500-599>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<500-599>"].permit.addSC("<0-255>", "Protocol type number");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"].addSC("-1", "Any XNS net");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["-1"].addSC("<0-65535>", "Socket number (0 for all sockets)");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["-1"]["<0-65535>"].addSC("<0-4294967295>", "Destination net");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["-1"]["<0-65535>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"].addSC("<0-4294967295>", "Source net");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["<0-4294967295>"].addSC("<0-65535>", "Socket number (0 for all sockets)");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["<0-4294967295>"]["<0-65535>"].addSC("-1", "Any XNS net");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["<0-4294967295>"]["<0-65535>"].addSC("<0-4294967295>", "Destination net");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"]["<0-4294967295>"]["<0-65535>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<500-599>"].permit["<0-255>"].addSC("N.H.H.H", "Source net.host address");
+ */
+ globalC["access-list"].addSC("<600-699>", "Appletalk access list");
+/* globalC["access-list"]["<600-699>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<600-699>"].deny.addSC("<1-65279>", "Appletalk network number");
+ globalC["access-list"]["<600-699>"].deny["<1-65279>"].addSC("broadcast-deny", "Specify denial of broadcasts");
+ globalC["access-list"]["<600-699>"].deny["<1-65279>"].addSC("broadcast-permit", "Specify permission of broadcasts");
+ globalC["access-list"]["<600-699>"].deny.addSC("additional-zones", "Default filter action for unspecified zones");
+ globalC["access-list"]["<600-699>"].deny.addSC("cable-range", "Filter on cable range");
+ globalC["access-list"]["<600-699>"].deny["cable-range"].addSC("Start-End", "Apple cable range");
+ globalC["access-list"]["<600-699>"].deny.addSC("includes", "Filter on cable range inclusively");
+ globalC["access-list"]["<600-699>"].deny.includes.addSC("Start-End", "Apple cable range");
+ globalC["access-list"]["<600-699>"].deny.addSC("nbp", "Specify nbp filter");
+ globalC["access-list"]["<600-699>"].deny.nbp.addSC("<1-65536>", "nbp sequence number");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("BrRq", "Filter on nbp Broadcast Request");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("FwdRq", "Filter on nbp Forward Request");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("LkReply", "Filter on nbp Lookup Reply");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("Lookup", "Filter on nbp Lookup");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("object", "Filter on nbp object");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].object.addSC("LINE", "NBP object filter");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("type", "Filter on nbp type");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].type.addSC("LINE", "NBP type filter");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].addSC("zone", "Filter on nbp zone");
+ globalC["access-list"]["<600-699>"].deny.nbp["<1-65536>"].zone.addSC("LINE", "NBP zone filter");
+ globalC["access-list"]["<600-699>"].deny.addSC("network", "Filter an appletalk network");
+ globalC["access-list"]["<600-699>"].deny.network.addSC("<1-65279>", "Appletalk network number");
+ globalC["access-list"]["<600-699>"].deny.network["<1-65279>"].addSC("broadcast-deny", "Specify denial of broadcasts");
+ globalC["access-list"]["<600-699>"].deny.network["<1-65279>"].addSC("broadcast-permit", "Specify permission of broadcasts");
+ globalC["access-list"]["<600-699>"].deny.addSC("other-access", "Default filter action");
+ globalC["access-list"]["<600-699>"].deny["other-access"].addSC("broadcast-deny", "Specify denial of broadcasts");
+ globalC["access-list"]["<600-699>"].deny["other-access"].addSC("broadcast-permit", "Specify permission of broadcasts");
+ globalC["access-list"]["<600-699>"].deny.addSC("other-nbps", "Default filter action for nbp");
+ globalC["access-list"]["<600-699>"].deny.addSC("within", "Filter on cable range exclusively");
+ globalC["access-list"]["<600-699>"].deny.within.addSC("Start-End", "Apple cable range");
+ globalC["access-list"]["<600-699>"].deny.addSC("zone", "Filter on appletalk zone");
+ globalC["access-list"]["<600-699>"].deny.zone.addSC("LINE", "Appletalk zone name");
+ globalC["access-list"]["<600-699>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<600-699>"].permit.addSC("<1-65279>", "Appletalk network number");
+ globalC["access-list"]["<600-699>"].permit["<1-65279>"].addSC("broadcast-deny", "Specify denial of broadcasts");
+ globalC["access-list"]["<600-699>"].permit["<1-65279>"].addSC("broadcast-permit", "Specify permission of broadcasts");
+ globalC["access-list"]["<600-699>"].permit.addSC("additional-zones", "Default filter action for unspecified zones");
+ globalC["access-list"]["<600-699>"].permit.addSC("cable-range", "Filter on cable range");
+ globalC["access-list"]["<600-699>"].permit["cable-range"].addSC("Start-End", "Apple cable range");
+ globalC["access-list"]["<600-699>"].permit.addSC("includes", "Filter on cable range inclusively");
+ globalC["access-list"]["<600-699>"].permit.includes.addSC("Start-End", "Apple cable range");
+ globalC["access-list"]["<600-699>"].permit.addSC("nbp", "Specify nbp filter");
+ globalC["access-list"]["<600-699>"].permit.nbp.addSC("<1-65536>", "nbp sequence number");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("BrRq", "Filter on nbp Broadcast Request");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("FwdRq", "Filter on nbp Forward Request");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("LkReply", "Filter on nbp Lookup Reply");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("Lookup", "Filter on nbp Lookup");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("object", "Filter on nbp object");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].object.addSC("LINE", "NBP object filter");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("type", "Filter on nbp type");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].type.addSC("LINE", "NBP type filter");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].addSC("zone", "Filter on nbp zone");
+ globalC["access-list"]["<600-699>"].permit.nbp["<1-65536>"].zone.addSC("LINE", "NBP zone filter");
+ globalC["access-list"]["<600-699>"].permit.addSC("network", "Filter an appletalk network");
+ globalC["access-list"]["<600-699>"].permit.network.addSC("<1-65279>", "Appletalk network number");
+ globalC["access-list"]["<600-699>"].permit.network["<1-65279>"].addSC("broadcast-deny", "Specify denial of broadcasts");
+ globalC["access-list"]["<600-699>"].permit.network["<1-65279>"].addSC("broadcast-permit", "Specify permission of broadcasts");
+ globalC["access-list"]["<600-699>"].permit.addSC("other-access", "Default filter action");
+ globalC["access-list"]["<600-699>"].permit["other-access"].addSC("broadcast-deny", "Specify denial of broadcasts");
+ globalC["access-list"]["<600-699>"].permit["other-access"].addSC("broadcast-permit", "Specify permission of broadcasts");
+ globalC["access-list"]["<600-699>"].permit.addSC("other-nbps", "Default filter action for nbp");
+ globalC["access-list"]["<600-699>"].permit.addSC("within", "Filter on cable range exclusively");
+ globalC["access-list"]["<600-699>"].permit.within.addSC("Start-End", "Apple cable range");
+ globalC["access-list"]["<600-699>"].permit.addSC("zone", "Filter on appletalk zone");
+ globalC["access-list"]["<600-699>"].permit.zone.addSC("LINE", "Appletalk zone name");
+ */
+ globalC["access-list"].addSC("<700-799>", "48-bit MAC address access list");
+ /* globalC["access-list"]["<700-799>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<700-799>"].deny.addSC("H.H.H", "48-bit hardware address");
+ globalC["access-list"]["<700-799>"].deny["H.H.H"].addSC("H.H.H", "48-bit hardware address mask");
+ globalC["access-list"]["<700-799>"].addSC("permit", "Specify packets to forward");
+ globalC["access-list"]["<700-799>"].permit.addSC("H.H.H", "48-bit hardware address");
+ globalC["access-list"]["<700-799>"].permit["H.H.H"].addSC("H.H.H", "48-bit hardware address mask");
+ */
+ globalC["access-list"].addSC("<800-899>", "IPX standard access list");
+ /* globalC["access-list"]["<800-899>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<800-899>"].deny.addSC("-1", "Any IPX net");
+ globalC["access-list"]["<800-899>"].deny["-1"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<800-899>"].deny["-1"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<800-899>"].deny.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<800-899>"].deny["<0-FFFFFFFF>"].addSC("-1", "Any IPX net");
+ globalC["access-list"]["<800-899>"].deny["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<800-899>"].deny["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<800-899>"].deny.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<800-899>"].addSC("permit", "Specify packets to permit");
+ globalC["access-list"]["<800-899>"].permit.addSC("-1", "Any IPX net");
+ globalC["access-list"]["<800-899>"].permit["-1"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<800-899>"].permit["-1"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<800-899>"].permit.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<800-899>"].permit["<0-FFFFFFFF>"].addSC("-1", "Any IPX net");
+ globalC["access-list"]["<800-899>"].permit["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<800-899>"].permit["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<800-899>"].permit.addSC("N.H.H.H", "Source net.host address");
+ */
+ globalC["access-list"].addSC("<900-999>", "IPX extended access list");
+ /* globalC["access-list"]["<900-999>"].addSC("deny", "Specify packets to reject");
+ globalC["access-list"]["<900-999>"].deny.addSC("<0-255>", "Protocol type number (DECIMAL)");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"].addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny["<0-255>"]["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].deny.addSC("any", "Any IPX protocol type");
+ globalC["access-list"]["<900-999>"].deny.any.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.any.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.any.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.any.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.any.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.any.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.any.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.any.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.any.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.any.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny.any["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].deny.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.ncp.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.ncp.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.ncp.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.ncp.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny.ncp.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny.ncp["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].deny.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.netbios.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.netbios.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.netbios.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.netbios.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny.netbios.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny.netbios["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].deny.addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.rip.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.rip.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.rip.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.rip.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.rip.any.netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.rip.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.rip.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.rip.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.rip.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.rip.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny.rip.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny.rip["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].deny.addSC("sap", "Service Advertising Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.sap.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.sap.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.sap.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.sap.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.sap.any.netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.sap.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].deny.sap.any.rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.sap.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.sap.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.sap.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny.sap.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny.sap["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].deny.addSC("spx", "Sequenced Packet Exchange");
+ globalC["access-list"]["<900-999>"].deny.spx.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("sap", "Service Advertising Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].sap.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].sap.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].deny.spx.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].deny.spx.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].deny.spx.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].deny.spx.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].deny.spx.any.netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].deny.spx.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx.any.rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("sap", "Service Advertising Protocol");
+ globalC["access-list"]["<900-999>"].deny.spx.any.sap.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.sap.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].deny.spx.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].deny.spx.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].deny.spx.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].deny.spx.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].deny.spx["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].addSC("permit", "Specify packets to permit");
+ globalC["access-list"]["<900-999>"].permit.addSC("<0-255>", "Protocol type number (DECIMAL)");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"].addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit["<0-255>"]["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].permit.addSC("any", "Any IPX protocol type");
+ globalC["access-list"]["<900-999>"].permit.any.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.any.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.any.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.any.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.any.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.any.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.any.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.any.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.any.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.any.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.any.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit.any.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit.any["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].permit.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.ncp.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.ncp.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.ncp.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.ncp.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit.ncp.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit.ncp["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].permit.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.netbios.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.netbios.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.netbios.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.netbios.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit.netbios.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit.netbios["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].permit.addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.rip.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.rip.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.rip.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.rip.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.rip.any.netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.rip.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.rip.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.rip.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.rip.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.rip.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit.rip.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit.rip["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].permit.addSC("sap", "Service Advertising Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.sap.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.sap.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.sap.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.sap.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.sap.any.netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.sap.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].permit.sap.any.rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.sap.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.sap.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.sap.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit.sap.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit.sap["time-range"].addSC("WORD", "Time-range entry name");
+ globalC["access-list"]["<900-999>"].permit.addSC("spx", "Sequenced Packet Exchange");
+ globalC["access-list"]["<900-999>"].permit.spx.addSC("<0-FFFFFFFF>", "Source net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"]["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("sap", "Service Advertising Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].sap.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].sap.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx["<0-FFFFFFFF>"].trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.addSC("N.H.H.H", "Source net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.addSC("any", "Any IPX net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("<0-FFFFFFFF>", "Source Socket HEXIDECIMAL");
+ globalC["access-list"]["<900-999>"].permit.spx.any["<0-FFFFFFFF>"].addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any["<0-FFFFFFFF>"].addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("all", "All sockets");
+ globalC["access-list"]["<900-999>"].permit.spx.any.all.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.all.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("cping", "Cisco ipx ping");
+ globalC["access-list"]["<900-999>"].permit.spx.any.cping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.cping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("diagnostic", "Diagnostic packet");
+ globalC["access-list"]["<900-999>"].permit.spx.any.diagnostic.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.diagnostic.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("eigrp", "IPX Enhanced Interior Gateway Routing Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx.any.eigrp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.eigrp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("ncp", "NetWare Core Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx.any.ncp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.ncp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("netbios", "IPX NetBIOS");
+ globalC["access-list"]["<900-999>"].permit.spx.any.netbios.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.netbios.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("nlsp", "NetWare Link State Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx.any.nlsp.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.nlsp.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("nping", "Standard IPX ping");
+ globalC["access-list"]["<900-999>"].permit.spx.any.nping.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.nping.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("rip", "IPX Routing Information Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx.any.rip.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.rip.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("sap", "Service Advertising Protocol");
+ globalC["access-list"]["<900-999>"].permit.spx.any.sap.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.sap.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.any.addSC("trace", "Trace Route packet");
+ globalC["access-list"]["<900-999>"].permit.spx.any.trace.addSC("<0-FFFFFFFF>", "Destination net");
+ globalC["access-list"]["<900-999>"].permit.spx.any.trace.addSC("N.H.H.H", "Destination net.host address");
+ globalC["access-list"]["<900-999>"].permit.spx.addSC("log", "Log matches against this entry");
+ globalC["access-list"]["<900-999>"].permit.spx.addSC("time-range", "Specify a time-range");
+ globalC["access-list"]["<900-999>"].permit.spx["time-range"].addSC("WORD", "Time-range entry name");
+ */
+ globalC["access-list"].addSC("dynamic-extended", "Extend the dynamic ACL abolute timer");
+ globalC["access-list"].addSC("rate-limit", "Simple rate-limit specific access list");
+ globalC["access-list"]["rate-limit"].addSC("<0-99>", "Precedence ACL index");
+ globalC["access-list"]["rate-limit"]["<0-99>"].addSC("<0-7>", "Precedence");
+ globalC["access-list"]["rate-limit"]["<0-99>"].addSC("mask", "Use precedence bitmask");
+ globalC["access-list"]["rate-limit"]["<0-99>"].mask.addSC("<0-FF>", "Precedence bit mask");
+ globalC["access-list"]["rate-limit"].addSC("<100-199>", "MAC address ACL index");
+ globalC["access-list"]["rate-limit"]["<100-199>"].addSC("H.H.H", "MAC address");
+ globalC["access-list"]["rate-limit"].addSC("<200-299>", "mpls exp ACL index");
+ globalC["access-list"]["rate-limit"]["<200-299>"].addSC("<0-7>", "mpls exp");
+ globalC["access-list"]["rate-limit"]["<200-299>"].addSC("mask", "Use exp bitmask");
+ globalC["access-list"]["rate-limit"]["<200-299>"].mask.addSC("<0-FF>", "mpls exp bit mask");
+