| caqCosToDscpEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.1.1 | 
    
    
      | 
        Each row contains the mapping from a CoS value to a DSCP
        value.
       | 
    
    
      | caqIpPrecToDscpEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.2.1 | 
    
    
      | 
        Each row contains the mapping from an IP Precedence value to
        a DSCP value.
       | 
    
    
      | caqDscpMappingEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.3.1 | 
    
    
      | 
        Each row contains the mapping from DSCP value to CoS value
        and policed DSCP.
       | 
    
    
      | caqCosAssignmentEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.4.1 | 
    
    
      | 
        The assignment of packets to a pair of queue and threshold
        based on their Cos value. The packets assignment also depends
        on port types. For each port type, there is a set of Cos
        value (0..7) associated with a pair of queue number and
        threshold number (q,t). Packets that have their Cos value
        belong to a particular set will be assigned to the pair of
        queue number and threshold number that this set associated
        with.
       | 
    
    
      | caqQueueThresholdEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1 | 
    
    
      | 
        For each threshold of a queue, there are parameters to set on
        the threshold. This entry contains the parameters.
       | 
    
    
      | caqQueueEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.6.1 | 
    
    
      | 
        A set of WRR weight and memory buffer allocation ratio for
        ingress or egress of a specific queue.
       | 
    
    
      | caqDscpMutationMapEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.7.1 | 
    
    
      | 
        Each row contains the mapping from old DSCP value to new
        DSCP value per specific mutation table.
       | 
    
    
      | caqVlanMutationIdMapEntry | 
      .1.3.6.1.4.1.9.9.179.1.1.8.1 | 
    
    
      | 
        When the first time a VLAN is created in a device supporting
        this table, a corresponding entry of this table will be added.
        The value of caqVlanMutationTableId object in such row will be
        initialized to 0.
       | 
    
    
      | caqDscpRewriteEnabled | 
      .1.3.6.1.4.1.9.9.179.1.1.9 | 
    
    
      | 
        Indicates whether DSCP rewrite is enabled or disabled
        in the device.
        if true(1), all outgoing packets will have their DSCP
        value rewrited based on the result of classification,
        policing or DSCP mutation configured in the device.
        if false(2), all outgoing packets will have their DSCP
        values as when they arrived.
       | 
    
    
      | caqMacPktClassifyVlansLow | 
      .1.3.6.1.4.1.9.9.179.1.1.10 | 
    
    
      | 
        A string of octets containing one bit per VLAN for
        VLANs with VlanIndex value of 0 to 2047. The first
        octet corresponds to VLANs with VlanIndex values
        of 0 through 7; the second octet to VLANs 8 through
        15; etc.  The most significant bit of each octet
        corresponds to the lowest value VlanIndex in that octet.
        For each VLAN, if Ethernet packet classify feature is
        enabled then the bit corresponding to that VLAN is set
        to '1'.
        Note that if the length of this string is less than
        256 octets, any 'missing' octets are assumed to contain
        the value zero. A NMS may omit any zero-valued octets
        from the end of this string in order to reduce SetPDU size,
        and the agent may also omit zero-valued trailing octets,
        to reduce the size of GetResponse PDUs.
       | 
    
    
      | caqMacPktClassifyVlansHigh | 
      .1.3.6.1.4.1.9.9.179.1.1.11 | 
    
    
      | 
        A string of octets containing one bit per VLAN for
        VLANs with VlanIndex value of 2048 to 4095. The first
        octet corresponds to VLANs with VlanIndex values
        of 2048 through 2055; the second octet to VLANs 2056
        through 2063; etc.  The most significant bit of each
        octet corresponds to the lowest value VlanIndex in that
        octet.
        For each VLAN, if Ethernet packet classify feature is
        enabled then the bit corresponding to that VLAN is set
        to '1'.
        Note that if the length of this string is less than
        256 octets, any 'missing' octets are assumed to contain
        the value zero. A NMS may omit any zero-valued octets
        from the end of this string in order to reduce SetPDU size,
        and the agent may also omit zero-valued trailing octets,
        to reduce the size of GetResponse PDUs.
       | 
    
    
      | caqIfConfigEntry | 
      .1.3.6.1.4.1.9.9.179.1.2.1.1 | 
    
    
      | 
        The index of this table is the ifIndex of a
        physical port with QoS capability.
       | 
    
    
      | caqClassifierEntry | 
      .1.3.6.1.4.1.9.9.179.1.2.2.1 | 
    
    
      | 
        An entry identifies that a particular ACL is in use on a
        particular interface. An interface can be a physical port
        or a VLAN.
       | 
    
    
      | caqIfSecurityAclConfigEntry | 
      .1.3.6.1.4.1.9.9.179.1.2.3.1 | 
    
    
      | 
        An entry contains configuration information about
        a security ACL mapped to a interface which is capable
        for this feature.
       | 
    
    
      | caqAclCapabilities | 
      .1.3.6.1.4.1.9.9.179.1.3.1 | 
    
    
      | 
        Indicates what ACL capabilities are supported on the device.
        An ACL belongs to one of the following types: IP, IPX and MAC.
        Furthermore, an ACL can be used for either QoS or Security
        feature.
        If ipQos(0) bit is turned on, caqIpAceTable can be instantiated
        for Qos feature, otherwise it can not.
        If ipxQos(1) bit is turned on, caqIpxAceTable can be
        instantiated for Qos feature, otherwise it can not.
        If macQos(2) bit is turned on, caqMacAceTable can be
        instantiated for Qos feature, otherwise it can not.
        If ipSecurity(3) bit is turned on, caqIpAceTable can be
        instantiated for Security feature, otherwise it can not.
        If ipxSecurity(4) bit is turned on, caqIpxAceTable can be
        instantiated for Security feature, otherwise it can not.
        If macSecurity(5) bit is turned on, caqMacAceTable can be
        instantiated for Security feature, otherwise it can not.
       | 
    
    
      | caqIpAceEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1 | 
    
    
      | 
        An entry defines an ACE, consisting of a set of match
        criteria. For a packet to match an entry, it has to match
        all the criteria specified in that entry.
       | 
    
    
      | caqIpxAceEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1 | 
    
    
      | 
        Each entry of caqIpxAceTable consists of a set of match
        creteria. For a IPX flow to match an entry, it has to match
        all the conditions specified in that entry.
       | 
    
    
      | caqMacAceEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1 | 
    
    
      | 
        Each entry of caqMacAceTable consist of a set of match
        criteria. For a layer 2 flow to match an entry, it has to
        match all the conditions specified in that entry.
       | 
    
    
      | caqFlowPolicingCpb | 
      .1.3.6.1.4.1.9.9.179.1.3.5 | 
    
    
      | 
        Indicates the flow policing capability of the device.
        microFlow(0) indicates that microflow can be policed.
        aggregate(1) indicates that aggregate flow can be policed.
       | 
    
    
      | caqQosActionSelectEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1 | 
    
    
      | 
        An entry of an ACE action. It links to the entries of
        caqFlowPolicerTable with caqQosActionSelectMicroflow,
        caqQosActionSelectAggregate objects.
       | 
    
    
      | caqFlowPolicerExcessRateSupport | 
      .1.3.6.1.4.1.9.9.179.1.3.7 | 
    
    
      | 
        Indicates whether the device supports excess rate
        configuration.
       | 
    
    
      | caqFlowPolicerEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1 | 
    
    
      | 
        The attributes defining a flow policing rule.
       | 
    
    
      | caqSecurityActionEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1 | 
    
    
      | 
        An entry of a Security ACE action.  It provides the action for
        for the traffic matching Security ACEs.
       | 
    
    
      | caqSecurityAclCaptureIfEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.10.1 | 
    
    
      | 
        The index of this table is the ifIndex value of a
        physical port which is capable of being a capture interface
        on which captured packets are output.
       | 
    
    
      | caqFlowPolicerExcessBurstSupport | 
      .1.3.6.1.4.1.9.9.179.1.3.11 | 
    
    
      | 
        Indicates whether the device supports excess burst
        size configuration.
       | 
    
    
      | caqSecurityRateLimitFeatures | 
      .1.3.6.1.4.1.9.9.179.1.3.12 | 
    
    
      | 
        Indicates the features which implement rate limit
        on their traffic flows using the rate limit value
        denoted by caqSecurityAclRateLimit object. This
        rate limit value is shared among all features denoted
        by this object.
       | 
    
    
      | caqSecurityAclRateLimit | 
      .1.3.6.1.4.1.9.9.179.1.3.13 | 
    
    
      | 
        Indicates the maximum rate of all traffic flows
        subjected to rate limiting imposed by all features
        denoted by caqSecurityRateLimitFeatures object.
       | 
    
    
      | caqQosDefaultActionEntry | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1 | 
    
    
      | 
        The entries in this table are corresponding to the type of
        traffic as well as its direction and contain the default
        DSCP value, trust state and policers information. The number
        of entry in this table depends on what type of traffic
        supported by the device.
       | 
    
    
      | caqAclFeatureCpb | 
      .1.3.6.1.4.1.9.9.179.1.3.15 | 
    
    
      | 
        Indicates the set of features that the device supports
        related to ACLs configured in the device.
        vlanAclHitCount(0) indicates that the device supports
        ACL hit count feature for ACLs attached to VLAN interfaces.
        portAclHitCount(1) indicates that the device supports
        ACL hit count feature for ACLs attached to physical
        interfaces.
       | 
    
    
      | caqL3PacketsDropByPolicer | 
      .1.3.6.1.4.1.9.9.179.1.4.1 | 
    
    
      | 
        Indicates the number of Layer 3 packets dropped due to
        policing.
       | 
    
    
      | caqTosChangedIpPackets | 
      .1.3.6.1.4.1.9.9.179.1.4.2 | 
    
    
      | 
        Indicates the number of IP packets have the Tos value
        changed.
       | 
    
    
      | caqCosChangedIpPackets | 
      .1.3.6.1.4.1.9.9.179.1.4.3 | 
    
    
      | 
        Indicates the number of IP packets have the Cos value
        changed.
       | 
    
    
      | caqCosChangedNonIpPackets | 
      .1.3.6.1.4.1.9.9.179.1.4.4 | 
    
    
      | 
        Indicates the number of non IP packets have the Cos
        value changed.
       | 
    
    
      | caqPortStatsEntry | 
      .1.3.6.1.4.1.9.9.179.1.4.5.1 | 
    
    
      | 
        An entry contains QoS statistics maintained by the switching
        engine.
       | 
    
    
      | caqFlowStatsEntry | 
      .1.3.6.1.4.1.9.9.179.1.4.6.1 | 
    
    
      | 
        An entry contains the number of out of profile packet
        per flow maintained by the switching engine.
       | 
    
    
      | caqAggPolicerStatsEntry | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1 | 
    
    
      | 
        An entry contains the number of packet policed and the
        number of out of profile packets per aggregate policer.
       | 
    
    
      | caqBridgedPolicerEntry | 
      .1.3.6.1.4.1.9.9.179.1.5.1.1 | 
    
    
      | 
        A conceptual row in the caqBridgedPolicerTable
        to control if bridged packets are policed at microflow
        level on a particular VLAN.
       | 
    
    
      | caqCosMacVlanRouterEntry | 
      .1.3.6.1.4.1.9.9.179.1.5.2.1 | 
    
    
      | 
        The Cos value to be assigned to frames on a specific VLAN and
        which have a specific destination MAC address and/or the
        configured destination MAC address is of a router.
       | 
    
    
      | caqPbfStatus | 
      .1.3.6.1.4.1.9.9.179.1.6.1 | 
    
    
      | 
        Indicates the status of policy-based forwarding (PBF) engine.
        macAddrOk(1) indicates that the MAC address of the PBF engine
        is set successfully and PBF engine is operational.
        macAddrNotSet(2) indicates that the MAC address of the PBF
        engine is not set and PBF engine is not operational.
        msfcPresent(3) indicates that there is a Multiplayer Switch
        Feature Card (MSFC) present in the device thus the PBF engine
        is not operational.
       | 
    
    
      | caqPbfMacAddress | 
      .1.3.6.1.4.1.9.9.179.1.6.2 | 
    
    
      | 
        Indicates the PBF engine MAC address. When the value of
        caqPbfStatus is msfcPresent(3), this object cannot be configured
        and its previously configured value is ignored.
       | 
    
    
      | caqAdjacencyEntry | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1 | 
    
    
      | 
        An entry defines an adjacency. Each adjacency consists
        of a destination VLAN, source and destination MAC address as
        well as adjacency name and MTU configuration.
       | 
    
    
      | caqAclLogMaxFlow | 
      .1.3.6.1.4.1.9.9.179.1.7.1 | 
    
    
      | 
        Indicates the maximum number of traffic flow will be logged
        by the device.
       | 
    
    
      | caqAclSecurityLoggingRateLimit | 
      .1.3.6.1.4.1.9.9.179.1.7.2 | 
    
    
      | 
        Indicates the redirect rate of traffic flow subjected
        to security ACL logging.
       | 
    
    
      | caqAclRouterAclRateLimit | 
      .1.3.6.1.4.1.9.9.179.1.7.3 | 
    
    
      | 
        Indicates the redirect rate of traffic flow subjected
        to router ACL logging.
       | 
    
    
      | caqIpFlowLoggingEntry | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1 | 
    
    
      | 
        An entry describes an IP flow, consisting of a set of data
        such as source and destination address, source and destination
        port as well as protocol specific information. To keep the
        table from overflow, each entry contains a TTL (Time to Live)
        object. An entry will be removed from this table when its TTL
        value reaches zero.
       | 
    
    
      | caqAclArpInspMatchMac | 
      .1.3.6.1.4.1.9.9.179.1.8.2 | 
    
    
      | 
        Indicates whether for ARP packets MAC address matching of
        ethernet header and the source MAC address specified in ARP
        header is enabled. It also indicates the action taken when
        the addresses do not match.
        If this object value is disable(1), the device will not check
        for matching of source MAC address in ethernet header with the
        sender MAC address in ARP header for ARP packets.
        If this object value is enable(2), the device will check
        for matching of source MAC address in ethernet header with the
        sender MAC address in ARP header for ARP packets. A syslog
        message is generated if the MAC addresses check fails.
        If this object value is drop(3), the device will check for
        MAC addresses matching and ARP packets whose MAC addresses
        do not match will be dropped.
        If this object value is dropAndLog(4), the device will check
        for MAC addresses matching and ARP packets whose MAC addresses
        do not match will be dropped and logged into
        caqIpFlowLoggingTable.
       | 
    
    
      | caqAclArpInspAddrValidation | 
      .1.3.6.1.4.1.9.9.179.1.8.3 | 
    
    
      | 
        Indicates whether for ARP packets checking for valid source MAC
        and source IP address specified in ARP header is enabled. It
        also indicates the action taken when the addresses are not
        valid.
        If this object value is disable(1), the device will not check
        for valid MAC and IP address for ARP packets.
        If this object value is enable(2), the device will check
        for valid MAC and IP address for ARP packets. A syslog
        message is generated if the addresses check fails.
        If this object value is drop(3), the device will check for
        valid MAC and IP addresses. ARP packets whose have illegal MAC
        and IP addresses will be dropped.
        If this object value is dropAndLog(4), the device will check
        for valid MAC and IP addresses. ARP packets whose have invalid
        MAC and IP addresses will be dropped and logged into
        caqIpFlowLoggingTable.
       | 
    
    
      | caqArpInspGlobalForwardedPkts | 
      .1.3.6.1.4.1.9.9.179.1.8.4 | 
    
    
      | 
        Indicates the total number of packets subjected to
        ARP Inspection is forwarded.
       | 
    
    
      | caqArpInspGlobalDroppedPkts | 
      .1.3.6.1.4.1.9.9.179.1.8.5 | 
    
    
      | 
        Indicates the total number of packets subjected to
        ARP Inspection is dropped.
       | 
    
    
      | caqRARPForwardedPkts | 
      .1.3.6.1.4.1.9.9.179.1.8.6 | 
    
    
      | 
        Indicates the total number of packets subjected to
        Reverse ARP (RARP) Inspection is forwarded.
       | 
    
    
      | caqMatchedMacFailedPkts | 
      .1.3.6.1.4.1.9.9.179.1.8.7 | 
    
    
      | 
        Indicates the total number of packets subjected to
        ARP Inspection whose MAC address specified in the ethernet
        header and the source MAC address specified in ARP
        header does not match.
       | 
    
    
      | caqAddrValidationFailedPkts | 
      .1.3.6.1.4.1.9.9.179.1.8.8 | 
    
    
      | 
        Indicates the total number of ARP packets that have
        invalid source MAC address or invalid source IP address
        specified in the ARP header.
       | 
    
    
      | caqArpInspIpDroppedPkts | 
      .1.3.6.1.4.1.9.9.179.1.8.9 | 
    
    
      | 
        Indicates the total number of IP packets dropped by
        ARP Inspection because of invalid IP address.
       | 
    
    
      | caqArpInspStatsEntry | 
      .1.3.6.1.4.1.9.9.179.1.8.10.1 | 
    
    
      | 
        An entry contains the numbers of packet permitted or denied
        per ACL.
       | 
    
    
      | caqIfArpInspConfigEntry | 
      .1.3.6.1.4.1.9.9.179.1.8.11.1 | 
    
    
      | 
        Each entry contains the configuration for drop threshold
        and shutdown threshold for ARP Inspection at each physical
        interface that supports this feature. Some of the
        interfaces (but not limited to) for which this feature
        might be applicable are: ifType = ethernetCsmacd(6).
       | 
    
    
      | caqAclHitCountVlansLow | 
      .1.3.6.1.4.1.9.9.179.1.9.1 | 
    
    
      | 
        A string of octets containing one bit per VLAN for
        VLANs with VlanIndex value of 0 to 2047. The first
        octet corresponds to VLANs with VlanIndex values
        of 0 through 7; the second octet to VLANs 8 through
        15; etc.  The most significant bit of each octet
        corresponds to the lowest value VlanIndex in that octet.
        For each VLAN, if ACL hit count feature is enabled then
        the bit corresponding to that VLAN is set to '1'.
        Note that if the length of this string is less than
        256 octets, any 'missing' octets are assumed to contain
        the value zero. A NMS may omit any zero-valued octets
        from the end of this string in order to reduce SetPDU size,
        and the agent may also omit zero-valued trailing octets,
        to reduce the size of GetResponse PDUs.
        This object is only instantiated when the vlanAclHitCount(0)
        bit is set to '1' in the caqAclFeatureCpb object.
       | 
    
    
      | caqAclHitCountVlansHigh | 
      .1.3.6.1.4.1.9.9.179.1.9.2 | 
    
    
      | 
        A string of octets containing one bit per VLAN for
        VLANs with VlanIndex value of 2048 to 4095. The first
        octet corresponds to VLANs with VlanIndex values
        of 2048 through 2055; the second octet to VLANs 2056
        through 2063; etc.  The most significant bit of each
        octet corresponds to the lowest value VlanIndex in that
        octet.
        For each VLAN, if ACL hit count feature is enabled then
        the bit corresponding to that VLAN is set to '1'.
        Note that if the length of this string is less than
        256 octets, any 'missing' octets are assumed to contain
        the value zero. A NMS may omit any zero-valued octets
        from the end of this string in order to reduce SetPDU size,
        and the agent may also omit zero-valued trailing octets,
        to reduce the size of GetResponse PDUs.
        This object is only instantiated when the vlanAclHitCount(0)
        bit is set to '1' in the caqAclFeatureCpb object.
       | 
    
    
      | caqAclHitCountPortList | 
      .1.3.6.1.4.1.9.9.179.1.9.3 | 
    
    
      | 
        Indicates the set of physical port(s), in bridge port
        number, where ACL hit count feature is enabled.
        For each port, if ACL hit count feature is enabled then
        the bit corresponding to that port is set to '1'.
        This object is only instantiated when the portAclHitCount(1)
        bit is set to '1' in the caqAclFeatureCpb object.
       | 
    
    
      | caqAclHitCountEntry | 
      .1.3.6.1.4.1.9.9.179.1.9.4.1 | 
    
    
      | 
        An entry indicates whether the hit count feature is enabled
        on a particular ACL as well as its statistic collection mode.
       | 
    
    
      | caqAceHitCountEntry | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1 | 
    
    
      | 
        An entry indicates whether the hit count feature is enabled
        on a particular ACE as well as its hit count statistic.
       | 
    
    
      | caqIfAclHitCountEntry | 
      .1.3.6.1.4.1.9.9.179.1.9.6.1 | 
    
    
      | 
        Each entry indicates the number of hit count at each
        ACE belonged to an ACL which supports hit count collection
        at an interface where the ACL is attached.
       | 
    
  
  
    
      | caqCosToDscpCos | 
      .1.3.6.1.4.1.9.9.179.1.1.1.1.1 | 
    
    
      | 
        The CoS value being mapped to the DSCP value in this device.
       | 
    
    
      | caqCosToDscpDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.1.1.2 | 
    
    
      | 
        The DSCP value which the CoS value maps to. The default
        configuration is :
        CoS    DSCP
        0        0
        1        8
        2        16
        3        24
        4        32
        5        40
        6        48
        7        56
        .
       | 
    
    
      | caqIpPrecToDscpIpPrec | 
      .1.3.6.1.4.1.9.9.179.1.1.2.1.1 | 
    
    
      | 
        The IP Precedence value being mapped to the DSCP value in
        this device.
       | 
    
    
      | caqIpPrecToDscpDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.2.1.2 | 
    
    
      | 
        The DSCP value which the IP Precedence value maps to. The
        default configuration is the identity function :
        IPPrec    DSCP
        0            0
        1            8
        2            16
        3            24
        4            32
        5            40
        6            48
        7            56
        .
       | 
    
    
      | caqDscpMappingDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.3.1.1 | 
    
    
      | 
        The DSCP value being mapped to the CoS value and policed DSCP
        value in this device.
       | 
    
    
      | caqDscpMappingCos | 
      .1.3.6.1.4.1.9.9.179.1.1.3.1.2 | 
    
    
      | 
        The CoS value which the DSCP values maps to.
        The default configuration is calculated from the
        formula CoS = DSCP divide by 8.
        That is:
        DSCP 0-7 all map to CoS 0;
        DSCP 8-15 all map to CoS 1;
        ...
        DSCP 32-39 all map to CoS 4;
        ...
        DSCP 56-63 all map to CoS 7.
       | 
    
    
      | caqDscpMappingNRPolicedDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.3.1.3 | 
    
    
      | 
        The normal rate policed DSCP value which the DSCP values maps
        to. The normal rate default mapping of DSCP to 'marked down'
        DSCP is the identity function.
        That is:
        63 -> 63
        62 -> 62
        ...
        31 -> 31
        ...
        2 -> 2
        1 -> 1
        0 -> 0.
       | 
    
    
      | caqDscpMappingERPolicedDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.3.1.4 | 
    
    
      | 
        The excess rate policed DSCP value which the DSCP values maps
        to. If the value of caqFlowPolicerExcessRateSupport object is
        false(2), this object cannot be instantiated. The excess rate
        default DSCP mapping of DSCP to 'marked down' DSCP is the
        identity function.
        That is:
        63 -> 63
        62 -> 62
        ...
        31 -> 31
        ...
        2 -> 2
        1 -> 1
        0 -> 0.
       | 
    
    
      | caqCosAssignQueueType | 
      .1.3.6.1.4.1.9.9.179.1.1.4.1.1 | 
    
    
      | 
        The queue type of this interface.
       | 
    
    
      | caqCosAssignCos | 
      .1.3.6.1.4.1.9.9.179.1.1.4.1.2 | 
    
    
      | 
        Indicates the Cos value which is used to match the
        Cos value of packets for queue assignment.
       | 
    
    
      | caqCosAssignQueueNumber | 
      .1.3.6.1.4.1.9.9.179.1.1.4.1.3 | 
    
    
      | 
        The queue number which the Cos value denoted by
        caqCosAssignCos will be associated with. This queue number
        must not larger than the queue count defined by
        caqCosAssignQueueType.
       | 
    
    
      | caqCosAssignThresholdNumber | 
      .1.3.6.1.4.1.9.9.179.1.1.4.1.4 | 
    
    
      | 
        The threshold number which the Cos value denoted by
        caqCosAssignCos will be associated with. This threshold
        number must not larger than the threshold count defined
        by caqCosAssignQueueType.
       | 
    
    
      | caqQueueThreshQueueType | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.1 | 
    
    
      | 
        Indicates the queue type.
       | 
    
    
      | caqQueueThreshQueueIndex | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.2 | 
    
    
      | 
        Indicates queue number. This queue number must not be larger
        than the queue count defined by caqQueueThreshQueueType.
       | 
    
    
      | caqQueueThreshThresholdIndex | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.3 | 
    
    
      | 
        Indicates threshold number. This threshold number must not
        be larger than the threshold count defined by
        caqQueueThreshQueueType.
       | 
    
    
      | caqQueueThreshDropAlgorithm | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.4 | 
    
    
      | 
        Indicates the drop algorithm used at this queue and threshold.
        tailDrop(1) indicates that tailDrop is used.
        wred(2) indicates that WRED is used.
       | 
    
    
      | caqQueueThreshDropThreshold | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.5 | 
    
    
      | 
        This object specifies the drop threshold parameter for a
        pair of queue and threshold of an interface queue type when the
        drop algorithm is tail drop. Once the packets in the buffer is
        more than the value of this object, the incoming packets of the
        buffer are dropped. The value is a percentage of the full
        buffer.
        This object is instantiated only if the value of
        caqQueueThreshDropAlgorithm is tailDrop(1).
       | 
    
    
      | caqQueueThreshMinWredThreshold | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.6 | 
    
    
      | 
        This object specifies the min WRED threshold parameter of a
        threshold number for the specific port type when WRED drop
        algorithm is used.
        WRED (Weighted Random Early Detect) is a mechanism which drops
        packets fairly during congestion so that adaptive applications
        can react to congestion. This object specifies a percentage of
        the buffer size.
        This object is instantiated only if the value of
        caqQueueThreshDropAlgorithm is wred(2).
       | 
    
    
      | caqQueueThreshMaxWredThreshold | 
      .1.3.6.1.4.1.9.9.179.1.1.5.1.7 | 
    
    
      | 
        This object specifies the max WRED threshold parameter of a
        threshold number for the specific port type when WRED drop
        algorithm is used.
        This object is instantiated only if the value of
        caqQueueThreshDropAlgorithm is wred(2).
       | 
    
    
      | caqQueueDirection | 
      .1.3.6.1.4.1.9.9.179.1.1.6.1.1 | 
    
    
      | 
        Indicates whether this row's queue parameters are to
        be applied for ingress or for egress traffic.
       | 
    
    
      | caqQueueType | 
      .1.3.6.1.4.1.9.9.179.1.1.6.1.2 | 
    
    
      | 
        Indicates the queue type.
       | 
    
    
      | caqQueueNumber | 
      .1.3.6.1.4.1.9.9.179.1.1.6.1.3 | 
    
    
      | 
        Indicates queue number.
       | 
    
    
      | caqQueueWrrWeight | 
      .1.3.6.1.4.1.9.9.179.1.1.6.1.4 | 
    
    
      | 
        This object is to configure the weight for the specified
        queue type and for the specified direction.
       | 
    
    
      | caqQueueBufferSizeRatio | 
      .1.3.6.1.4.1.9.9.179.1.1.6.1.5 | 
    
    
      | 
        Indicates the percentage of ingress or egress packet buffer
        memory allocated to the specified queue.
       | 
    
    
      | caqDscpMutationTableId | 
      .1.3.6.1.4.1.9.9.179.1.1.7.1.1 | 
    
    
      | 
        The mutation table ID number.
       | 
    
    
      | caqDscpMutationOldDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.7.1.2 | 
    
    
      | 
        The old DSCP value.
       | 
    
    
      | caqDscpMutationNewDscp | 
      .1.3.6.1.4.1.9.9.179.1.1.7.1.3 | 
    
    
      | 
        The new DSCP value which the old DSCP values maps to for
        a specific mutation table. The default mapping of old DSCP to
        new DSCP for mutation purpose is the identity function.
        That is:
        63 -> 63
        62 -> 62
        ...
        31 -> 31
        ...
        2 -> 2
        1 -> 1
        0 -> 0.
       | 
    
    
      | caqVlanMutationIndex | 
      .1.3.6.1.4.1.9.9.179.1.1.8.1.1 | 
    
    
      | 
        Indicates the VLAN number.
       | 
    
    
      | caqVlanMutationTableId | 
      .1.3.6.1.4.1.9.9.179.1.1.8.1.2 | 
    
    
      | 
        Indicates the mutation table ID number. The value of this
        object should match one of caqDscpMutationTableId object
        value in caqDscpMutationMapTable.
        Mutation table 0 always provides the identity mapping.
       | 
    
    
      | caqIfCos | 
      .1.3.6.1.4.1.9.9.179.1.2.1.1.1 | 
    
    
      | 
        This object indicates the default Cos value configured at this
        physical interface. This default value will be assigned to
        packet which does not have a Cos value in its layer-2 header
        when the packet arrives at this interface.
       | 
    
    
      | caqIfTrustStateConfig | 
      .1.3.6.1.4.1.9.9.179.1.2.1.1.2 | 
    
    
      | 
        This object is used to set the trust state of an interface.
        (whether the packets arriving at an interface are trusted to
        carry the correct data for classification.)
        If the object is untrusted(1), then the DSCP assigned to the
        packet is the DSCP specified by classification rule obtained
        from the matching ACE (Access Control Entry). ACE is a filter
        that is used to identify flows with certain characteristics. It
        includes fields such as ingress/egress ports, L2 addresses, L3
        addresses , TCP/UDP port number.
        If this object is trustCoS(2), then the DSCP assigned
        to the packet is the layer2 CoS of the packet mapped to a
        DSCP by the CoS-to-DSCP mapping defined in object
        caqCosToDscpDscp.
        When this object is trustIpPrec(3), a DSCP is assigned to
        an IP packet according to the IP-Precedence-to-DSCP mapping
        defined by the values contained in caqIpPrecToDscpTable. For
        non-IP packets, trustIpPrec(3) has identical behavior as
        trustCoS(2).
        When this object is trustDscp(4), the DSCP contained in an IP
        packet is trusted as being the correct value to assign to it.
        For non-IP packets, trustDscp(4) has identical behavior as
        trustCoS(2).
       | 
    
    
      | caqIfAclBase | 
      .1.3.6.1.4.1.9.9.179.1.2.1.1.3 | 
    
    
      | 
        For a given physical interface, this object indicates whether
        packets arriving at that interface are classified and policed
        based on port's ACL or based on the ACL of the VLAN which the
        port belongs to. This object is only instantiated if the
        platform support ACL configuration.
       | 
    
    
      | caqIfTrustDevice | 
      .1.3.6.1.4.1.9.9.179.1.2.1.1.4 | 
    
    
      | 
        For a given physical interface, this object indicates the
        restriction on trusting only a specific type of device which
        is connected to this interface to carry the correct data for
        classification.
        trustCiscoIPPhone(0) indicates that there is a restriction
        on trusting only ciscoIPPhone to carry the correct data for
        classification.
        If there is no bits turned on, any device connected to
        this interface is trusted to carry the correct data for
        clarification.
        This object is only instantiated if the platform supports
        trust device configuration.
       | 
    
    
      | caqIfOperTrustState | 
      .1.3.6.1.4.1.9.9.179.1.2.1.1.5 | 
    
    
      | 
        This object is used to indicate the operational trust state of
        an interface. The operational trust state may or may not be
        identical to the config trust state denoted by
        caqIfTrustStateConfig. The value of this object depends on the
        runtime conditions such as whether the interface is configured
        to trust a certain type of device as denoted by caqIfTrustDevice
        as well as whether a device of the trusted type is connected to
        the interface. For example, if the interface is configured to
        only trust Cisco IP Phone and the phone is not connected to
        the interface at runtime, the operational trust state of this
        interface will have the untrusted(1) value even if the
        trustCoS(2) value is configured in caqIfTrustStateConfig.
        This object is only instantiated if the platform supports
        trust device configuration.
        If the object is untrusted(1), then the DSCP assigned to the
        packet is the DSCP specified by classification rule obtained
        from the matching ACE (Access Control Entry). ACE is a filter
        that is used to identify flows with certain characteristics. It
        includes fields such as ingress/egress ports, L2 addresses, L3
        addresses , TCP/UDP port number.
        If this object is trustCoS(2), then the DSCP assigned
        to the packet is the layer2 CoS of the packet mapped to a
        DSCP by the CoS-to-DSCP mapping defined in object
        caqCosToDscpDscp.
        When this object is trustIpPrec(3), a DSCP is assigned to
        an IP packet according to the IP-Precedence-to-DSCP mapping
        defined by the values contained in caqIpPrecToDscpTable. For
        non-IP packets, trustIpPrec(3) has identical behavior as
        trustCoS(2).
        When this object is trustDscp(4), the DSCP contained in an IP
        packet is trusted as being the correct value to assign to it.
        For non-IP packets, trustDscp(4) has identical behavior as
        trustCoS(2).
       | 
    
    
      | caqClassifierAclType | 
      .1.3.6.1.4.1.9.9.179.1.2.2.1.1 | 
    
    
      | 
        Indicates the type of ACL attached to this interface.
        ipQos(1) indicates that this ACL is an IP Qos ACL.
        ipxQos(2) indicates that this ACL is an IPX Qos ACL.
        macQos(3) indicates that this ACL is a MAC Qos ACL.
        ipSecurity(4) indicates that this ACL is an IP Security ACL.
        ipxSecurity(5) indicates that this ACL is an IPX Security ACL.
        macSecurity(6) indicates that this ACL is a MAC Security ACL.
       | 
    
    
      | caqClassifierAclName | 
      .1.3.6.1.4.1.9.9.179.1.2.2.1.2 | 
    
    
      | 
        Indicates the ACL name which should exist in the ACL tables
        e.g. in caqIpAceTable. This ACL can be a Qos ACL or a
        Security ACL.
       | 
    
    
      | caqClassifierMapStatus | 
      .1.3.6.1.4.1.9.9.179.1.2.2.1.3 | 
    
    
      | 
        The status of this classifier conceptual row entry.
        An entry may not exist in the active state unless the
        ACL name denoted by caqClassifierAclName object in the
        entry exist and active (i.e. its RowStatus object is
        active(1)) in an ACL table.
        Once a row becomes active, value in any other column within
        such row cannot be modified except by setting
        caqClassifierMapStatus to notInService(2) for such row.
       | 
    
    
      | caqClassifierMapDirection | 
      .1.3.6.1.4.1.9.9.179.1.2.2.1.4 | 
    
    
      | 
        Indicates whether this ACL are to be attached to ingress or
        egress direction.
       | 
    
    
      | caqIfSecurityAclBase | 
      .1.3.6.1.4.1.9.9.179.1.2.3.1.1 | 
    
    
      | 
        The security ACL configuration mode for an interface.
        Setting this variable to the value port(1) will cause the
        packets (L3 forwarded packets and L2 packets) arriving at that
        interface to be filtered based on the ACL mapped to that
        interface.
        Setting this variable to the value vlan(2) will cause the
        packets (L3 forwarded packets and L2 packets) arriving at that
        access interface to be filtered based on two ACL(the router's
        ACL and the ACL of the VLAN to which the interface belongs).
        If it is a trunking interface, the vlan-tag packets will be
        filtered based on the ACL of the tag-vlan.
        Setting this variable to the value merge(3) will merge the
        physical interface ACL, the VLAN ACL and the router ACL
        together to emulate the logical serial model shown below.
        L3 only
        Port ACL -> VLAN ACL -> Router ACL -> Router ACL -> VLAN ACL
        physical    ingress     ingress       egress        egress
        interface
       | 
    
    
      | caqIpAceFeature | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.1 | 
    
    
      | 
        Indicates whether this entry is a Qos ACL or Security ACL.
        ACEs belongs to the same ACL should have the same value
        for this object.
       | 
    
    
      | caqIpAclName | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.2 | 
    
    
      | 
        The name of an ACL. Within a feature (qos or security), the
        name is unique across all of the ACL tables that identifies
        the list to which the entry belongs in the device.
       | 
    
    
      | caqIpAceIndex | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.3 | 
    
    
      | 
        The index of an ACE within an ACL.
       | 
    
    
      | caqIpAceMatchedAction | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.4 | 
    
    
      | 
        Indicates the action to be taken if a packet matches this ACE.
        If the value of this ACE's caqIpAceFeature object is: 'qos(1)',
        then this object contains the index of an active row in
        caqQosActionSelectTable.  If the value of this ACE's
        caqIpAceFeature object is: 'security(2)', then this object
        contains the index of an active row in caqSecurityActionTable.
       | 
    
    
      | caqIpAceProtocolType | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.5 | 
    
    
      | 
        The protocol number field in the IP header used to indicate
        the higher layer protocol as specified in RFC 1700. A value
        value of 0 matches every IP packet.
        For example :
        0 is IP, 1 is ICMP, 2 is IGMP, 4 is IP in IP encapsulation,
        6 is TCP, 9 is IGRP, 17 is UDP, 47 is GRE, 50 is ESP, 51 is AH,
        88 is IGRP, 89 is OSPF, 94 is KA9Q/NOS compatible IP over IP,
        103 is PIMv2, 108 is PCP.
       | 
    
    
      | caqIpAceAddrType | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.6 | 
    
    
      | 
        The type of IP address used by this ACE entry.
       | 
    
    
      | caqIpAceSrcIp | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.7 | 
    
    
      | 
        The specified source IP address. The packet's source address is
        AND-ed with the value of caqIpAceSrcIpMask and then compared
        against the value of this object. If this object value is
        0.0.0.0, and the value of caqIpAceSrcIpMask object in the same
        entry is 255.255.255.255, this entry matches any source IP
        address.
       | 
    
    
      | caqIpAceSrcIpMask | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.8 | 
    
    
      | 
        The specified source IP address mask.
       | 
    
    
      | caqIpAceSrcPortOp | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.9 | 
    
    
      | 
        Indicates how a packet's source TCP/UDP port number is
        to be compared.
        If the caqIpAceProtocolType object in the same row does not
        indicate TCP or UDP, this object has to be 'noOperator(1)' and
        cannot be changed while this row is active, i.e., the value of
        caqIpAceStatus in the same row has the value 'active(1)'.
        'noOperator(1)', which is the default value, means that no
        comparison is to be made with the source TCP/UDP port number.
        lt(2) means less than, gt(3) means greater than, eq(4)
        means equal, neq(5) means not equal. Those 4 operators
        are using the caqIpAceSrcPort object as an operand which
        is the only one needed.
        range(6) means that it compares the port value between two
        numbers, so this operator needs 2 operands. One operand is
        the starting port number of the range which is caqIpAceSrcPort
        object, and the other operand is the ending port number of the
        range which the caqIpAceSrcPortRange object is in.
       | 
    
    
      | caqIpAceSrcPort | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.10 | 
    
    
      | 
        The source port number of the TCP or UDP protocol. If the
        caqIpAceSrcPortOp object in the same row is range(6), this
        object will be the starting port number of the port range.
        This object cannot be configured if caqIpAceStatus in the
        same row is active(1) or caqIpAceSrcPortOp in the same row
        is noOperator(1).
       | 
    
    
      | caqIpAceSrcPortRange | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.11 | 
    
    
      | 
        The source port number of the TCP or UDP protocol. If the
        caqIpAceSrcPortOp object in the same row is range(6), this
        object will be the ending port number of the port range.
        This object cannot be configured if caqIpAceStatus in the
        same row is active(1) or caqIpAceSrcPortOp in the same row
        is not range(6).
       | 
    
    
      | caqIpAceDestIp | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.12 | 
    
    
      | 
        The specified destination IP address. The packet's destination
        address is AND-ed with the value of caqIpAceDestIpMask and then
        compared against the value of this object. If this object value
        is 0.0.0.0 and the value of caqIpAceDestIpMask object in the
        same entry is 255.255.255.255, this entry matches any
        destination IP address.
       | 
    
    
      | caqIpAceDestIpMask | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.13 | 
    
    
      | 
        The specified destination IP address mask.
       | 
    
    
      | caqIpAceDestPortOp | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.14 | 
    
    
      | 
        Indicates how a packet's destination TCP/UDP port number is
        to be compared.
        If the caqIpAceProtocolType object in the same row does not
        indicate TCP or UDP, this object has to be 'noOperator(1)' and
        cannot be changed while this row is active, i.e., the value of
        caqIpAceStatus in the same row has the value 'active(1)'.
        'noOperator(1)', which is the default value, means that no
        comparison is to be made with the destination TCP/UDP port
        number.
        lt(2) means less than.
        gt(3) means greater than.
        eq(4) means equal.
        neq(5) means not equal. Those 4 operators are using the
        caqIpAceDestPort object as an operand which is the only one
        needed.
        range(6) means that it compares the port value between two
        numbers, so this operator needs 2 operands. One operand is the
        starting port number of the range which is caqIpAceDestPort
        object, and the other operand is the ending port number
        of the range which the caqIpAceDestPortRange object is in.
       | 
    
    
      | caqIpAceDestPort | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.15 | 
    
    
      | 
        The destination port number of the TCP or UDP protocol.
        If the caqIpAceDestPortOp object in the same row is range(6),
        this object will be the starting port number of the port range.
        This object cannot be configured if caqIpAceStatus in the
        same row is active(1) or caqIpAceDestPortOp in the same row
        is noOperator(1).
       | 
    
    
      | caqIpAceDestPortRange | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.16 | 
    
    
      | 
        The destination port number of the TCP or UDP protocol.
        If the caqIpAceDestPortOp object in the same row is range(6),
        this object will be the ending port number of the port range.
        This object cannot be configured if caqIpAceStatus in the
        same row is active(1) or caqIpAceDestPortOp in the same row
        is not range(6).
       | 
    
    
      | caqIpAceTosMatchCriteria | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.17 | 
    
    
      | 
        Indicates what field of Tos octet in the packet header
        to be matched.
        none(1) means that there is no need to match the ToS octet.
        matchDscp(2) means that the DSCP value of packet header need
        to be matched. If this value is specified, the caqIpAceDscp
        object in the same row should be configured.
        matchIpPrec(3) means that the IpPrecedence value of packet
        header need to be matched. If this value is specifed, the
        caqIpAceIpPrec object in the same row should be configured.
       | 
    
    
      | caqIpAceIpPrec | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.18 | 
    
    
      | 
        Specifies the IP precedence value to be matched against.
        This object could not be configured when the status of the
        entry, caqIpAceStatus, is active(1).
        The value of this object is ignored whenever the value of
        caqIpAceTosMatchCritial object is not matchIpPrec(3).
       | 
    
    
      | caqIpAceDscp | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.19 | 
    
    
      | 
        Specifies the Dscp value to be matched against.
        This object could not be configured when the status of the
        entry, caqIpAceStatus, is active(1).  Packets can be matched
        the DSCP level from 0 to 63.
        The value of this object is ignored whenever the value of
        caqIpAceTosMatchCritial object is not matchDscp(2).
       | 
    
    
      | caqIpAceProtocolMatchCriteria | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.20 | 
    
    
      | 
        Indicates what field in the packet header for ICMP or IGMP
        or TCP protocol or IPv4 ESP (Enscrypted Security Payload)
        to be matched.
        none(1) = no comparison is to be done for ICMP/IGMP/TCP/ESP.
        matchIgmpType(2) means that the Type field of IGMP protocol
        packet header needs to be matched. If this value is specified,
        the caqIpAceIgmpType object in the same row should be
        configured.
        matchIcmpType(3) means that the Type field of ICMP protocol
        packet header needs to be matched. If this value is specified,
        the caqIpAceIcmpType object in the same row should be
        configured.
        matchIcmpTypeAndCode(4) means that both the Type and Code
        fields of ICMP protocol packet header need to be matched.
        If this value is specified, the caqIpAceIcmpType and
        caqIpAceIcmpCode object in the same row should be configured.
        matchEstablished(5) means that a match occurs if the TCP packet
        has the ACK or RST bits set. The non matching case is that of
        the intial TCP packet to form a connection.
        matchSecurityId(6) means that the Security Association
        Identifier field of IPv4 ESP packet header needs to be matched.
        If this value is specified, the caqIpAceSecurityId object in
        the same row should be configured.
       | 
    
    
      | caqIpAceIcmpType | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.21 | 
    
    
      | 
        Indicates the message type of ICMP packets. The type is
        a number from 0 to 255.
        The value of this object is ignored whenever the value of
        caqIpAceProtocolMatchCritial object is not matchIcmpType(3) or
        matchIcmpTypeAndCode(4).
       | 
    
    
      | caqIpAceIcmpCode | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.22 | 
    
    
      | 
        Indicates the message code of ICMP packets. The code is
        a number from 0 to 255.
        The value of this object is ignored whenever the value of
        caqIpAceProtocolMatchCritial object is not
        matchIcmpTypeAndCode(4).
       | 
    
    
      | caqIpAceIgmpType | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.23 | 
    
    
      | 
        Indicates the message type of IGMP packets. The code is
        a number from 0 to 15.
        The value of this object is ignored whenever the value of
        caqIpAceProtocolMatchCritial object is not matchIgmpType(2).
       | 
    
    
      | caqIpAceOrderPosition | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.24 | 
    
    
      | 
        The ordering position of this ACE in the ACL. If this entry
        is not in active(1) state, this object has value of 0.
       | 
    
    
      | caqIpAceBeforePosition | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.25 | 
    
    
      | 
        The object is to control the position of an ACE in the ACL.
        Indicates the order position of a new ACE before an active ACE
        which is already in the ACL. It means that the new ACE will
        replace the position of the ACE which the object specifies.
        For example, if there are 6 ACEs in an ACL, so the positions
        of those 6 ACEs will be 1, 2, 3, 4, 5, 6. If the user would
        like to add a new ACE and specifies 4 to be the value of
        this object, the old ACEs in positions, 4, 5, 6 will become
        5, 6, 7 while the entry containing the new ACE is active.
        Be careful, for example, if the user would like to move an ACE
        whose position is 2 to before the ACE whose position is 5. He
        put the status of that entry to in-active and the position order
        will be 1, 2, 3, 4, 5.  The old ACEs in positions 3, 4, 5, 6
        becomes 2, 3, 4, 5. So, the user has to specify the object to 4,
        because the ACE in old position 5 has been moved to position 4.
        If not specified, the default value 0 will be used. And the
        new ACE is appended to the end of the ACL. 0 will be always
        returned if the status of this row is active. If the entry
        is from active(1) to notInService(2), this object should have
        default value.
       | 
    
    
      | caqIpAceStatus | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.26 | 
    
    
      | 
        The status of this IP ACE conceptual row entry. This object is
        used to manage creation, deletion and modification of rows in
        this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Especially, it cannot
        be in active state unless the caqIpAceMatchedAction object in
        the entry point to an active entry (i.e its RowStatus object is
        active(1)) in the caqQosActionSelectTable or
        caqSecurityActionTable. Once a row becomes active, value in any
        other column within such row cannot be modified.
        If this row is the only ACE in an ACL and the value of its
        caqIpAclName object matches the value of caqClassifierAclName
        object in any active entry of the caqClassifierTable, removing
        this entry will also remove the associated entry in the
        caqClassifierTable.
       | 
    
    
      | caqIpAceSecurityId | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.27 | 
    
    
      | 
        Indicates the Security Association Identifier of IPv4 ESP
        packets.
        The value of this object is ignored whenever the value of
        caqIpAceProtocolMatchCritial object is not matchSecurityId(6).
       | 
    
    
      | caqIpAceSrcGroup | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.28 | 
    
    
      | 
        Indicates the source group name which the source IP address
        in the IP packet header belongs to. If this object is
        configured, the value of caqIpAceProtocolType object in the
        same row will have the value of 0.
       | 
    
    
      | caqIpAceDestGroup | 
      .1.3.6.1.4.1.9.9.179.1.3.2.1.29 | 
    
    
      | 
        Indicates the destination group name which the destination
        IP address in the IP packet header belongs to. If this object
        is configured, the value of caqIpAceProtocolType object in
        the same row will have the value of 0.
       | 
    
    
      | caqIpxAceFeature | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.1 | 
    
    
      | 
        Indicates whether this entry is a Qos ACL or Security ACL.
        ACEs belongs to the same ACL should have the same value
        for this object.
       | 
    
    
      | caqIpxAclName | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.2 | 
    
    
      | 
        The name of an ACL. Within a feature (qos or security), this
        name is unique across all of the ACL tables that identifies
        the list to which the entry belongs in the device.
       | 
    
    
      | caqIpxAceIndex | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.3 | 
    
    
      | 
        The index of an IPX ACE within an ACL.
       | 
    
    
      | caqIpxAceMatchedAction | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.4 | 
    
    
      | 
        Indicates the action to be taken if a packet matches this ACE.
        If the value of this ACE's caqIpxAceFeature object is: 'qos(1)',
        then this object contains the index of an active row in
        caqQosActionSelectTable.  If the value of this ACE's
        caqIpxAceFeature object is: 'security(2)', then this object
        contains the index of an active row in caqSecurityActionTable.
       | 
    
    
      | caqIpxAceSrcNet | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.5 | 
    
    
      | 
        Indicates the source network from which the packet is
        being sent. This is a 32-bits value that uniquely identifies
        network cable segment in IPX protocol.
        A network number of 0xFFFFFFFF matches all networks.
       | 
    
    
      | caqIpxAceDestMatchCriteria | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.6 | 
    
    
      | 
        Indicate which matches to be checked for the
        destination network of the flow.
        matchProtocol(0) means that the flow protocol
        will be matched against the value specified by
        caqIpxAceProtocolType object in the same row.
        matchIpxDestNet(1)  means that the flow destination
        network will be matched against the value specified
        by caqIpxAceDestNet object in the same row.
        matchIpxDestNode(2) means that the flow destination node
        will be matched against the value specified by
        caqIpxAceDestNode object in the same row.
        If this option bit is on, the matchIpxDestNet(1) bit has
        to be on also.
        matchIpxDestNetMask(3) means that the packet's flow destination
        network will be AND-ed with the value specified by
        caqIpxAceDestNetMask object in the same row and then compared
        against the value of caqIpxAceDestNet object.
        matchIpxDestNodeMask(4) means that the packet's flow
        destination node will be AND-ed with the value specified by
        caqIpxAceDestNodeMask object in the same row and then compared
        against the value of caqIpxAceDestNode object.
       | 
    
    
      | caqIpxAceProtocolType | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.7 | 
    
    
      | 
        The protocol number field in the IPX header used to indicate
        the higher layer protocol.  It can be any, ncp, netbios, rip,
        sap or an integer between 0 to 255.
       | 
    
    
      | caqIpxAceDestNet | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.8 | 
    
    
      | 
        Number of the destination network to which the packet
        is being sent. This is a 32-bit value that uniquely identifies
        the IPX network cable segment in IPX protocol.  A network
        number of 0xFFFFFFFF matches all networks.
        The value of this object is ignored whenever the
        matchIpxDestNet(1) and matchIpxDestNetMask(3) bits of
        caqIpxAceDestMatchCriteria object are not on.
       | 
    
    
      | caqIpxAceDestNode | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.9 | 
    
    
      | 
        Node on the destination network to which the packet is being
        sent. This is a 48 bits value.
        The value of this object is ignored whenever the
        matchIpxDestNode(2) and matchIpxDestNodeMask(4) bits of
        caqIpxAceDestMatchCriteria object are not on.
       | 
    
    
      | caqIpxAceDestNetMask | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.10 | 
    
    
      | 
        Mask to be applied to the destination net. This is an
        32-bit value that has the same format as destination net.
        The value of this object is ignored whenever the
        matchIpxDestNetMask(3) bit of caqIpxAceDestMatchCriteria
        object is not on.
       | 
    
    
      | caqIpxAceDestNodeMask | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.11 | 
    
    
      | 
        Mask to be applied to the destination node.  This is a 48-bit
        value.
        The value of this object is ignored whenever the
        matchIpxDestNodeMask(4) bit of caqIpxAceDestMatchCriteria
        object is not on.
       | 
    
    
      | caqIpxAceOrderPosition | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.12 | 
    
    
      | 
        The ordering position of this ACE in the ACL. If this entry
        is not in active(1) state, this object has value of 0.
       | 
    
    
      | caqIpxAceBeforePosition | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.13 | 
    
    
      | 
        The object is to control the position of an ACE in the ACL.
        Specifies the order position of a new ACE before an active ACE
        which is already in the ACL. It means that the new ACE will
        replace the position of the ACE which the object specifies.
        For example, if there are 6 ACEs in an ACL, so the positions
        of those 6 ACEs will be 1, 2, 3, 4, 5, 6. If the user would
        like to add a new ACE and he specifies 4 to be the value of
        this object, the old ACEs in positions, 4, 5, 6 will become
        5, 6, 7 while the entry containing the new ACE is active.
        The removing is similar. Be careful, for example, if the
        user would like to move an ACE whose position is 2 to before
        the ACE whose position is 5. He put the status of that entry
        to in-active and the position order will be 1, 2, 3, 4, 5.
        The old ACEs in positions 3, 4, 5, 6 becomes 2, 3, 4, 5. So,
        the user has to specify the object to 4, because the ACE in
        old position 5 has been moved to position 4.
        If not specified, the default value 0 will be used. And the
        new ACE is appended to the end of the ACL. 0 will be always
        returned if the status of this row is active. If the entry
        is from active(1) to notInService(2), this object should be
        default value.
       | 
    
    
      | caqIpxAceStatus | 
      .1.3.6.1.4.1.9.9.179.1.3.3.1.14 | 
    
    
      | 
        The status of this IPX ACE conceptual row entry. This object
        is used to manage creation, deletion and modification of rows
        in this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Especially, it cannot
        be in active state unless the caqIpxAceMatchedAction object in
        the entry point to an active entry (i.e its RowStatus object is
        active(1)) in the caqQosActionSelectTable or
        caqSecurityActionTable. Once a row becomes active, value in any
        other column within such row cannot be modified.
        If this row is the only ACE in an ACL and the value of its
        caqIpxAclName object matches the value of caqClassifierAclName
        object in any active entry of the caqClassifierTable, removing
        this entry will also remove the associated entry in the
        caqClassifierTable.
       | 
    
    
      | caqMacAceFeature | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.1 | 
    
    
      | 
        Indicates whether this entry is a Qos ACL or Security ACL.
       | 
    
    
      | caqMacAclName | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.2 | 
    
    
      | 
        The name of an ACL. Within a feature (qos or security), this
        name is unique across all the ACL tables that identifies the
        list to which the entry belongs in the device.
       | 
    
    
      | caqMacAceIndex | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.3 | 
    
    
      | 
        The index of an Mac ACE within an ACL.
       | 
    
    
      | caqMacAceMatchedAction | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.4 | 
    
    
      | 
        Indicates the action to be taken if a packet matches this ACE.
        If the value of this ACE's caqMacAceFeature object is: 'qos(1)',
        then this object contains the index of an active row in
        caqQosActionSelectTable.  If the value of this ACE's
        caqMacAceFeature object is: 'security(2)', then this object
        contains the index of an active row in caqSecurityActionTable.
       | 
    
    
      | caqMacAceSrcMac | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.5 | 
    
    
      | 
        Indicates the 48 bits source MAC address. The packet's source
        address is AND-ed with the value of caqMacAceSrcMacMask and then
        compared against the value of this object. If this object value
        is 00-00-00-00-00-00, and the value of caqMacAceSrcMacMask
        object in the same entry is ff-ff-ff-ff-ff-ff, this entry
        matches any source Mac address.
       | 
    
    
      | caqMacAceSrcMacMask | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.6 | 
    
    
      | 
        Indicates the 48 bit source MAC address mask.
       | 
    
    
      | caqMacAceDestMac | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.7 | 
    
    
      | 
        Indicates the 48 bits destination MAC address. The packet's
        destination  address is AND-ed with the value of
        caqMacAceDestMacMask and then compared against the value of
        this object. If this object value is 00-00-00-00-00-00, and the
        value of caqMacAceDestMacMask object in the same entry is
        ff-ff-ff-ff-ff-ff, this entry matches any destionation Mac
        address.
       | 
    
    
      | caqMacAceDestMacMask | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.8 | 
    
    
      | 
        Indicates the 48 bit destination MAC address mask.
       | 
    
    
      | caqMacAceEthertype | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.9 | 
    
    
      | 
        This 16-bit hexadecimal number indicates the matched Ethernet
        type. 0x0000 means any Ethernet type will be matched.
       | 
    
    
      | caqMacAceOrderPosition | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.10 | 
    
    
      | 
        The ordering position of this ACE in the ACL. If this entry
        is not in active(1) state, this object has value of 0.
       | 
    
    
      | caqMacAceBeforePosition | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.11 | 
    
    
      | 
        The object is to control the position of an ACE in the ACL.
        Specifies the order position of a new ACE before a ACE which
        is already in the ACL. It means that the new ACE will replace
        the position of the ACE which the object specifies.
        For example, if there are 6 ACEs in an ACL, so the positions
        of those 6 ACEs will be 1, 2, 3, 4, 5, 6. If the user would
        like to add a new ACE and he specifies 4 to be the value of
        this object, the old ACEs in positions, 4, 5, 6 will become
        5, 6, 7 while the entry containing the new ACE is active.
        The removing is similar. Be careful, for example, if the
        user would like to move an ACE whose position is 2 to before
        the ACE whose position is 5. He put the status of that entry
        to in-active and the position order will be 1, 2, 3, 4, 5.
        The old ACEs in positions 3, 4, 5, 6 becomes 2, 3, 4, 5. So,
        the user has to specify the object to 4, because the ACE in
        old position 5 has been moved to position 4.
        If not specified, the default value 0 will be used. And the
        new ACE is appended to the end of the ACL. 0 will be always
        returned if the status of this row is active. If the entry
        is from active to notInService, this object should has default
        value.
       | 
    
    
      | caqMacAceStatus | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.12 | 
    
    
      | 
        The status of this MAC ACE conceptual row entry. This object
        is used to manage creation, deletion and modification of rows
        in this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Especially, it cannot
        be in active state unless the caqMacAceMatchedAction object in
        the entry point to an active entry (i.e its RowStatus object is
        active(1)) in the caqQosActionSelectTable or
        caqSecurityActionTable. Once a row becomes active, value in any
        other column within such row cannot be modified.
        If this row is the only ACE in an ACL and the value of its
        caqMacAclName object matches the value of caqClassifierAclName
        object in any active entry of the caqClassifierTable, removing
        this entry will also remove the associated entry in the
        caqClassifierTable.
       | 
    
    
      | caqMacAceMatchCriteria | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.13 | 
    
    
      | 
        Indicates which field in the packet header to be matched.
        matchCos(0) means that the packet Cos value
        will be matched against the value specified by
        caqMacAceCos object in the same row.
        matchVlan(1) means that the packet VLAN value
        will be matched against the value specified by
        caqMacAceVlan object in the same row.
       | 
    
    
      | caqMacAceCos | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.14 | 
    
    
      | 
        Indicates the packet Cos value to be matched.
        The value of this object is ignored whenever the
        matchCos(0) bit of caqMacAceMatchCriteria object
        is not on.
       | 
    
    
      | caqMacAceVlan | 
      .1.3.6.1.4.1.9.9.179.1.3.4.1.15 | 
    
    
      | 
        Indicates the packet VLAN number to be matched.
        The value of this object is ignored whenever the
        matchVlan(1) bit of caqMacAceMatchCriteria object
        is not on.
       | 
    
    
      | caqQosActionSelectIndex | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1.1 | 
    
    
      | 
        The index of this table for indicating an ACE Action for QoS.
       | 
    
    
      | caqQosActionSelectTrust | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1.2 | 
    
    
      | 
        Determines if the packets matching the ACE should be trusted
        or if a specific DSCP should be assigned to it.
        If trustCos(2) is specified, the final DSCP value should refer
        to caqCosToDscpDscp object in caqCosToDscpTable to transfer
        layer 2 CoS value to DSCP value.
        If trustIpPrec(3) is specified, the final DSCP value should
        refer to caqIpPrecToDscpDscp object in caqIpPrecToDscpTable
        to transfer IP Precedence value to DSCP value.
        If trustDscp(4) is specified, the final DSCP value is the one
        which packets carry.
        If noTrust(1) is specified, the final DSCP value will have the
        value of caqQosActionSelectDscp object. That is, if an instance
        of this object is noTrust(1), the caqQosActionSelectStatus
        object can not become 'active(1)' until a value has been
        assigned to the corresponding instance of
        caqQosActionSelectDscp.
       | 
    
    
      | caqQosActionSelectDscp | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1.4 | 
    
    
      | 
        This object is only instantiated when the
        caqQosActionSelectTrust object in the same entry has been set
        to noTrust(1).
       | 
    
    
      | caqQosActionSelectMicroflow | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1.5 | 
    
    
      | 
        Indicates a policer name. The value of this object either
        matches the value of caqFlowPolicerName object of an active
        entry in caqFlowPolicerTable or has an empty string value. The
        ACE uses this object to link to a policer flow entry.  If there
        is no microflow policer defined for the ACE pointed to this
        entry, this object should be an empty string. If the
        microflow(0) bit of caqFlowPolicingCpb object is turned off,
        this object should also be an empty string. Otherwise it should
        match the value of caqFlowPolicerName of an entry in the
        caqFlowPolicerTable which has its RowStatus value to be
        active(1) and the type of the policer should be microflow(1).
       | 
    
    
      | caqQosActionSelectAggregate | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1.6 | 
    
    
      | 
        Indicates a policer name. The value of this object either
        matches the value of caqFlowPolicerName object of an active
        entry in caqFlowPolicerTable or has an empty string value.
        The ACE uses this object to link to a policer flow entry.
        If there is no aggregate policer defined for the ACE pointed
        to this entry, this object should be an empty string. If the
        aggregate(1) bit of caqFlowPolicingCpb object is turned off,
        this object should also be an an empty string. Otherwise
        it should match the value of caqFlowPolicerName of an entry in
        the caqFlowPolicerTable which has its RowStatus value to be
        active(1) and the type of the policer should be aggregate(2).
       | 
    
    
      | caqQosActionSelectStatus | 
      .1.3.6.1.4.1.9.9.179.1.3.6.1.7 | 
    
    
      | 
        The status of this Qos Action Select conceptual row entry. This
        object is used to manage creation, deletion and modification of
        rows in this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Once a row becomes
        active, value in any other column within such row cannot be
        modified.
        If this row is pointed to by an active entry in the ACL tables,
        this object cannot be changed from active(1) to any other
        value.
       | 
    
    
      | caqFlowPolicerName | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.1 | 
    
    
      | 
        The name of a policer.  This name has to be unique to identify
        a microflow or an aggregate policer in the device.
       | 
    
    
      | caqFlowPolicerType | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.2 | 
    
    
      | 
        The type of this policer.
       | 
    
    
      | caqFlowPolicerNormalRateRequest | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.3 | 
    
    
      | 
        The requested average rate of the flow.  The base unit of this
        object is 1 kilo-bits per second.  0 may be specified for a
        rate which causes all packets to be out-of-profile.
        Out-of-profile indicates that a packet causes the committed
        access rate of the packet's flow to be exceeded.  Committed
        access rate is the bandwidth that has been committed to a
        specific flow or group of flows.  The committed rate can be
        enforced by policing or by shaping.
       | 
    
    
      | caqFlowPolicerNormalRateGrant | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.4 | 
    
    
      | 
        The granted average rate of the flow.  The base unit of this
        object is 1 kilo-bits per second. If the status of this row is
        not active, the value of this object will be the same as
        caqFlowPolicerNormalRateRequest's value.
        If the QoS function is enabled and the policy source is from
        local configuration, this MIB object is from the runtime
        hardware information.  Due to hardware granularity, the
        granted value may not be the same as the value specified
        by caqFlowPolicerNormalRateRequest object. It will be the
        closest value to the requested one that the hardware can
        support.
       | 
    
    
      | caqFlowPolicerNormalRateAction | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.5 | 
    
    
      | 
        The action for those normal rate out-of-profile packets. The
        action is to drop the packets or mark down its DSCP to the
        value of caqDscpMappingNRPolicedDscp defined in
        caqDscpMappingTable.
        If the caqFlowPolicerExcessRateSupport is true(1), this object
        cannot be set to drop(1). Setting the value of
        caqFlowPolicerExcessRateRequest object equal to the value of
        caqFlowPolicerNormalRateRequest object together with setting the
        value of caqFlowPolicerExcessRateAction object to drop(1) will
        effectively drop the packet at normal rate.
       | 
    
    
      | caqFlowPolicerExcessRateRequest | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.6 | 
    
    
      | 
        The requested excess rate of the flow.  The base unit of this
        object is 1 kilo-bits per second.  0 may be specified for a
        rate which causes all packets to be out-of-profile.
        Out-of-profile indicates that a packet causes the committed
        access rate of the packet's flow to be exceeded.  Committed
        access rate is the bandwidth that has been committed to a
        specific flow or group of flows.  The committed rate can be
        enforced by policing or by shaping.
        If the caqFlowPolicerExcessRateSupport is false(2), this object
        cannot be instantiated.
       | 
    
    
      | caqFlowPolicerExcessRateGrant | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.7 | 
    
    
      | 
        The granted excess rate of the flow.  The base unit of this
        object is 1 kilo-bits per second. If the status of this row is
        not active, the value of this object will be the same as
        caqFlowPolicerExcessRateRequest's value.
        If the QoS function is enabled and the policy source is from
        local configuration, this MIB object is from the runtime
        hardware information. Due to hardware granularity, the
        granted value may not be the same as the value specified
        by caqFlowPolicerExcessRateRequest object. It will be the
        closest value to the requested one that the hardware can
        support.
        If the caqFlowPolicerExcessRateSupport is false(2), this object
        cannot be instantiated.
       | 
    
    
      | caqFlowPolicerExcessRateAction | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.8 | 
    
    
      | 
        The action for those excess rate out-of-profile packets. The
        action is to drop the packets or mark down its DSCP value to
        value of caqDscpMappingERPolicedDscp defined in
        caqDscpMappingTable.
        If the caqFlowPolicerExcessRateSupport is false(2), this object
        cannot be instantiated.
       | 
    
    
      | caqFlowPolicerBurstSizeRequest | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.9 | 
    
    
      | 
        The requested burst rate of the flow. The base unit of this
        object is 1 kilo-bits.
       | 
    
    
      | caqFlowPolicerBurstSizeGrant | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.10 | 
    
    
      | 
        The granted burst rate of the flow. The base unit of this
        object is 1 kilo-bits. If the status of this row is not
        active, the value of this object will be the same as
        caqFlowPolicerBurstSizeRequest's value.
        If the QoS function is enabled and the policy source is from
        local configuration, this MIB object is from the runtime
        hardware information. Due to hardware granularity, the
        granted value may not be the same as the value specified
        by caqFlowPolicerBurstSizeRequest object. It will be the
        closest value to the requested one that the hardware can
        support.
       | 
    
    
      | caqFlowPolicerStatus | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.11 | 
    
    
      | 
        The status of this flow policer conceptual row entry. This
        object is used to manage creation, deletion and modification of
        rows in this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Once a row becomes
        active, value in any other column within such row cannot be
        modified.
        If this row is pointed to by an active entry in the
        caqQosActionSelectTable, this object cannot be changed from
        active(1) to any other value.
       | 
    
    
      | caqFlowPolicerExcessBurstRequest | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.12 | 
    
    
      | 
        The requested excess burst size of the flow.
        If the caqFlowPolicerExcessBurstSupport is false(2), this
        object cannot be instantiated.
       | 
    
    
      | caqFlowPolicerExcessBurstGrant | 
      .1.3.6.1.4.1.9.9.179.1.3.8.1.13 | 
    
    
      | 
        The granted excess burst size of the flow. If the status of
        this row is not active, the value of this object will be the
        same as caqFlowPolicerExcessBurstRequest's value.
        If the QoS function is enabled and the policy source is from
        local configuration, this MIB object is from the runtime
        hardware information. Due to hardware granularity, the
        granted value may not be the same as the value specified
        by caqFlowPolicerExcessBurstRequest object. It will be the
        closest value to the requested one that the hardware can
        support.
        If the caqFlowPolicerExcessBurstSupport is false(2), this
        object cannot be instantiated.
       | 
    
    
      | caqSecurityActionIndex | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.1 | 
    
    
      | 
        The index of this table for indicating a Security ACE action
        entry.
       | 
    
    
      | caqSecurityAction | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.2 | 
    
    
      | 
        Determines the action that the device will take if the traffic
        matches the ACE.
        If permit(1) is specified, the matched traffic will be allowed
        through the device.
        If deny(2) is specified, the matched traffic will be blocked and
        dropped.
        If redirect(3) is specified, the matched traffic will be
        redirected to physical port(s) which should be configured
        in the caqSecurityRedirectPortList object. Redirect means
        taking packet coming in and putting it out of port(s)
        as is.
        If redirectWithAdj(4) is specified, the matched traffic will
        be redirected to the VLAN configured in the adjacency entry
        denoted by caqSecurityAdjIndex.
        If denyWithLog(5) is specified, the matched traffic will be
        blocked, dropped and logged.
        If denyArpInspection(6) is specified, the matched ARP traffic
        will be blocked and dropped.
        If denyArpInspWithLog(7) is specified, the matched ARP traffic
        will be blocked, dropped and logged.
        If permitArpInspection(8) is specified, the matched ARP
        traffic will be allowed through the device.
       | 
    
    
      | caqSecurityRedirectPortList | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.3 | 
    
    
      | 
        Indicates the set of physical port(s) that matched
        traffic is redirected to. Each octet within the value of
        this object specifies a set of eight ports, with the first
        octet specifying ports 1 through 8, the second octet
        specifying ports 9 through 16, etc. Within each octet, the
        most significant bit represents the lowest numbered port,
        and the least significant bit represents the highest numbered
        port. Thus, each port is represented by a single bit within
        the value of this object. If that bit has a value of '1' then
        that port is included in the set of redirect ports; the port
        is not included if its bit has a value of '0'. The value of
        this object is ignored whenever the value of caqSecurityAction
        object in the same row is not redirect(3).
       | 
    
    
      | caqSecurityCapture | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.4 | 
    
    
      | 
        Indicates whether the matched traffic is to be captured.
        Capture means the packet is not only switched normally but also
        a copy of the switched packet is transmitted on the capture
        port(s). Traffic which is dropped cannot be captured; only
        traffic that is forwarded to its appropriate destination, can
        also be forwarded to a capture port. Redirected traffic
        cannot be captured.
        Packets are only output on a capture port if they are on
        a VLAN which is carried on that port.  To capture traffic
        from many vlans, the capture port(s) should be a trunk
        carrying the required vlans.
        The capturing destination port(s) should be configured in
        caqSecurityAclCaptureIfTable.
       | 
    
    
      | caqSecurityActionStatus | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.5 | 
    
    
      | 
        The status of this Security ACE action conceptual row entry.
        This object is used to manage creation, deletion and
        modification of rows in this table.
        An entry may not exist in the active state unless all objects
        in the entry have appropriate value. If the value of
        caqSecurityAction object in the same row is redirectWithAdj(4),
        user must use the value of the index object of an active entry
        in caqAdjacencyTable to configure the caqSecurityAdjIndex
        object. Once a row becomes active, value in any other column
        within such row cannot be modified.
        If this row is pointed to by an active entry in the ACL tables,
        this object cannot be changed from active(1) to any other
        value.
       | 
    
    
      | caqSecurityAdjIndex | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.6 | 
    
    
      | 
        Indicates the index of an active adjacency entry in
        caqAdjacencyTable. The value of this object is ignored whenever
        the value of caqSecurityAction object in the same row is not
        redirectWithAdj(4).
       | 
    
    
      | caqSecurityArpMacAddress | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.7 | 
    
    
      | 
        Indicates the 48 bits Mac address used in ARP packet.
        The value of this object is ignored whenever the value of
        caqSecurityAction object in the same row is not one of
        the following values denyArpInspection(6), denyArpInspWithLog(7)
        and permitArpInspection(8).
       | 
    
    
      | caqSecurityRedirect2kPortList | 
      .1.3.6.1.4.1.9.9.179.1.3.9.1.8 | 
    
    
      | 
        Indicates the set of physical port(s) that matched
        traffic is redirected to. Each octet within the value of
        this object specifies a set of eight ports, with the first
        octet specifying ports 1 through 8, the second octet
        specifying ports 9 through 16, etc. Within each octet, the
        most significant bit represents the lowest numbered port,
        and the least significant bit represents the highest numbered
        port. Thus, each port is represented by a single bit within
        the value of this object. If that bit has a value of '1' then
        that port is included in the set of redirect ports; the port
        is not included if its bit has a value of '0'. The value of
        this object is ignored whenever the value of caqSecurityAction
        object in the same row is not redirect(3). This object can
        accommodate up to 2048 ports.
        A port number is the value of dot1dBasePort for the port in
        the BRIDGE-MIB (RFC 1493).
       | 
    
    
      | caqSecurityAclCaptureEnable | 
      .1.3.6.1.4.1.9.9.179.1.3.10.1.1 | 
    
    
      | 
        An interface can be a destination of captured traffic which
        matched any Security ACL.
        This object is to specify whether to enable or disable this
        interface as a destination of captured traffic.
       | 
    
    
      | caqQosTrafficDirection | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1.1 | 
    
    
      | 
        Indicates whether this row's parameters are to
        be applied for ingress or for egress traffic.
       | 
    
    
      | caqQosTrafficType | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1.2 | 
    
    
      | 
        Indicates whether this row's parameters are to
        be applied for Ethernet, IP or IPX traffic.
       | 
    
    
      | caqQosDefaultTrustState | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1.3 | 
    
    
      | 
        Indicates the default assigned trust state.
        If trustCos(2) is specified, the default DSCP value of an
        unmatched packet should refer to caqCosToDscpDscp
        object in caqCosToDscpTable to transfer layer 2 CoS value to
        DSCP value.
        If trustIpPrec(3) is specified, the default DSCP value of an
        unmatched packet should refer to caqIpPrecToDscpDscp
        object in caqIpPrecToDscpTable to transfer IP Precedence value
        to DSCP value.
        If trustDscp(4) is specified, the default DSCP value of an
        unmatched packet is the one which packets carry.
        If noTrust(1) is specified, the default DSCP value of an
        unmatched packet will have the value of caqQosDefaultDscp
        object.
       | 
    
    
      | caqQosDefaultDscp | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1.4 | 
    
    
      | 
        This object is only instantiated when the
        caqQosDefaultTrust object in the same entry has been set
        to noTrust(1).
       | 
    
    
      | caqQosDefaultMicroflow | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1.5 | 
    
    
      | 
        Indicates a microflow policer name. The value of
        this object either matches the value of caqFlowPolicerName
        object of an active entry in caqFlowPolicerTable or has an
        empty string value.
        If there is no default microflow policer defined for unmatched
        traffic, this object should be an empty string. If the
        microflow(0) bit of caqFlowPolicingCpb object is turned off,
        this object should also be an empty string. Otherwise it should
        match the value of caqFlowPolicerName of an entry in the
        caqFlowPolicerTable which has its RowStatus value to be
        active(1) and the type of the policer should be microflow(1).
       | 
    
    
      | caqQosDefaultAggregate | 
      .1.3.6.1.4.1.9.9.179.1.3.14.1.6 | 
    
    
      | 
        Indicates an aggregate policer name. The value of this object
        either matches the value of caqFlowPolicerName object of an
        active entry in caqFlowPolicerTable or has an empty string
        value. If there is no default aggregate policer defined for
        unmatched traffic, this object should be an empty string. If
        the aggregate(1) bit of caqFlowPolicingCpb object is turned
        off, this object should also be an an empty string. Otherwise
        it should match the value of caqFlowPolicerName of an entry in
        the caqFlowPolicerTable which has its RowStatus value to be
        active(1) and the type of the policer should be aggregate(2).
       | 
    
    
      | caqPortStatsDirection | 
      .1.3.6.1.4.1.9.9.179.1.4.5.1.1 | 
    
    
      | 
        Indicates traffic direction of an physical interface.
       | 
    
    
      | caqPortStatsQueueNumber | 
      .1.3.6.1.4.1.9.9.179.1.4.5.1.2 | 
    
    
      | 
        Indicates the queue number of the interface for which
        statistics are collected. For example : if the port type of
        this interface is 1P2Q2T, this object can be 1, 2, 3.
       | 
    
    
      | caqPortStatsThresholdNumber | 
      .1.3.6.1.4.1.9.9.179.1.4.5.1.3 | 
    
    
      | 
        Indicates the threshold number of a queue on the interface for
        which statistics are collected. For example : if the port type
        of this interface is 1P2Q2T, this object can be 1, 2.
       | 
    
    
      | caqPortStatsDropPkts | 
      .1.3.6.1.4.1.9.9.179.1.4.5.1.4 | 
    
    
      | 
        The number of packets have been received then dropped from the
        interface because they exceeded the threshold value configured
        at this queue and threshold of this interface.
       | 
    
    
      | caqFlowStatsOutOfProfilePackets | 
      .1.3.6.1.4.1.9.9.179.1.4.6.1.1 | 
    
    
      | 
        Indicates the number of out-of-profile packets in
        this flow.
       | 
    
    
      | caqAggPolicerName | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.1 | 
    
    
      | 
        The name of a policer.  This name has to be unique to identify
        an aggregate policer in the device.
       | 
    
    
      | caqAggPolicerPackets | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.2 | 
    
    
      | 
        Indicates the number of packets is policed by this aggregate
        policer. This object is only instantiated if such info is
        available in the device.
       | 
    
    
      | caqAggPolicerNRExceedPackets | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.3 | 
    
    
      | 
        Indicates the number of packets exceeded the normal rate of
        this aggregate policer. This object in only instantiated if
        such info is available in the device.
       | 
    
    
      | caqAggPolicerERExceedPackets | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.4 | 
    
    
      | 
        Indicates the number of packets exceeded the excess rate of
        this policer. This object is only instantiated if such info
        is available in the device and if excess rate is supported
        by the device as indicated by caqFlowPolicerExcessRateSupport
        object.
       | 
    
    
      | caqAggPolicerOctets | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.5 | 
    
    
      | 
        Indicates the number of octets is policed by this aggregate
        policer. This object is only instantiated if such info is
        available in the device.
       | 
    
    
      | caqAggPolicerNRExceedOctets | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.6 | 
    
    
      | 
        Indicates the number of octets exceeded the normal rate of
        this aggregate policer. This object is only instantiated if
        such info is available in the device.
       | 
    
    
      | caqAggPolicerERExceedOctets | 
      .1.3.6.1.4.1.9.9.179.1.4.7.1.7 | 
    
    
      | 
        Indicates the number of octets exceeded the excess rate of
        this policer. This object is only instantiated if such info
        is available in the device and if excess rate is supported
        by the device as indicated by caqFlowPolicerExcessRateSupport
        object.
       | 
    
    
      | caqBridgedFlowVlanIndex | 
      .1.3.6.1.4.1.9.9.179.1.5.1.1.1 | 
    
    
      | 
        The VLAN-id of this VLAN.
       | 
    
    
      | caqBridgedFlowEnabled | 
      .1.3.6.1.4.1.9.9.179.1.5.1.1.2 | 
    
    
      | 
        Enable or Disable this function. If this objects is set to
        true, the bridged packets will be policed at microflow level.
        If it is set to false, bridged packets won't be policed at
        microflow level. This value has no effect on aggregate
        policing. The default is false.
       | 
    
    
      | caqCosMacAddress | 
      .1.3.6.1.4.1.9.9.179.1.5.2.1.1 | 
    
    
      | 
        Indicates the destination MAC address to match against the
        flow.
       | 
    
    
      | caqCosVlanNumber | 
      .1.3.6.1.4.1.9.9.179.1.5.2.1.2 | 
    
    
      | 
        Indicates the VLAN number.
       | 
    
    
      | caqMacAddressCpb | 
      .1.3.6.1.4.1.9.9.179.1.5.2.1.3 | 
    
    
      | 
        Indicates the capability of the destination MAC address denoted
        by caqCosMacAddress object in the same row.
        routerMac(0) means that it is a router Mac address.
        cosVlanMac(1) means that a Cos value is assigned to frames
        on a specific VLAN and which has this MAC address as its
        destination.
       | 
    
    
      | caqCosValue | 
      .1.3.6.1.4.1.9.9.179.1.5.2.1.4 | 
    
    
      | 
        Indicates the Cos value. This object is only instantiated
        if the cosVlanMac bit in caqMacAddressCpb object is turned
        on.
       | 
    
    
      | caqCosMacVlanRouterStatus | 
      .1.3.6.1.4.1.9.9.179.1.5.2.1.5 | 
    
    
      | 
        The status of this conceptual row entry. This object is
        used to manage creation, deletion and modification of rows in
        this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Once a row becomes
        active, value in any other column within such row cannot be
        modified except by setting caqCosMacVlanRouterStatus to
        notInService(2) for such row.
       | 
    
    
      | caqAdjIndex | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.1 | 
    
    
      | 
        Indicates the index of this adjacency.
       | 
    
    
      | caqAdjDstVlanNumber | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.2 | 
    
    
      | 
        Indicates the destination VLAN number of this adjacency.
       | 
    
    
      | caqAdjDstMacAddress | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.3 | 
    
    
      | 
        Indicates the adjacency destination MAC address.
       | 
    
    
      | caqAdjSrcMacAddress | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.4 | 
    
    
      | 
        Indicates the adjacency source MAC address. If this object
        is not configured, it will contain the MAC address of the
        PBF engine which is denoted by caqPbfMacAddress object.
       | 
    
    
      | caqAdjName | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.5 | 
    
    
      | 
        Indicates the adjacency name. The adjacency name should be
        unique among all entries in this table.
       | 
    
    
      | caqAdjMtu | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.6 | 
    
    
      | 
        Indicates the adjacency MTU.
       | 
    
    
      | caqAdjHitCount | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.7 | 
    
    
      | 
        Indicates the number of packets that have matched this
        adjacency's criteria. The value of this object is cleared when
        this row is derefenced by entries in caqSecurityActionTable.
       | 
    
    
      | caqAdjStatus | 
      .1.3.6.1.4.1.9.9.179.1.6.3.1.8 | 
    
    
      | 
        Indicates the status of this adjacency conceptual entry.
        This object is used to manage creation, deletion and
        modification of rows in this table.
        An entry may not exist in the active state unless all objects
        in the entry have an appropriate value. Once a row becomes
        active, value in any other column within such row cannot be
        modified.
        This object cannot be changed from active(1) to any other value
        if the following two conditions are met:
        - There is an active entry in caqSecurityActionTable with
        caqSecurityAdjIndex equal to caqAdjIndex.
        - That entry has caqSecurityAction set to redirectWithAdj(4).
       | 
    
    
      | caqIpFlowLoggingIndex | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.1 | 
    
    
      | 
        The index of this table for indicating a logged IP flow.
       | 
    
    
      | caqIpFlowVlan | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.2 | 
    
    
      | 
        Indicates the VLAN number which this logged IP flow belongs.
       | 
    
    
      | caqIpFlowIfIndex | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.3 | 
    
    
      | 
        Indicates the ifIndex of the interface where this logged
        IP flow arrived.
       | 
    
    
      | caqIpFlowProtocolType | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.4 | 
    
    
      | 
        The protocol number field in the IP header of this logged
        IP flow as specified in RFC 1700.
       | 
    
    
      | caqIpFlowAddrType | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.5 | 
    
    
      | 
        Indicates the address type for addresses specified in
        caqIpFlowSrcIp and caqIpFlowDestIp of this logged IP
        flow.
       | 
    
    
      | caqIpFlowSrcIp | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.6 | 
    
    
      | 
        Indicates the source address of this logged IP flow.
       | 
    
    
      | caqIpFlowSrcPort | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.7 | 
    
    
      | 
        Indicates the source port number of this logged IP flow
        when its protocol field is TCP or UDP. The value of this
        object is -1 if the flow is not UDP or TCP traffic.
       | 
    
    
      | caqIpFlowDestIp | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.8 | 
    
    
      | 
        Indicates the destination address of this logged IP flow.
       | 
    
    
      | caqIpFlowDestPort | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.9 | 
    
    
      | 
        Indicates the destination port number of this logged IP flow
        when its protocol field is TCP or UDP. The value of this
        object is -1 if the flow is not UDP or TCP traffic.
       | 
    
    
      | caqIpFlowIcmpType | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.10 | 
    
    
      | 
        Indicates the message type of ICMP packets. The value of this
        object is -1 if the flow is not ICMP traffic.
       | 
    
    
      | caqIpFlowIcmpCode | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.11 | 
    
    
      | 
        Indicates the message code of ICMP packets. The value of this
        object is -1 if the flow is not ICMP traffic.
       | 
    
    
      | caqIpFlowIgmpType | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.12 | 
    
    
      | 
        Indicates the message type of IGMP packets. The value of this
        object is -1 if the flow is not IGMP traffic.
       | 
    
    
      | caqIpFlowArpOpcode | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.13 | 
    
    
      | 
        Indicates the ARP opcode value of this ARP flow.
        If the value of this object is notApplicable(1), this flow
        is not ARP traffic.
        If the value of this object is request(2), this flow
        is ARP request traffic.
        If the value of this object is reply(3), this flow
        is ARP reply traffic.
       | 
    
    
      | caqIpFlowArpSrcMacAddr | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.14 | 
    
    
      | 
        Indicates the Ethernet Source Address value of this ARP
        flow.  This object is ignored if the flow is not ARP
        traffic.
       | 
    
    
      | caqIpFlowArpHeaderSrcMacAddr | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.15 | 
    
    
      | 
        Indicates the Ethernet Source Address value included in the
        ARP header of this ARP flow. This object is ignored if the
        flow is not ARP traffic.
       | 
    
    
      | caqIpFlowPacketsCount | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.16 | 
    
    
      | 
        Indicates the number of packets that belong to this IP flow.
       | 
    
    
      | caqIpFlowLoggingTTL | 
      .1.3.6.1.4.1.9.9.179.1.7.4.1.17 | 
    
    
      | 
        Indicates the TTL (Time to Live) of this entry. The entry
        is removed when its value of this object reaches 0.
       | 
    
    
      | caqArpInspAclName | 
      .1.3.6.1.4.1.9.9.179.1.8.10.1.1 | 
    
    
      | 
        The name of an ACL that contains ACE used for ARP Inspection.
       | 
    
    
      | caqArpInspForwardedPackets | 
      .1.3.6.1.4.1.9.9.179.1.8.10.1.2 | 
    
    
      | 
        Indicates the number of packets subjected to ARP Inspection
        is forwarded by this ACL.
       | 
    
    
      | caqArpInspDroppedPackets | 
      .1.3.6.1.4.1.9.9.179.1.8.10.1.3 | 
    
    
      | 
        Indicates the number of packets subjected to ARP Inspection
        is dropped by this ACL.
       | 
    
    
      | caqIfArpInspDropThreshold | 
      .1.3.6.1.4.1.9.9.179.1.8.11.1.1 | 
    
    
      | 
        Indicates the drop threshold value where excess packets of
        a traffic flow subjected to ARP Inspection will be dropped
        if its rate is greater than this threshold value. If the value
        of this object is 0, no rate limit is applied for dropping
        ARP traffic at this interface.
       | 
    
    
      | caqIfArpInspShutdownThreshold | 
      .1.3.6.1.4.1.9.9.179.1.8.11.1.2 | 
    
    
      | 
        Indicates the threshold value where the interface will be
        shutdown if traffic rate subjected to ARP Inspection is greater
        than this threshold value. If the value of this object is 0,
        no ARP traffic rate limit is applied for shutting down the
        interface.
       | 
    
    
      | caqAclHitCountAclType | 
      .1.3.6.1.4.1.9.9.179.1.9.4.1.1 | 
    
    
      | 
        Indicates the type of ACL.
        ipSecurity(1) indicates that this ACL is an IP Security ACL.
        ipxSecurity(2) indicates that this ACL is an IPX Security ACL.
        macSecurity(3) indicates that this ACL is a MAC Security ACL.
       | 
    
    
      | caqAclHitCountAclName | 
      .1.3.6.1.4.1.9.9.179.1.9.4.1.2 | 
    
    
      | 
        Indicates the ACL name which should exist in the ACL tables
        e.g. in caqIpAceTable. This ACL must be matching the type
        specified in caqAclHitCountAclType in the same row.
       | 
    
    
      | caqAclHitCountEnable | 
      .1.3.6.1.4.1.9.9.179.1.9.4.1.3 | 
    
    
      | 
        Indicates whether this ACL hit count is enabled.
       | 
    
    
      | caqAceHitCountAclType | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1.1 | 
    
    
      | 
        Indicates the type of ACL.
        ipSecurity(1) indicates that this ACL is an IP Security ACL.
        ipxSecurity(2) indicates that this ACL is an IPX Security ACL.
        macSecurity(3) indicates that this ACL is a MAC Security ACL.
       | 
    
    
      | caqAceHitCountAclName | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1.2 | 
    
    
      | 
        Indicates the ACL name which should exist in the ACL tables
        e.g. in caqIpAceTable. This ACL must be matching the type
        specified in caqAceHitCountAclType in the same row.
       | 
    
    
      | caqAceHitCountAceIndex | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1.3 | 
    
    
      | 
        The index of an ACE within an ACL.
       | 
    
    
      | caqAceHitCountEnable | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1.4 | 
    
    
      | 
        Indicates whether this ACE hit count is enabled.
       | 
    
    
      | caqAceIngressHitCount | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1.5 | 
    
    
      | 
        Indicates number of hit count for this ACE for
        ingress traffic.
       | 
    
    
      | caqAceEgressHitCount | 
      .1.3.6.1.4.1.9.9.179.1.9.5.1.6 | 
    
    
      | 
        Indicates number of hit count for this ACE for
        egress traffic.
       | 
    
    
      | caqIfAclHitCountAclType | 
      .1.3.6.1.4.1.9.9.179.1.9.6.1.1 | 
    
    
      | 
        Indicates the type of ACL.
        ipSecurity(1) indicates that this ACL is an IP Security ACL.
        ipxSecurity(2) indicates that this ACL is an IPX Security ACL.
        macSecurity(3) indicates that this ACL is a MAC Security ACL.
       | 
    
    
      | caqIfAclHitCountAclName | 
      .1.3.6.1.4.1.9.9.179.1.9.6.1.2 | 
    
    
      | 
        Indicates the ACL name which should exist in the ACL tables
        e.g. in caqIpAceTable. This ACL must be matching the type
        specified in caqIfAclHitCountAclType in the same row.
       | 
    
    
      | caqIfAclHitCountAceIndex | 
      .1.3.6.1.4.1.9.9.179.1.9.6.1.3 | 
    
    
      | 
        The index of an ACE within an ACL.
       | 
    
    
      | caqIfAclIngressHitCount | 
      .1.3.6.1.4.1.9.9.179.1.9.6.1.4 | 
    
    
      | 
        Indicates the number of hit count of this ACE for
        ingress traffic on this interface.
       | 
    
    
      | caqIfAclEgressHitCount | 
      .1.3.6.1.4.1.9.9.179.1.9.6.1.5 | 
    
    
      | 
        Indicates the number of hit count of this ACE for
        egress traffic on this interface.
       |