display security acl resource-usage 379

Examples — To display security ACL resource usage, type the following command:

WX4400# display security acl resource-usage

ACL resources

Classifier tree counters

 

------------------------

: 2

Number of rules

Number of leaf nodes

: 1

Stored rule count

: 2

Leaf chain count

: 1

Longest leaf chain

: 2

Number of non-leaf nodes

: 0

Uncompressed Rule Count

: 2

Maximum node depth

: 1

Sub-chain count

: 0

PSCBs in primary memory

: 0 (max: 512)

PSCBs in secondary memory

: 0 (max: 9728)

Leaves in primary

: 2 (max: 151)

Leaves in secondary

: 0 (max 12096)

Sum node depth

: 1

Information on Network Processor status

---------------------------------------

Fragmentation control

: 0

UC switchdest

: 0

ACL resources

: 0

Port number

Number of action types

: 2

LUdef in use

: 5

Default action pointer

: c8007dc

L4 global

: True

No rules

: False

Non-IP rules

: False

Root in first

: True

Static default action

: False

No per-user (MAC) mapping

: True

Out mapping

: False

In mapping

: True

No VLAN or PORT mapping

: False

No VPORT mapping

: True

Table 72 explains the fields in the display security acl resource-usageoutput.

Page 379
Image 379
3Com 3CRWX120695A, 3CRWX440095A manual WX4400# display security acl resource-usage