Chapter 12 Configuring the Switching Database Manager on the ML-Series Card

Monitoring and Verifying SDM

Configuring Access Control List Size in TCAM

The default maximum size of the ACL is 300 64-bit entries. You can enter the sdm access-listcommand to change the maximum ACL database size, as shown in Table 12-2.

Table 12-2 Partitioning the TCAM Size for ACLs

Task

Command

 

 

sdm access-list number-entries

Sets the name of the application region for which you want to

 

configure the size. You can enter the size as an absolute number

 

of entries.

 

 

An example of this is shown in Example 12-2.

Example 12-2 Configuring Entries for the ACL Region in TCAM

ML_Series# configure terminal

ML_Series(config)# sdm access-list 100

ML_Series(config)# end

Monitoring and Verifying SDM

To display the number of available TCAM entries, enter the show sdm size command from global configuration mode:

ML_Series # show

sdm size

 

 

 

Active

Switching

Database

Region Maximum

Sizes :

IP

Adjacency

 

:

300

64-bit

entries

IP

Prefix

 

:

300

64-bit

entries

QoS Classifiers

:

300

64-bit

entries

IP

VRF Prefix

 

:

300

64-bit

entries

IP

Multicast

 

:

300

64-bit

entries

MAC Addr

 

:

8192

64-bit

entries

Access List

 

:

300

64-bit

entries

Cisco ONS 15310-CL and Cisco ONS 15310-MA Ethernet Card Software Feature and Configuration Guide R8.5

 

78-18133-01

12-3

 

 

 

Page 161
Image 161
Cisco Systems 15310-CL Monitoring and Verifying SDM, Configuring Access Control List Size in Tcam, Task Command, Entries

15310-CL, 15310-MA specifications

Cisco Systems has established itself as a leader in the networking domain, offering a wide array of solutions to meet the needs of modern businesses. Among its impressive product lineup are the Cisco 15310-CL and 15310-MA routers, designed to provide advanced network performance and reliability.

The Cisco 15310-CL is a versatile platform that primarily serves as a carrier-class router aimed at supporting high-speed data and voice services. It is built to handle the demands of large enterprises and service providers, offering a robust design that ensures maximum uptime and performance. One of its standout features is its modular architecture, which enables users to customize their configurations based on specific application needs. This scalability allows for future expansion without the need for a complete hardware overhaul.

Key technologies integrated into the Cisco 15310-CL include high-density Ethernet interfaces and a comprehensive suite of Layer 2 and Layer 3 protocol support. The device is capable of supporting multiple types of connections, including TDM, ATM, and Ethernet. This flexibility makes it an ideal choice for organizations that require seamless migration between various service types. Moreover, with features such as MPLS (Multiprotocol Label Switching) support and advanced Quality of Service (QoS) mechanisms, the router ensures that critical applications receive the necessary bandwidth and low latency required for optimal performance.

In contrast, the Cisco 15310-MA focuses on access solutions, providing a cost-effective entry point for businesses looking to enhance their network capabilities. It is well-suited for smaller offices or branch locations that need reliable connectivity without the expense and complexity associated with larger systems. The device supports a range of access methods and provides essential features like firewall capabilities, VPN support, and comprehensive security measures to protect sensitive data.

Both models benefit from Cisco's commitment to security and manageability, offering features like enhanced encryption protocols and user authentication mechanisms that help safeguard networks against threats. Additionally, they can be managed through Cisco’s intuitive software tools, simplifying configuration and monitoring tasks for IT administrators.

The Cisco 15310-CL and 15310-MA are ideal solutions for businesses seeking to enhance their network infrastructure, ensuring firms can keep pace with evolving technology demands while maintaining a focus on security and performance. Their combination of advanced features, modular capabilities, and robust support makes them valuable assets in the networking landscape.