display security acl resource-usage
457
LUdef in use
Number of the lookup definition (LUdef) table currently in
use for packet handling.
Default action
pointer
Memory address used for packet handling, from which
default action data is obtained when necessary.
L4 global
Security ACL mapping on the WX switch:
True
— Security ACLs are mapped.
False
— No security ACLs are mapped.
No rules
Security ACE rule mapping on the WX switch:
True
— No security ACEs are mapped.
False
— Security ACEs are mapped.
Non-IP rules
Non-IP security ACE mapping on the WX switch:
True
— Non-IP security ACEs are mapped.
False
— Only IP security ACEs are mapped.
Note:
The current MSS version supports security ACEs for IP
only.
Root in first
Leaf buffer allocation:
True
— Enough primary leaf buffers are allocated in
nonvolatile memory to accommodate all leaves.
False
— Insufficient primary leaf buffers are allocated in
nonvolatile memory to accommodate all leaves.
Static default action
Definition of a default action:
True
— A default action types is defined.
False
— No default action type is defined.
No per-user (MAC)
mapping
Per-user application of a security ACL with the Filter-Id
attribute, on the WX switch:
True
— No security ACLs are applied to users.
False
— Security ACLs are applied to users.
Out mapping
Application of security ACLs to outgoing traffic on the WX
switch:
True
— Security ACLs are mapped to outgoing traffic.
False
— No security ACLs are mapped to outgoing
traffic.
Table 81
Output of display security acl resource-usage (continued)
Field
Description
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...