D-Link DWS-1008 Cli Reference Manual page 287

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

DWS-1008 CLI Reference Guide
In mapping : True
No VLAN or PORT mapping : False
No VPORT mapping : True
The table below explains the fields in the show security acl resource-usage output.
show security acl resource-usage Output
-----------------------------------------------------------------------------------------------------------------------------
Field
-----------------------------------------------------------------------------------------------------------------------------
Number of rules
-----------------------------------------------------------------------------------------------------------------------------
Number of leaf
nodes
-----------------------------------------------------------------------------------------------------------------------------
Stored rule count
-----------------------------------------------------------------------------------------------------------------------------
Leaf chain count
-----------------------------------------------------------------------------------------------------------------------------
Longest leaf chain
-----------------------------------------------------------------------------------------------------------------------------
Number of
non-leaf nodes
-----------------------------------------------------------------------------------------------------------------------------
Uncompressed
Rule Count
-----------------------------------------------------------------------------------------------------------------------------
Maximum node
-----------------------------------------------------------------------------------------------------------------------------
Sub-chain count
-----------------------------------------------------------------------------------------------------------------------------
PSCBs in primary
memory
-----------------------------------------------------------------------------------------------------------------------------
PSCBs in
secondary memory
-----------------------------------------------------------------------------------------------------------------------------
Leaves in primary
D-Link Systems, Inc.
Description
Number of security ACEs currently mapped to ports or VLANs.
Number of security ACL data entries stored in the rule tree.
Number of security ACEs stored in the rule tree.
Number of chained security ACL data entries stored in the rule
tree.
Longest chain of security ACL data entries stored in the rule
tree.
Number of nodes with no data entries stored in the rule tree.
Number of security ACEs stored in the rule tree, including
duplicates - ACEs in ACLs applied to multiple ports, virtual
ports, or VLANs.
Number of data elements in the rule tree, from the root to depth
the furthest data entry (leaf).
Sum of action types represented in all security ACL data entries.
Number of pattern search control blocks (PSCBs) stored in
primary node memory.
Number of PSCBs stored in secondary node memory.
Number of security ACL data entries stored in primary leaf
memory.
Security ACL Commands
286

Advertisement

Table of Contents
loading

Table of Contents