D-Link DWS-1008 Informations techniques Page 287

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 406
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 286
286
DWS-1008 CLI Reference Guide
D-Link Systems, Inc.
Security ACL Commands
In mapping : True
No VLAN or PORT mapping : False
No VPORT mapping : True
The table below explains the fields in the show security acl resource-usage output.
show security acl resource-usage Output
-----------------------------------------------------------------------------------------------------------------------------
Field Description
-----------------------------------------------------------------------------------------------------------------------------
Number of rules Number of security ACEs currently mapped to ports or VLANs.
-----------------------------------------------------------------------------------------------------------------------------
Number of leaf Number of security ACL data entries stored in the rule tree.
nodes
-----------------------------------------------------------------------------------------------------------------------------
Stored rule count Number of security ACEs stored in the rule tree.
-----------------------------------------------------------------------------------------------------------------------------
Leaf chain count Number of chained security ACL data entries stored in the rule
tree.
-----------------------------------------------------------------------------------------------------------------------------
Longest leaf chain Longest chain of security ACL data entries stored in the rule
tree.
-----------------------------------------------------------------------------------------------------------------------------
Number of Number of nodes with no data entries stored in the rule tree.
non-leaf nodes
-----------------------------------------------------------------------------------------------------------------------------
Uncompressed Number of security ACEs stored in the rule tree, including
Rule Count duplicates - ACEs in ACLs applied to multiple ports, virtual
ports, or VLANs.
-----------------------------------------------------------------------------------------------------------------------------
Maximum node Number of data elements in the rule tree, from the root to depth
the furthest data entry (leaf).
-----------------------------------------------------------------------------------------------------------------------------
Sub-chain count Sum of action types represented in all security ACL data entries.
-----------------------------------------------------------------------------------------------------------------------------
PSCBs in primary Number of pattern search control blocks (PSCBs) stored in
memory primary node memory.
-----------------------------------------------------------------------------------------------------------------------------
PSCBs in Number of PSCBs stored in secondary node memory.
secondary memory
-----------------------------------------------------------------------------------------------------------------------------
Leaves in primary Number of security ACL data entries stored in primary leaf
memory.
Vue de la page 286
1 2 ... 282 283 284 285 286 287 288 289 290 291 292 ... 405 406

Commentaires sur ces manuels

Pas de commentaire