EasyManua.ls Logo

Edge-Core ECS4620-28F - Figure 197: Showing TCAM Utilization

Edge-Core ECS4620-28F
2143 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 12
| Security Measures
Access Control Lists
– 324
For example, when binding an ACL to a port, each rule in an ACL will use two PCEs;
and when setting an IP Source Guard filter rule for a port, the system will also use
two PCEs.
Parameters
These parameters are displayed:
Total Policy Control Entries – The number policy control entries in use.
Free Policy Control Entries – The number of policy control entries available for
use.
Entries Used by System – The number of policy control entries used by the
operating system.
Entries Used by User – The number of policy control entries used by
configuration settings, such as access control lists.
TCAM Utilization – The overall percentage of TCAM in use.
Web Interface
To show information on TCAM utilization:
1. Click Security, ACL.
2. Select Configure ACL from the Step list.
3. Select Show TCAM from the Action list.
Figure 197: Showing TCAM Utilization
Setting the
ACL Name and Type
Use the Security > ACL (Configure ACL - Add) page to create an ACL.
Parameters
These parameters are displayed:
ACL NameName of the ACL. (Maximum length: 32 characters)

Table of Contents

Other manuals for Edge-Core ECS4620-28F

Related product manuals