548 CHAPTER 14: SECURITY ACL COMMANDS
Examples — To display security ACL resource usage, type the following
command:
WX4400# display security acl resource-usage
ACL resources
Classifier tree counters
------------------------
Number of rules : 2
Number of leaf nodes : 1
Stored rule count : 2
Leaf chain count : 1
Longest leaf chain : 2
Number of non-leaf nodes : 0
Uncompressed Rule Count : 2
Maximum node depth : 1
Sub-chain count : 0
PSCBs in primary memory : 0 (max: 512)
PSCBs in secondary memory : 0 (max: 9728)
Leaves in primary : 2 (max: 151)
Leaves in secondary : 0 (max 12096)
Sum node depth : 1
Information on Network Processor status
---------------------------------------
Fragmentation control : 0
UC switchdest : 0
ACL resources
Port number : 0
Number of action types : 2
LUdef in use : 5
Default action pointer : c8007dc
L4 global : True
No rules : False
Non-IP rules : False
Root in first : True
Static default action : False
No per-user (MAC) mapping : True
Out mapping : False
In mapping : True
No VLAN or PORT mapping : False
No VPORT mapping : True
Table 87 explains the fields in the display security acl resource-usage
output.