Specifications
RoamAbout Mobility System Software Command Line Reference 14-25
Port number Control value for handling fragmented IP packets.
Note: The current MSS version filters only the first packet of a fragmented IP packet
and passes the remaining fragments.
Number of action
types
Number of actions that can be performed by ACLs. This value is always 2, because
ACLs can either permit or deny.
LUdef in use Number of the lookup definition (LUdef) table currently in use for packet handling.
Default action
pointer
Memory address used for packet handling, from which default action data is
obtained when necessary.
L4 global Security ACL mapping on the RoamAbout Switch:
• True—Security ACLs are mapped.
• False—No security ACLs are mapped.
No rules Security ACE rule mapping on the RoamAbout Switch:
• True—No security ACEs are mapped.
• False—Security ACEs are mapped.
Non-IP rules Non-IP security ACE mapping on the RoamAbout Switch:
• True—Non-IP security ACEs are mapped.
• False—Only IP security ACEs are mapped.
Note: The current MSS version supports security ACEs for IP only.
Root in first Leaf buffer allocation:
• True—Enough primary leaf buffers are allocated in nonvolatile memory to
accommodate all leaves.
• False—Insufficient primary leaf buffers are allocated in nonvolatile memory to
accommodate all leaves.
Static default action Definition of a default action:
• True—A default action types is defined.
• False—No default action type is defined.
No per-user (MAC)
mapping
Per-user application of a security ACL with the Filter-Id attribute, on the RoamAbout
Switch:
• True—No security ACLs are applied to users.
• False—Security ACLs are applied to users.
Out mapping Application of security ACLs to outgoing traffic on the RoamAbout Switch:
• True—Security ACLs are mapped to outgoing traffic.
• False—No security ACLs are mapped to outgoing traffic.
In mapping Application of security ACLs to incoming traffic on the RoamAbout Switch:
• True—Security ACLs are mapped to incoming traffic.
• False—No security ACLs are mapped to incoming traffic.
Table 14-1 show security acl resource-usage Output (continued)
Field Description