Specifications

show security acl resource-usage
Chapter 14
Security ACL Commands
476
Static default action : False
No per-user (MAC) mapping : True
Out mapping : False
In mapping : True
No VLAN or PORT mapping : False
No VPORT mapping : True
Table 58 explains the fields in the show security acl resource-usage output.
Table 58. show security acl resource-usage Output
Field Description
Number of rules Number of security ACEs currently mapped to ports or
VLANs.
Number of leaf
nodes
Number of security ACL data entries stored in the rule tree.
Stored rule count Number of security ACEs stored in the rule tree.
Leaf chain count Number of chained security ACL data entries stored in the
rule tree.
Longest leaf chain Longest chain of security ACL data entries stored in the rule
tree.
Number of
non-leaf nodes
Number of nodes with no data entries stored in the rule tree.
Uncompressed
Rule Count
Number of security ACEs stored in the rule tree, including
duplicates—ACEs in ACLs applied to multiple ports,
virtual ports, or VLANs.
Maximum node
depth
Number of data elements in the rule tree, from the root to
the furthest data entry (leaf).
Sub-chain count Sum of action types represented in all security ACL data
entries.
PSCBs in primary
memory
Number of pattern search control blocks (PSCBs) stored in
primary node memory.
PSCBs in
secondary memory
Number of PSCBs stored in secondary node memory.
Leaves in primary Number of security ACL data entries stored in primary leaf
memory.