Chapter 4
| System Management Commands
System Status
– 83 –
show access-list
tcam-utilization
This command shows utilization parameters for TCAM (Ternary Content
Addressable Memory), including the number policy control entries in use, the
number of free entries, and the overall percentage of TCAM in use.
Command Mode
Privileged Exec
Command Usage
Policy control entries (PCEs) are used by various system functions which rely on
rule-based searches, including Access Control Lists (ACLs), IP Source Guard filter
rules, Quality of Service (QoS) processes, or traps.
For example, when binding an ACL to a port, each rule in an ACL will use two PCEs;
and when setting an IP Source Guard filter rule for a port, the system will also use
two PCEs.
Example
Console#show access-list tcam-utilization
Total Policy Control Entries : 512
Free Policy Control Entries : 352
Entries Used by System : 160
Entries Used by User : 0
TCAM Utilization : 31.25%
Console#
show memory
This command shows memory utilization parameters.
Command Mode
Normal Exec, Privileged Exec
Command Usage
This command shows the amount of memory currently free for use, the amount of
memory allocated to active processes, and the total amount of system memory.
Example
Console#show memory
Status Bytes
------ ----------
Free 50917376
Used 83300352
Total 134217728
show users
Shows all active console and Telnet sessions, including user
name, idle time, and IP address of Telnet clients
NE, PE
show version
Displays version information for the system
NE, PE
Table 10: System Status Commands (Continued)
Command
Function
Mode
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...