C
HAPTER
13
| Security Measures
Access Control Lists
– 355 –
C
OMMAND
U
SAGE
The following restrictions apply to ACLs:
◆
The maximum number of ACLs is 64.
◆
The maximum number of rules per system is 512 rules.
◆
An ACL can have up to 64 rules. However, due to resource restrictions,
the average number of rules bound to the ports should not exceed 20.
◆
The maximum number of rules that can be bound to the ports is 64 for
each of the following list types: MAC ACLs, IP ACLs (including Standard
and Extended ACLs), IPv6 Standard ACLs, and IPv6 Extended ACLs.
The maximum number of rules (Access Control Entries, or ACEs) stated
above is the worst case scenario. In practice, the switch compresses
the ACEs in TCAM (a hardware table used to store ACEs), but the actual
maximum number of ACEs possible depends on too many factors to be
precisely determined. It depends on the amount of hardware resources
reserved at runtime for this purpose.
Auto ACE Compression is a software feature used to compress all the
ACEs of an ACL to utilize hardware resources more efficiency. Without
compression, one ACE would occupy a fixed number of entries in TCAM.
So if one ACL includes 25 ACEs, the ACL would need (25 * n) entries in
TCAM, where “n” is the fixed number of TCAM entries needed for one
ACE. When compression is employed, before writing the ACE into
TCAM, the software compresses the ACEs to reduce the number of
required TCAM entries. For example, one ACL may include 128 ACEs
which classify a continuous IP address range like 192.168.1.0~255. If
compression is disabled, the ACL would occupy (128*n) entries of
TCAM, using up nearly all of the hardware resources. When using
compression, the 128 ACEs are compressed into one ACE classifying
the IP address as 192.168.1.0/24, which requires only “n” entries in
TCAM. The above example is an ideal case for compression. The worst
case would be if no any ACE can be compressed, in which case the used
number of TCAM entries would be the same as without compression. It
would also require more time to process the ACEs.
The order in which active ACLs are checked is as follows:
1.
User-defined rules in IP and MAC ACLs for ingress ports are checked in
parallel.
2.
Rules within an ACL are checked in the configured order, from top to
bottom.
3.
If the result of checking an IP ACL is to permit a packet, but the result
of a MAC ACL on the same packet is to deny it, the packet will be
denied (because the decision to deny a packet has a higher priority for
security reasons). A packet will also be denied if the IP ACL denies it
and the MAC ACL accepts it.
Содержание ECS3510-10PD
Страница 1: ...Management Guide www edge core com 10 Port Layer 2 Fast Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 48: ...CONTENTS 48...
Страница 68: ...SECTION I Getting Started 68...
Страница 78: ...CHAPTER 1 Introduction System Defaults 78...
Страница 96: ...CHAPTER 2 Initial Switch Configuration Managing System Files 96...
Страница 98: ...SECTION II Web Configuration 98...
Страница 118: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 118...
Страница 150: ...CHAPTER 4 Basic Management Tasks Resetting the System 150...
Страница 196: ...CHAPTER 5 Interface Configuration VLAN Trunking 196 Figure 66 Configuring VLAN Trunking...
Страница 238: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 238...
Страница 264: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 264...
Страница 274: ...CHAPTER 9 Congestion Control Automatic Traffic Control 274...
Страница 288: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 288...
Страница 304: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 304...
Страница 423: ...CHAPTER 13 Security Measures DHCP Snooping 423 Figure 229 Displaying the Binding Table for DHCP Snooping...
Страница 424: ...CHAPTER 13 Security Measures DHCP Snooping 424...
Страница 568: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 568...
Страница 596: ...CHAPTER 15 IP Configuration Setting the Switch s IP Address IP Version 6 596...
Страница 614: ...CHAPTER 1 IP Services Configuring the PPPoE Intermediate Agent 614...
Страница 784: ...CHAPTER 20 System Management Commands Powered Device 784...
Страница 814: ...CHAPTER 22 Remote Monitoring Commands 814...
Страница 1008: ...CHAPTER 26 Interface Commands Power Savings 1008...
Страница 1022: ...CHAPTER 27 Link Aggregation Commands Trunk Status Display Commands 1022...
Страница 1052: ...CHAPTER 29 Congestion Control Commands Automatic Traffic Control Commands 1052...
Страница 1064: ...CHAPTER 31 UniDirectional Link Detection Commands 1064...
Страница 1070: ...CHAPTER 32 Address Table Commands 1070...
Страница 1130: ...CHAPTER 34 ERPS Commands 1130...
Страница 1172: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 1172...
Страница 1186: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 1186...
Страница 1302: ...CHAPTER 38 Multicast Filtering Commands MVR for IPv6 1302...
Страница 1368: ...CHAPTER 40 CFM Commands Delay Measure Operations 1368...
Страница 1390: ...CHAPTER 42 Domain Name Service Commands 1390...
Страница 1448: ...CHAPTER 44 IP Interface Commands ND Snooping 1448...
Страница 1450: ...SECTION IV Appendices 1450...
Страница 1455: ...APPENDIX A Software Specifications Management Information Bases 1455 UDP MIB RFC 2013...
Страница 1456: ...APPENDIX A Software Specifications Management Information Bases 1456...
Страница 1464: ...APPENDIX D Compliances and Safety Statements CE Mark Declaration of Conformance for EMI and Safety EEC 1464...
Страница 1482: ...COMMAND LIST 1482...
Страница 1493: ......
Страница 1494: ...ECS3510 10PD E032014 ST R03 149100000179A...