Cisco 4700M Configuration Manual page 68

Application control engine appliance security
Hide thumbs Also See for 4700M:
Table of Contents

Advertisement

Displaying ACL Configuration Information and Statistics
Table 1-6
Table 1-6
Field
Access-list
Elements
Status
Remark
Entries
Hitcounts
hash 1
(0xnnnnnnnn)
hash 2
(0xnnnn)
Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide
1-44
describes the fields in the show access-list detail command output.
Field Descriptions for the show access-list detail Command
Output
Description
Name of the security ACL.
Number of entries in the ACL.
Current status of the ACL: ACTIVE when the ACL is
associated with at least one interface or NOT-ACTIVE when
the ACL is not associated with at least one interface.
Configured comments that describe the ACL.
Full text of all entries in the ACL
Hit counts for each ACL entry.
32-bit hexadecimal MD5-hash value that the ACE computes
from the access-list command immediately when you
configure an ACL. The ACE includes this hash value in deny
syslog messages to help you identify the ACL entry that
caused the syslog in the output of this command. This hash
value is line-number independent. To prevent possible
discrepancies between the hash values in the deny syslog
message and the output of this command after a reboot, be
sure to use Tab completion or type entire keywords in the
CLI when configuring individual entries in an ACL.
16-bit hexadecimal (0xnnnn) MD5-hash value that the ACE
computes from the expanded access-list entries resulting
from the object groups that you configure in an ACL. The
ACE computes the hash 2 value when you activate the ACL
on an interface. For ACLs that do not have object groups, the
hash 2 value is always 0x0. The ACE also includes the
hash 2 value in deny syslog messages to help you identify
the expanded ACL entry that caused the syslog. This hash
value is also line-number independent. To uniquely identify
the expanded ACL entry that caused the syslog, you need to
search for an entry in this command output that matches both
the hash 1 and the hash 2 hexadecimal values.
Chapter 1
Configuring Security Access Control Lists
OL-16202-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

4700 series

Table of Contents