Access Control List Rule Table Analysis
Notations:
1. F1 ~ F5: 5-tuple fields in packet header
F1. Source IP
F2. Destination IP
F3. Source port
F4. Destination port
F5. Protocol value
2. P: Prefix
3. R: Range
4. S: Protocol value
5. *: Don’t care term
The purpose of the table: Calculating the number of distinct filed values
ACL |
# of distinct filed value |
Table Size |
Summary |
||||||
F1(P) |
79 |
118 |
301 |
487 |
2310 |
4473 |
3-10% |
||
F2(P) |
331 |
311 |
298 |
386 |
551 |
595 |
30%-60% |
||
F3(R) |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
||
F4(R) |
101 |
107 |
108 |
108 |
108 |
108 |
1%-10% |
||
F5(S) |
4 |
4 |
4 |
4 |
4 |
4 |
4 |
||
# of * |
F1(P) |
13 |
11 |
16 |
19 |
27 |
35 |
11-35 |
|
F2(P) |
8 |
10 |
21 |
35 |
43 |
56 |
8-56 |
||
F3(R) |
1000 |
2000 |
3000 |
5000 |
8000 |
10000 |
100% |
||
F4(R) |
291 |
571 |
807 |
1380 |
2244 |
2792 |
27%-29% |
||
F5(S) |
69 |
171 |
246 |
400 |
640 |
802 |
7-8% |