<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: 7100-Series / ACL / Access Control List  / Limitations in ExtremeSwitching (EOS)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56795#M902</link>
    <description>I created an ACL that has 200 Rules, however you can only have 128 rules applied at any given time, so would have to delete rule# 128-200 to get it to apply to an interface.&lt;BR /&gt;
&lt;BR /&gt;
I would suggest opening a case with GTAC so we can review configurations and try to assist getting a working configuration.&lt;BR /&gt;
&lt;BR /&gt;
Ryan</description>
    <pubDate>Wed, 01 Mar 2017 20:14:00 GMT</pubDate>
    <dc:creator>Careno__Ryan</dc:creator>
    <dc:date>2017-03-01T20:14:00Z</dc:date>
    <item>
      <title>7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56771#M878</link>
      <description>We want to transfer a large ACL from a DFE module (with Advanced Licence) to an 7100 (about 300 entries). We can only enter 171 lines, then we're done.&lt;BR /&gt;
&lt;BR /&gt;
The "show limits" command displays:&lt;BR /&gt;
&lt;BR /&gt;
Chassis limits:&lt;BR /&gt;
Application                         Limit    In use   Entry size  Total Memory&lt;BR /&gt;
-------------------------------- --------- --------- ------------ ------------&lt;BR /&gt;
access-lists                           256         9         125K        31.3M&lt;BR /&gt;
  access-list-entries                 1000       171         160B       156.4K&lt;BR /&gt;
  access-list-entries-per-list        1000         -            -            -&lt;BR /&gt;
  applied-access-lists                1552         0         110B       165.5K&lt;BR /&gt;
    applied-ipv4-in                    256         0            -            -&lt;BR /&gt;
    applied-ipv4-out                   256         0            -            -&lt;BR /&gt;
    applied-ipv6-in                    256         0            -            -&lt;BR /&gt;
    applied-ipv6-out                   256         0            -            -&lt;BR /&gt;
    applied-l2-in                      256         0            -            -&lt;BR /&gt;
    applied-l2-out                     256         0            -            -&lt;BR /&gt;
&lt;BR /&gt;
The "show limits resource-profile -verbose" command displays:&lt;BR /&gt;
&lt;BR /&gt;
Resource Profile: router1&lt;BR /&gt;
   Authenticated Users = 512&lt;BR /&gt;
   MAC Rules           = 0&lt;BR /&gt;
   IPV6 Rules          = 0&lt;BR /&gt;
   IPV4 Rules          = 249&lt;BR /&gt;
   L2 Rules            = 175&lt;BR /&gt;
   IPV6 Ingress ACL    = 128&lt;BR /&gt;
   IPV6 PBR            = 0&lt;BR /&gt;
   IPV4 Ingress ACL    = 128&lt;BR /&gt;
   IPV4 PBR            = 128&lt;BR /&gt;
   L2 Ingress ACL      = 0&lt;BR /&gt;
   IPV6 Egress ACL     = 256&lt;BR /&gt;
   IPV4 Egress ACL     = 256&lt;BR /&gt;
   L2 Egress ACL       = 0&lt;BR /&gt;
&lt;BR /&gt;
How can we solve the problem (more accepted entries in the ACL)?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 00:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56771#M878</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-01T00:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56772#M879</link>
      <description>I would suggest consolidating the rule base as much as possible.   There are limited resources allowed for acl's even with the router1 profile selected.  The 7100 was intended as a top of rack switch.&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 00:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56772#M879</guid>
      <dc:creator>Daniel_Coughlin</dc:creator>
      <dc:date>2017-02-01T00:27:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56773#M880</link>
      <description>But why the "show" commands displays 249/1000 possible IPV4 rules and the configuration accepts only 171 rules?&lt;BR /&gt;
&lt;BR /&gt;
Helps to use an profile other than router1?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 00:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56773#M880</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-01T00:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56774#M881</link>
      <description>there is only the default and router1 profiles. &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 00:53:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56774#M881</guid>
      <dc:creator>Daniel_Coughlin</dc:creator>
      <dc:date>2017-02-01T00:53:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56775#M882</link>
      <description>But why the "show" commands displays 249/1000 possible IPV4 rules and the configuration accepts only 171 rules?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 01:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56775#M882</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-01T01:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56776#M883</link>
      <description>Sorry for the issue, you might  be encountering a limmitation  other than the number of acl.  I have one below as an example and  am not saying it is your issue but it is an example.&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Solution/7100-Series-Error-Apply-access-group-failed-ACL-entries-with-UDP-port-ranges-are-not-supported-in-this-platform-mode" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Solution/7100-Series-Error-Apply-access-group-fai...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
Do you get an error message or see an error inthe show logging buffer about the ACL? &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 01:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56776#M883</guid>
      <dc:creator>Luke_French</dc:creator>
      <dc:date>2017-02-01T01:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56777#M884</link>
      <description>these is the error message:&lt;BR /&gt;
&lt;BR /&gt;
TOR(rw-config-intf-vlan.0.1001)-&amp;gt;ip access-group 101 out&lt;BR /&gt;
&lt;BR /&gt;
Apply access-group failed: Insufficient resources to apply access-group&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Feb 2017 01:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56777#M884</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-01T01:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56778#M885</link>
      <description>That error is in the article I posted and caused by using an ACL with UDP port ranges.</description>
      <pubDate>Wed, 01 Feb 2017 01:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56778#M885</guid>
      <dc:creator>Luke_French</dc:creator>
      <dc:date>2017-02-01T01:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56779#M886</link>
      <description>Is there any chance to consolidating these rules:&lt;BR /&gt;
&lt;BR /&gt;
ip access-list extended 101  permit ip host 192.168.1.248 any&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.12.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.240 0.0.0.7 host 192.168.200.201&lt;BR /&gt;
  permit ip 192.168.60.0 0.0.3.255 192.168.60.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.3.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.3.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.4.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.4.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.5.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.5.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 25 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.11.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 25 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.12.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.12.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.12.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.13.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 25 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.50.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.50.0 0.0.0.255 eq 10051&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 10050 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.16.0 0.0.0.255 host 192.168.50.202 eq 1521&lt;BR /&gt;
  permit tcp 192.168.16.0 0.0.0.255 host 192.168.50.208 eq 1521&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 host 192.168.50.208 eq 1521&lt;BR /&gt;
  permit ip 192.168.86.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255 eq 9100&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255 eq 80&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255 eq 443&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 164.26.201.248 0.0.0.7 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.0.255 host 192.168.50.202 eq 22&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.10.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.11.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.12.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.3.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.4.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.5.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.13.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.66.0 0.0.0.255 192.168.65.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.84.0 0.0.0.255 host 192.168.50.20 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.91.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.92.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.93.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.91.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.92.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.93.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.90.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.90.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.91.0 0.0.0.255 eq 3389 any&lt;BR /&gt;
  permit tcp 192.168.92.0 0.0.0.255 eq 3389 any&lt;BR /&gt;
  permit tcp 192.168.97.0 0.0.0.255 eq 3389 any&lt;BR /&gt;
  permit tcp any eq 80 host 192.168.2.11&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.2.11&lt;BR /&gt;
  permit tcp any eq 80 host 192.168.2.19&lt;BR /&gt;
  permit tcp any eq 3101 host 192.168.50.201&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.50.201&lt;BR /&gt;
  permit tcp any eq 3101 host 192.168.50.229&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.50.229&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.50.238&lt;BR /&gt;
  permit tcp any eq 2222 host 192.168.60.254&lt;BR /&gt;
  permit ip host 192.168.200.201 192.168.1.240 0.0.0.7&lt;BR /&gt;
  permit ip host 192.168.200.201 host 192.168.1.249&lt;BR /&gt;
  permit ip host 192.168.200.201 host 192.168.1.252&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.50.0 0.0.0.255 eq 22&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.50.0 0.0.0.255 eq 80&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.50.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 636&lt;BR /&gt;
  permit udp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 636&lt;BR /&gt;
  permit tcp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 7191&lt;BR /&gt;
  permit udp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 7191&lt;BR /&gt;
  permit tcp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 4500&lt;BR /&gt;
  permit udp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 4500&lt;BR /&gt;
  permit ip host 192.168.14.13 host 192.168.50.215&lt;BR /&gt;
  permit ip 10.22.96.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.0.255 host 192.168.50.202 eq 5714&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.255.255 host 192.168.50.212 eq 1158&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.255.255 host 192.168.50.212 eq 5502&lt;BR /&gt;
  permit ip 10.12.7.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit ip 10.12.6.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.1.0 0.0.0.255 eq 123 192.168.60.0 0.0.3.255&lt;BR /&gt;
  permit udp 192.168.1.0 0.0.0.255 eq 123 192.168.60.0 0.0.3.255&lt;BR /&gt;
  deny ip any any&lt;BR /&gt;</description>
      <pubDate>Thu, 02 Feb 2017 00:44:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56779#M886</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-02T00:44:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56780#M887</link>
      <description>Hi Andre,&lt;BR /&gt;
&lt;BR /&gt;
you can combine some of the lines by using a different wildcard mask. An example would be:&lt;BR /&gt;
&lt;BR /&gt;
The two lines&lt;BR /&gt;
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255  permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255  can be combined into&lt;BR /&gt;
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.1.255  Br,&lt;BR /&gt;
Erik</description>
      <pubDate>Thu, 02 Feb 2017 18:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56780#M887</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-02-02T18:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56781#M888</link>
      <description>Great to see you back on the Hub Erik!</description>
      <pubDate>Thu, 02 Feb 2017 18:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56781#M888</guid>
      <dc:creator>Ryan_Mathews</dc:creator>
      <dc:date>2017-02-02T18:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56782#M889</link>
      <description>You may want to double check and/or test this, but here's a shortened ACL (116 lines):&lt;BR /&gt;
&lt;BR /&gt;
  permit ip host 192.168.1.248 any  permit ip 192.168.1.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.12.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.1.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.1.240 0.0.0.7 host 192.168.200.201&lt;BR /&gt;
  permit ip 192.168.60.0 0.0.3.255 192.168.60.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.2.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.2.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.4.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.4.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.10.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.10.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 25 192.168.10.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.11.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.12.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.12.0 0.0.1.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.12.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.13.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 80 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 443 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 25 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.50.0 0.0.0.255 eq 25&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 192.168.50.0 0.0.0.255 eq 10051&lt;BR /&gt;
  permit tcp 192.168.200.0 0.0.0.255 eq 10050 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.16.0 0.0.0.255 host 192.168.50.202 eq 1521&lt;BR /&gt;
  permit tcp 192.168.16.0 0.0.0.255 host 192.168.50.208 eq 1521&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 host 192.168.50.208 eq 1521&lt;BR /&gt;
  permit ip 192.168.86.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255 eq 9100&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255 eq 80&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255 eq 443&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.5.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.5.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 164.26.201.248 0.0.0.7 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.0.255 host 192.168.50.202 eq 22&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.2.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.4.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.10.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.10.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.2.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.4.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.11.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.11.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.11.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.13.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.12.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.12.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.2.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.4.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.10.0 0.0.1.255&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.13.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.13.0 0.0.0.255 192.168.200.0 0.0.0.255&lt;BR /&gt;
  permit ip 192.168.66.0 0.0.0.255 192.168.65.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.84.0 0.0.0.255 host 192.168.50.20 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.91.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.92.0 0.0.1.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.85.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.91.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.92.0 0.0.1.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.88.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit ip 192.168.90.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.90.0 0.0.0.255 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp 192.168.91.0 0.0.0.255 eq 3389 any&lt;BR /&gt;
  permit tcp 192.168.92.0 0.0.0.255 eq 3389 any&lt;BR /&gt;
  permit tcp 192.168.97.0 0.0.0.255 eq 3389 any&lt;BR /&gt;
  permit tcp any eq 80 host 192.168.2.11&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.2.11&lt;BR /&gt;
  permit tcp any eq 80 host 192.168.2.19&lt;BR /&gt;
  permit tcp any eq 3101 host 192.168.50.201&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.50.201&lt;BR /&gt;
  permit tcp any eq 3101 host 192.168.50.229&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.50.229&lt;BR /&gt;
  permit tcp any eq 443 host 192.168.50.238&lt;BR /&gt;
  permit tcp any eq 2222 host 192.168.60.254&lt;BR /&gt;
  permit ip host 192.168.200.201 192.168.1.240 0.0.0.7&lt;BR /&gt;
  permit ip host 192.168.200.201 host 192.168.1.249&lt;BR /&gt;
  permit ip host 192.168.200.201 host 192.168.1.252&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.50.0 0.0.0.255 eq 22&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.50.0 0.0.0.255 eq 80&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.50.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp host 192.168.200.201 192.168.97.0 0.0.0.255 eq 3389&lt;BR /&gt;
  permit tcp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 636&lt;BR /&gt;
  permit udp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 636&lt;BR /&gt;
  permit tcp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 7191&lt;BR /&gt;
  permit udp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 7191&lt;BR /&gt;
  permit tcp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 4500&lt;BR /&gt;
  permit udp host 192.168.200.207 192.168.50.0 0.0.0.255 eq 4500&lt;BR /&gt;
  permit ip host 192.168.14.13 host 192.168.50.215&lt;BR /&gt;
  permit ip 10.22.96.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.0.255 host 192.168.50.202 eq 5714&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.255.255 host 192.168.50.212 eq 1158&lt;BR /&gt;
  permit tcp 10.240.10.0 0.0.255.255 host 192.168.50.212 eq 5502&lt;BR /&gt;
  permit ip 10.12.7.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit ip 10.12.6.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;BR /&gt;
  permit tcp 192.168.1.0 0.0.0.255 eq 123 192.168.60.0 0.0.3.255&lt;BR /&gt;
  permit udp 192.168.1.0 0.0.0.255 eq 123 192.168.60.0 0.0.3.255&lt;BR /&gt;
  deny ip any any&lt;BR /&gt;
&lt;BR /&gt;
Ryan</description>
      <pubDate>Fri, 03 Feb 2017 02:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56782#M889</guid>
      <dc:creator>Careno__Ryan</dc:creator>
      <dc:date>2017-02-03T02:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56783#M890</link>
      <description>THANKS A LOT to all!</description>
      <pubDate>Fri, 03 Feb 2017 14:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56783#M890</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-03T14:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56784#M891</link>
      <description>does somebopdy know why the switch shows:&lt;BR /&gt;
&lt;BR /&gt;
 IPV4 Rules          = 249&lt;BR /&gt;
&lt;BR /&gt;
or&lt;BR /&gt;
&lt;BR /&gt;
Chassis limits:Application                         Limit    In use   Entry size  Total Memory&lt;BR /&gt;
-------------------------------- --------- --------- ------------ ------------&lt;BR /&gt;
access-lists                           256         9         125K        31.3M&lt;BR /&gt;
  access-list-entries                 1000       180         160B       156.4K&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;&lt;I&gt;and we ended at 180 ACL-entries?&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Feb 2017 14:34:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56784#M891</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-20T14:34:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56785#M892</link>
      <description>is there any chance to configure more than 180 ACL-rules? how?</description>
      <pubDate>Thu, 23 Feb 2017 13:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56785#M892</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-23T13:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56786#M893</link>
      <description>With a clean slate configuration (just single l3 interface) and using router-profile 'router1' I was able to create an ACL that had 200 lines in it, however the total amount of ACL lines that can be applied at any given time is not to exceed 128&lt;BR /&gt;
&lt;BR /&gt;
Say you have an ACL that is 24 lines (add 1 due to implicit deny all at the end, so 25).  You can apply that to five layer-3 interfaces (25 * 5 = 125).  If you try applying to a sixth interface, it will jump to 150 applied ACL Lines.  &lt;BR /&gt;
&lt;BR /&gt;
The 7100-Series is limited in it's resources and is more aimed towards top of rack solution for datacenter switching.  A good replacement for DFE S-Series would be an SSA which has the resource for more ACL's and PBR setup. &lt;BR /&gt;
&lt;BR /&gt;
Ryan &lt;BR /&gt;
Extreme Networks</description>
      <pubDate>Fri, 24 Feb 2017 02:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56786#M893</guid>
      <dc:creator>Careno__Ryan</dc:creator>
      <dc:date>2017-02-24T02:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56787#M894</link>
      <description>will try if these can help - but the SSA is´nt an option (not enough 10G-Ports) - can the K-Series work as replacement? which limitations have these?&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 24 Feb 2017 03:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56787#M894</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-24T03:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56789#M896</link>
      <description>we need round about 40 x 1000TX + 12 x 10G + 250 extended ACL...</description>
      <pubDate>Fri, 24 Feb 2017 03:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56789#M896</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-24T03:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56790#M897</link>
      <description>K-Series supports 1000 ACLs, ACL rules 5000, and ACL Rules per ACL 1000. It does have more capability of ACL's, but according to release notes it only supports 12 x 10GB ports. &lt;BR /&gt;
&lt;BR /&gt;
It may be best to contact your Sales rep. and explain the requirements so they can search for the best-fit product for the job.&lt;BR /&gt;
&lt;BR /&gt;
Ryan&lt;BR /&gt;</description>
      <pubDate>Fri, 24 Feb 2017 03:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56790#M897</guid>
      <dc:creator>Careno__Ryan</dc:creator>
      <dc:date>2017-02-24T03:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: 7100-Series / ACL / Access Control List  / Limitations</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56791#M898</link>
      <description>Hi,  &lt;BR /&gt;
yes, we checked - the K-series says for "show limits":&lt;BR /&gt;
Application                         Limit    In use    --------- --------- ------------ ------------&lt;BR /&gt;
access-lists                          1000         9&lt;BR /&gt;
  access-list-entries                 5000       212  &lt;BR /&gt;
but why the 7100 says and we cannot reach these limits:&lt;BR /&gt;
Application                         Limit    In use   &lt;BR /&gt;
-------------------------------- --------- --------- &lt;BR /&gt;
access-lists                           256         9 &lt;BR /&gt;
  access-list-entries                 1000       180           we where very happy if we can reach 1000 access-list-entries!!!&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 24 Feb 2017 14:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/7100-series-acl-access-control-list-limitations/m-p/56791#M898</guid>
      <dc:creator>networks</dc:creator>
      <dc:date>2017-02-24T14:18:00Z</dc:date>
    </item>
  </channel>
</rss>

