<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SecureStack Policy Profile &amp; Rule limitations in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/securestack-policy-profile-rule-limitations/m-p/41530#M58</link>
    <description>Article ID: 5821 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
C3-Series, C2-Series&lt;BR /&gt;
B3-Series, B2-Series&lt;BR /&gt;
B2POL-LIC &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Protocols/Features&lt;/B&gt;&lt;BR /&gt;
Policy&lt;BR /&gt;
CoS&lt;BR /&gt;
IRL&lt;BR /&gt;
Metering&lt;BR /&gt;
UPN &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
SecureStack Policy Profile &amp;amp; Rule limitations&lt;BR /&gt;
Mixed stacking &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
"config mismatch"&lt;BR /&gt;
"% Invalid input detected at '^' marker."&lt;BR /&gt;
"Error, General error!" &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
Policy/CoS is always available on the SecureStack C3 and C2. Policy/CoS may be enabled on the SecureStack B3 and B2 by configuring them with a Policy license (&lt;A href="http://bit.ly/Ig6wNS" target="_blank" rel="nofollow noreferrer noopener"&gt;5781&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
This document summarizes differences in Policy support among these SecureStack lines. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
The policy limitations for the above-stated products and firmware are as follows:&lt;UL&gt; 
&lt;LI&gt;For C3 and B3 (C3G, B3G) units, running f/w 1.00.35 through 1.00.98 (C3G) or f/w 1.00.29 through 1.00.92 (B3G), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules and 768 unique masks per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 100 masks per profile/role; 
&lt;/LI&gt;&lt;LI&gt;no MAC or Ethertype rules[2]; 
&lt;/LI&gt;&lt;LI&gt;no metering[3].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C3 and B3 (C3G, B3G) units, running f/w 1.01.01.0039 through 1.02.06.0004, we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 512 L3/L4 + 128 EtherType + 128 MAC-based unique rules, and 768 unique masks per stack; 
&lt;/LI&gt;&lt;LI&gt;no metering[3].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C3 and B3 (C3G, B3G) units, running f/w 6.03.00.0022 or higher, we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 6 (tunnel mode) or 3 (policy mode, hybrid mode) users per port; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 512 L3/L4 + 128 EtherType + 128 MAC-based unique rules, and unlimited masks per stack. 
&lt;/LI&gt;&lt;LI&gt;no metering[3].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C3/C2 and B3/B2 mixed stacks running C2 or B2 firmware, we impose the more restrictive of the limitations applicable to either the hardware or the firmware[1].&lt;BR /&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 gigabit (C2G, B2G) units, running f/w 5.00.28 through 5.00.83 (C2) or f/w 4.00.22 through 4.00.83 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 48 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1]; 
&lt;/LI&gt;&lt;LI&gt;no MAC or Ethertype rules[2].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 gigabit (C2G, B2G) units, running f/w 5.01.01.0039 through 5.01.06.0007 (C2) or f/w 4.01.01.0039 through 4.01.06.0007 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 48 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 gigabit (C2G, B2G) units, running f/w 5.02.01.0006 or higher (C2) or f/w 4.02.01.0006 or higher (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 255 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 10 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 fast ethernet (C2H, B2H) units, running f/w 5.00.28 through 5.00.83 (C2) or f/w 4.00.22 through 4.00.83 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 18 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1]; 
&lt;/LI&gt;&lt;LI&gt;no MAC, Ethertype, or ICMP rules[2].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 fast ethernet (C2H, B2H) units running f/w 5.01.01.0039 through 5.01.06.0007 (C2) or f/w 4.01.01.0039 through 4.01.06.0007 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 18 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 fast ethernet (C2H, B2H) units, running f/w 5.02.01.0006 or higher (C2) or f/w 4.02.01.0006 or higher (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 255 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 18 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
[&lt;B&gt;1&lt;/B&gt;]Except for what is stated below as metering guidelines[3], the limitations of an entire running (possibly mixed: &lt;A href="http://bit.ly/1cGWsHh" target="_blank" rel="nofollow noreferrer noopener"&gt;5834&lt;/A&gt;) stack can be no less than the constraints applicable to the lowest-capacity unit in the stack. If a unit is added to an already-running stack, the configurations are checked before applying Policy rules. If the added unit cannot handle the installed policies on the stack, a "config mismatch" will occur, and a message in syslog will indicate the reason. &lt;BR /&gt;
&lt;BR /&gt;
[&lt;B&gt;2&lt;/B&gt;]Attempting to code a disallowed rule type results in an error message: either "% Invalid input detected at '^' marker." (C3/B3 firmware) or "Error, General error!" (C2/B2 firmware). &lt;BR /&gt;
&lt;BR /&gt;
[&lt;B&gt;3&lt;/B&gt;] "Metering" here is synonymous with "rule-based Inbound Rate Limiting". On the C3/B3, Inbound Rate limiting will only be applied if associated with a profile/role, yielding a single limiter for all of a profile's traffic. IRLs associated with a profile's underlying rules will be ignored on C3/B3 ports, but will function as expected on C2/B2 ports even in a mixed stack. An IRL is in all cases applied via a referenced cos (Class of Service). &lt;BR /&gt;
&lt;BR /&gt;
A "unique rule" is one which is distinctive after removing the role index reference.&lt;BR /&gt;
A "unique mask" is one which presents a distinctive combination of rule type and mask length. To this list is added one additional unique mask to accommodate "Role Default Actions". &lt;BR /&gt;
&lt;BR /&gt;
You may also refer to the product Datasheets: &lt;A href="https://extranet.enterasys.com/downloads/pages/C3.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;C3&lt;/A&gt; / &lt;A href="https://extranet.enterasys.com/downloads/pages/B3.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;B3&lt;/A&gt;.&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Thu, 21 Nov 2013 07:25:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-11-21T07:25:00Z</dc:date>
    <item>
      <title>SecureStack Policy Profile &amp; Rule limitations</title>
      <link>https://community.extremenetworks.com/t5/faqs/securestack-policy-profile-rule-limitations/m-p/41530#M58</link>
      <description>Article ID: 5821 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
C3-Series, C2-Series&lt;BR /&gt;
B3-Series, B2-Series&lt;BR /&gt;
B2POL-LIC &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Protocols/Features&lt;/B&gt;&lt;BR /&gt;
Policy&lt;BR /&gt;
CoS&lt;BR /&gt;
IRL&lt;BR /&gt;
Metering&lt;BR /&gt;
UPN &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
SecureStack Policy Profile &amp;amp; Rule limitations&lt;BR /&gt;
Mixed stacking &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
"config mismatch"&lt;BR /&gt;
"% Invalid input detected at '^' marker."&lt;BR /&gt;
"Error, General error!" &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
Policy/CoS is always available on the SecureStack C3 and C2. Policy/CoS may be enabled on the SecureStack B3 and B2 by configuring them with a Policy license (&lt;A href="http://bit.ly/Ig6wNS" target="_blank" rel="nofollow noreferrer noopener"&gt;5781&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
This document summarizes differences in Policy support among these SecureStack lines. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
The policy limitations for the above-stated products and firmware are as follows:&lt;UL&gt; 
&lt;LI&gt;For C3 and B3 (C3G, B3G) units, running f/w 1.00.35 through 1.00.98 (C3G) or f/w 1.00.29 through 1.00.92 (B3G), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules and 768 unique masks per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 100 masks per profile/role; 
&lt;/LI&gt;&lt;LI&gt;no MAC or Ethertype rules[2]; 
&lt;/LI&gt;&lt;LI&gt;no metering[3].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C3 and B3 (C3G, B3G) units, running f/w 1.01.01.0039 through 1.02.06.0004, we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 512 L3/L4 + 128 EtherType + 128 MAC-based unique rules, and 768 unique masks per stack; 
&lt;/LI&gt;&lt;LI&gt;no metering[3].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C3 and B3 (C3G, B3G) units, running f/w 6.03.00.0022 or higher, we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 6 (tunnel mode) or 3 (policy mode, hybrid mode) users per port; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 512 L3/L4 + 128 EtherType + 128 MAC-based unique rules, and unlimited masks per stack. 
&lt;/LI&gt;&lt;LI&gt;no metering[3].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C3/C2 and B3/B2 mixed stacks running C2 or B2 firmware, we impose the more restrictive of the limitations applicable to either the hardware or the firmware[1].&lt;BR /&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 gigabit (C2G, B2G) units, running f/w 5.00.28 through 5.00.83 (C2) or f/w 4.00.22 through 4.00.83 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 48 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1]; 
&lt;/LI&gt;&lt;LI&gt;no MAC or Ethertype rules[2].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 gigabit (C2G, B2G) units, running f/w 5.01.01.0039 through 5.01.06.0007 (C2) or f/w 4.01.01.0039 through 4.01.06.0007 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 48 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 768 unique rules per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 gigabit (C2G, B2G) units, running f/w 5.02.01.0006 or higher (C2) or f/w 4.02.01.0006 or higher (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 255 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 10 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 fast ethernet (C2H, B2H) units, running f/w 5.00.28 through 5.00.83 (C2) or f/w 4.00.22 through 4.00.83 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 18 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1]; 
&lt;/LI&gt;&lt;LI&gt;no MAC, Ethertype, or ICMP rules[2].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 fast ethernet (C2H, B2H) units running f/w 5.01.01.0039 through 5.01.06.0007 (C2) or f/w 4.01.01.0039 through 4.01.06.0007 (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 15 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 18 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules and 10 masks per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
&lt;/LI&gt;&lt;LI&gt;For C2 and B2 fast ethernet (C2H, B2H) units, running f/w 5.02.01.0006 or higher (C2) or f/w 4.02.01.0006 or higher (B2), we impose&lt;UL&gt; 
&lt;LI&gt;a maximum of 2 policy users per port (User+IP Phone); 
&lt;/LI&gt;&lt;LI&gt;a maximum of 255 profiles/roles per stack; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 unique rules and 18 unique masks per stack[1]; 
&lt;/LI&gt;&lt;LI&gt;a maximum of 100 rules per profile/role[1].&lt;/LI&gt;&lt;/UL&gt;
[&lt;B&gt;1&lt;/B&gt;]Except for what is stated below as metering guidelines[3], the limitations of an entire running (possibly mixed: &lt;A href="http://bit.ly/1cGWsHh" target="_blank" rel="nofollow noreferrer noopener"&gt;5834&lt;/A&gt;) stack can be no less than the constraints applicable to the lowest-capacity unit in the stack. If a unit is added to an already-running stack, the configurations are checked before applying Policy rules. If the added unit cannot handle the installed policies on the stack, a "config mismatch" will occur, and a message in syslog will indicate the reason. &lt;BR /&gt;
&lt;BR /&gt;
[&lt;B&gt;2&lt;/B&gt;]Attempting to code a disallowed rule type results in an error message: either "% Invalid input detected at '^' marker." (C3/B3 firmware) or "Error, General error!" (C2/B2 firmware). &lt;BR /&gt;
&lt;BR /&gt;
[&lt;B&gt;3&lt;/B&gt;] "Metering" here is synonymous with "rule-based Inbound Rate Limiting". On the C3/B3, Inbound Rate limiting will only be applied if associated with a profile/role, yielding a single limiter for all of a profile's traffic. IRLs associated with a profile's underlying rules will be ignored on C3/B3 ports, but will function as expected on C2/B2 ports even in a mixed stack. An IRL is in all cases applied via a referenced cos (Class of Service). &lt;BR /&gt;
&lt;BR /&gt;
A "unique rule" is one which is distinctive after removing the role index reference.&lt;BR /&gt;
A "unique mask" is one which presents a distinctive combination of rule type and mask length. To this list is added one additional unique mask to accommodate "Role Default Actions". &lt;BR /&gt;
&lt;BR /&gt;
You may also refer to the product Datasheets: &lt;A href="https://extranet.enterasys.com/downloads/pages/C3.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;C3&lt;/A&gt; / &lt;A href="https://extranet.enterasys.com/downloads/pages/B3.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;B3&lt;/A&gt;.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 21 Nov 2013 07:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/securestack-policy-profile-rule-limitations/m-p/41530#M58</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-11-21T07:25:00Z</dc:date>
    </item>
  </channel>
</rss>

