ACL Mechanisms
For many applications of
ACL (Access Control List)s, it is not
necessary to know the details of how ACLs work. However, if you find that your application of
ACLs is constrained by hardware limitations, you can often rearrange the ACLs to use the
hardware more efficiently. The following sections go into some detail about how the ACLs use
hardware resources, and provide some suggestions about how to reorder or rewrite ACLs to use
fewer resources.