Command Line Reference
Reliability Configuration
IP-Conflict Configuration
6 min
show ip conflict detect config show ip conflict detect config \[command] show ip conflict detect config \[purpose] display the ip address conflict detection configuration \[view] system view \[use cases] sonic# show ip conflict detect config enabled\ true max records 2000 + + \| interface | +=============+ \| ethernet1 | + + \| ethernet11 | + + show ip conflict detect status show ip conflict detect status \[command] show ip conflict detect status \[purpose] display the ip address conflict detection entries \[view] system view \[use cases] sonic# show ip conflict detect status + + + + + + \| interface | self ip | self mac | conflict mac | timestamp | +=============+===========+===================+===================+=====================+ \| ethernet1 | 10 1 1 1 | 86 15 7d\ dc 3d 86 | 00 00 02 01 01 04 | 2024 09 02 11 06 46 | \| | | | 00 00 02 01 01 02 | 2024 09 02 10 59 54 | + + + + + + \| ethernet11 | 20 1 1 1 | 86 15 7d\ dc 3d 86 | 60\ eb 5a 01 10\ cb | 2024 09 02 11 05 10 | + + + + + + + + + + + + \| interface | neigh ip | neigh mac | conflict mac | timestamp | +=============+============+=============+================+=============+ show ip conflict detect status this command display description table show ip conflict detect status this command display description table true 137,524#2166ae #4283c7 unhandled content type #2166ae #4283c7 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type ip conflict detect enable ip conflict detect enable \[command] ip conflict detect enable \[purpose] enable ip address conflict detection; it is disabled by default \[view] system configuration view \[usage scenario] in scenarios where devices in a network experience ip address conflicts, this can lead to frequent oscillations in arp and routing table entries, significantly impacting business operations to mitigate the effects of such conflicts, enabling ip address conflict detection helps log these events as alerts this allows administrators to quickly identify and address the issues, minimizing disruption to network services and improving overall stability \[notes] after enabling the global ip address conflict detection feature, you also need to enable ip address conflict detection at the interface and vlan view if there is an ip conflict on an interface, the device will continue to use that ip address, log a warning message to syslog, and record it in the address conflict table, while responding to gratuitous arp or na messages if there is a neighbor table conflict, a warning message will be logged to syslog, and it will be recorded in the address conflict table \[use cases] sonic(config)# interface ethernet 1 sonic(config if 1)# ip conflict detect enable ip conflict detect max records ip conflict detect max records \[command] ip conflict detect max records number \[purpose] configure the global conflict record limit \[parameter] true 157,504#2166ae #4283c7 unhandled content type #2166ae #4283c7 unhandled content type unhandled content type unhandled content type \[view] system configuration view \[notes] the default maximum number of ip addresses is 2000, with each ip corresponding to 10 mac addresses if the limit is exceeded, the oldest entries will be overwritten \[use cases] sonic(config)# ip conflict detect max records 20 ip conflict detect reset ip conflict detect reset \[command] ip conflict detect reset \[purpose] forcefully clear all ip conflict detection records \[view] system configuration view \[notes] when deleting a layer 3 interface or ip address, the associated conflict record entries will also be deleted \[use cases] sonic(config)# ip conflict detect reset
