Command Line Reference
Security Configuration
MAC Detection Configuration
7 min
show mac scan config show mac scan config \[command] show mac scan config \[purpose] show mac scan configuration \[view] system view \[use cases] sonic# show mac scan config status\ disabled period 10 checkneigh\ enabled remote\ disabled + + \| interface | +=============+ \| vlan200 | + + mac scan enable mac scan enable \[command] mac scan enable no mac scan enable \[purpose] enable mac detection function \[view] system configuration view, vlan view \[comment] enabling this feature allows sending arp request packets based on snooping entries, user bind entries, and arp entries with corresponding ip addresses this is often used for scenarios such as bringing dumb terminals or servers online it helps proactively update the device's mac and arp table entries \[use cases] sonic(config)# mac scan enable mac scan remote enable mac scan remote enable \[command] mac scan remote enable no mac scan remote enable \[purpose] enable mac remote terminal detection function \[view] system configuration view \[usage scenario] by default, the detection process only operates on ip addresses in the snooping table with the "local" attribute when remote devices update their table entries, the update information might not be transmitted to this device in a timely manner due to the large scale network topology, resulting in potential loss of device traffic enabling this configuration can help expedite the onboarding process for terminals when they migrate to new devices \[use cases] sonic(config)# mac scan remote enable mac scan no response delete mac scan no response delete \[command] mac scan no response delete no mac scan no response delete \[purpose] enables the ability to delete snooping entries based on the results of mac probes \[usage scenario] by default, the device only deletes the snooping table entry when it receives a release message from the terminal enabling this feature allows the device to delete entries for which the type is "local" if it doesn't receive a response after three detections \[use cases] sonic(config)# mac scan no response delete mac scan period mac scan period \[command] mac scan period time \[purpose] configure the interval for sending probe packets \[parameter] parameter description time value range 1, 1000, unit ms \[view] system configuration view \[comment] the default time interval is 10ms \[use cases] sonic(config)# mac scan period 1000 mac scan ip ranges mac scan ip ranges \[command] mac scan ip ranges string \[purpose] configure terminal detection based on subnet \[parameter] parameter description ip range e g a1 b1 c1 d1 a2 b2 c2 d2 ip range within subnet e g a1 b1 c1 d1/m a2 b2 c2 d2/m ip subnet e g a1 b1 c1 d1/m single ip e g a1 b1 c1 d1 \[view] vlan view \[comment] when this configuration coexists with the snp table, scan the ips one by one in intervals, with each snp followed by an ip range from the subnet if a new snp table is generated, prioritize scanning the new snp table entries \[use cases] sonic(config)# vlan 20 sonic(config vlan 20)# mac scan ip ranges 10 1 1 2
