Command Line Reference
Security Configuration
MAC Detection Configuration
9 min
show mac scan config show mac scan config \[command] show mac scan config \[purpose] display mac scan configuration \[view] system view \[use cases] sonic# show mac scan config status\ disabled period 10 checkneigh\ enabled remote\ disabled + + \| interface | +=============+ \| vlan200 | + + mac scan enable mac scan enable \[command] mac scan enable no mac scan enable \[purpose] enable mac detection function \[view] system configuration view, vlan view \[notes] enabling this feature allows sending arp request packets based on snooping entries, user bind entries, and arp entries with corresponding ip addresses this is often used for scenarios such as bringing dumb terminals or servers online it helps proactively update the device's mac and arp table entries \[use cases] sonic(config)# mac scan enable mac scan remote enable mac scan remote enable \[command] mac scan remote enable no mac scan remote enable \[purpose] enable mac remote terminal detection function \[view] system configuration view \[usage scenario] by default, the detection process only operates on ip addresses in the snooping table with the "local" attribute when remote devices update their table entries, the update information might not be transmitted to this device in a timely manner due to the large scale network topology, resulting in potential loss of device traffic enabling this configuration can help expedite the onboarding process for terminals when they migrate to new devices \[use cases] sonic(config)# mac scan remote enable mac scan no response delete mac scan no response delete \[command] mac scan no response delete no mac scan no response delete \[purpose] enables the ability to delete snooping entries based on the results of mac probes \[view] system configuration view \[usage scenario] by default, the device only deletes the snooping table entry when it receives a release message from the terminal enabling this feature allows the device to delete entries for which the type is "local" if it doesn't receive a response after three detections \[use cases] sonic(config)# mac scan no response delete mac scan period mac scan period \[command] mac scan period period \[purpose] configure the interval for sending probe packets \[parameter] parameter description period value range 1, 1000, unit ms, deault 10 \[view] system configuration view \[notes] the default time interval is 10ms \[use cases] sonic(config)# mac scan period 1000 mac scan ip ranges mac scan ip ranges \[command] mac scan ip ranges string \[purpose configure terminal detection based on subnet \[parameter] parameter description ip range for example 80 0 0 1 90 0 0 2 ip range within subnet for example 91 0 0 1/24 91 0 0 5/24 ip subnet for example 92 0 0 3/24 single ip for example 93 0 0 2 \[view] vlan view \[notes] when this configuration coexists with the snp table, scan the ips one by one in intervals, with each snp followed by an ip range from the subnet if a new snp table is generated, prioritize scanning the new snp table entries \[use cases] sonic(config)# vlan 20 sonic(config vlan 20)# mac scan ip ranges 10 1 1 2
