ARP Commands

show ip arp

show ip arp
import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
    "ins_api":	{
        "type":	"cli_show",
        "version":	"1.2",
        "sid":	"eoc",
        "outputs":	{
            "output":	{
                "input":	"show ip arp",
                "msg":	"Success",
                "code":	"200",
                "body":	{
                    "TABLE_vrf":	{
                        "ROW_vrf":	{
                            "vrf-name-out":	"default",
                            "cnt-total":	1,
                            "TABLE_adj":	{
                                "ROW_adj":	{
                                    "intf-out":	"Ethernet3/2",
                                    "ip-addr-out":	"113.0.1.1",
                                    "time-stamp":	"00:01:52",
                                    "mac":	"18ef.63e7.1dc2"
                                }
                            }
                        }
                    }
                }
            }
        }
    }
}

To display information about NVE interface, use the show ip arp command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).

CLI Output

switch# **show ip arp**

Flags: * - Adjacencies learnt on non-active FHRP router
       + - Adjacencies synced via CFSoE
       # - Adjacencies Throttled for Glean
       D - Static Adjacencies attached to down interface
IP ARP Table for context default
Total number of entries: 1
Address         Age       MAC Address     Interface
113.0.1.1       00:18:44  18ef.63e7.1dc2  Ethernet3/2

show ip arp detail

show ip arp detail

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp detail",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ip arp detail",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out": "default",
              "cnt-total": 1,
              "TABLE_adj": {
                "ROW_adj": {
                  "intf-out": "Ethernet3/2",
                  "ip-addr-out": "113.0.1.1",
                  "time-stamp": "00:10:15",
                  "mac": "18ef.63e7.1dc2",
                  "phy-intf": "Ethernet3/2"
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_vrf>
         <ROW_vrf>
          <vrf-name-out>default</vrf-name-out>
          <cnt-total>1</cnt-total>
          <TABLE_adj>
           <ROW_adj>
            <intf-out>Ethernet3/2</intf-out>
            <ip-addr-out>113.0.1.1</ip-addr-out>
            <time-stamp>00:09:52</time-stamp>
            <mac>18ef.63e7.1dc2</mac>
            <phy-intf>Ethernet3/2</phy-intf>
           </ROW_adj>
          </TABLE_adj>
         </ROW_vrf>
        </TABLE_vrf>
       </body>
      <input>sh ip arp detail</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about detailed ARP table, use the show ip arp detail command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp detail**

leaf0# sh ip arp detail

Flags: * - Adjacencies learnt on non-active FHRP router + - Adjacencies synced via CFSoE # - Adjacencies Throttled for Glean

IP ARP Table for context default Total number of entries: 1 Address Age MAC Address Interface Physical Interface 113.0.1.1 00:09:23 18ef.63e7.1dc2 Ethernet3/2 Ethernet3/2

show ip arp detail vrf management

show ip arp detail vrf management 
import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp detail vrf management",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

```PYTHON
{
    "ins_api":	{
        "type":	"cli_show",
        "version":	"1.2",
        "sid":	"eoc",
        "outputs":	{
            "output":	{
                "input":	"show ip arp detail vrf management",
                "msg":	"Success",
                "code":	"200",
                "body":	{
                    "TABLE_vrf":	{
                        "ROW_vrf":	{
                            "vrf-name-out":	"management",
                            "cnt-total":	2,
                            "TABLE_adj":	{
                                "ROW_adj":	[{
                                        "intf-out":	"mgmt0",
                                        "ip-addr-out":	"10.77.143.1",
                                        "time-stamp":	"00:00:10",
                                        "mac":	"0000.0c9f.f0d3",
                                        "phy-intf":	"mgmt0"
                                    }, {
                                        "intf-out":	"mgmt0",
                                        "ip-addr-out":	"10.77.143.3",
                                        "time-stamp":	"00:00:23",
                                        "mac":	"5087.894c.abc1",
                                        "phy-intf":	"mgmt0"
                                    }]
                            }
                        }
                    }
                }
            }
        }
    }
}

To display ARP information about VRF interface, use the show ip arp detail vrf management command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).

CLI Output

switch# **show ip arp detail vrf management**

Flags: * - Adjacencies learnt on non-active FHRP router
       + - Adjacencies synced via CFSoE
       # - Adjacencies Throttled for Glean

IP ARP Table for context management Total number of entries: 2 Address Age MAC Address Interface Physical Interface 10.77.143.1 00:00:24 0000.0c9f.f0d3 mgmt0 mgmt0 10.77.143.3 00:00:32 5087.894c.abc1 mgmt0 mgmt0

show ip arp vrf test

show ip arp vrf test
import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp vrf test",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
    "ins_api":	{
        "type":	"cli_show",
        "version":	"1.2",
        "sid":	"eoc",
        "outputs":	{
            "output":	{
                "input":	"show ip arp vrf test",
                "msg":	"Success",
                "code":	"200",
                "body":	{
                    "TABLE_vrf":	{
                        "ROW_vrf":	{
                            "vrf-name-out":	"test",
                            "cnt-total":	1,
                            "TABLE_adj":	{
                                "ROW_adj":	{
                                    "intf-out":	"Ethernet9/20",
                                    "ip-addr-out":	"34.1.1.1",
                                    "time-stamp":	"00:17:03",
                                    "mac":	"8c60.4ff8.60fc"
                                }
                            }
                        }
                    }
                }
            }
        }
    }
}

To view the virtual routing and forwarding (VRF) instance in the Address Resolution Protocol (ARP) cache table, use the show ip arp vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).

CLI Output

switch# **show ip arp vrf test**

Flags: * - Adjacencies learnt on non-active FHRP router
       + - Adjacencies synced via CFSoE
       # - Adjacencies Throttled for Glean
       D - Static Adjacencies attached to down interface

IP ARP Table for context test Total number of entries: 1 Address Age MAC Address Interface 34.1.1.1 00:01:57 8c60.4ff8.60fc Ethernet9/20

show ip arp vrf management

show ip arp vrf management
import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp vrf management",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
    "ins_api":	{
        "type":	"cli_show",
        "version":	"1.2",
        "sid":	"eoc",
        "outputs":	{
            "output":	{
                "input":	"show ip arp vrf management",
                "msg":	"Success",
                "code":	"200",
                "body":	{
                    "TABLE_vrf":	{
                        "ROW_vrf":	{
                            "vrf-name-out":	"management",
                            "cnt-total":	2,
                            "TABLE_adj":	{
                                "ROW_adj":	[{
                                        "intf-out":	"mgmt0",
                                        "ip-addr-out":	"10.77.143.1",
                                        "time-stamp":	"00:00:10",
                                        "mac":	"0000.0c9f.f0d3"
                                    }, {
                                        "intf-out":	"mgmt0",
                                        "ip-addr-out":	"10.77.143.3",
                                        "time-stamp":	"00:00:23",
                                        "mac":	"5087.894c.abc1"
                                    }]
                            }
                        }
                    }
                }
            }
        }
    }
}

To view which virtual routing and forwarding (VRF) instance in the Address Resolution Protocol (ARP) cache table, use the show ip arp vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).

CLI Output

switch# **show ip arp vrf management**

Flags: * - Adjacencies learnt on non-active FHRP router
       + - Adjacencies synced via CFSoE
       # - Adjacencies Throttled for Glean
       D - Static Adjacencies attached to down interface

IP ARP Table for context management Total number of entries: 2 Address Age MAC Address Interface 10.77.143.1 00:00:24 0000.0c9f.f0d3 mgmt0 10.77.143.3 00:00:33 5087.894c.abc1 mgmt0

show ip arp sync-entries vrf

show ip arp sync-entries  vrf

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp sync-entries vrf",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ip arp sync-entries  vrf all",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out": "all",
              "TABLE_adj": {
                "ROW_adj": {
                  "intf-out": "Bdi410",
                  "ip-addr-out": "41.1.1.11",
                  "time-stamp": "00:00:49",
                  "mac": "0000.1111.1410"
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_vrf>
         <ROW_vrf>
          <vrf-name-out>all</vrf-name-out>
          <TABLE_adj>
           <ROW_adj>
            <intf-out>Bdi410</intf-out>
            <ip-addr-out>41.1.1.11</ip-addr-out>
            <time-stamp>00:01:06</time-stamp>
            <mac>0000.1111.1410</mac>
           </ROW_adj>
          </TABLE_adj>
         </ROW_vrf>
        </TABLE_vrf>
       </body>
      <input>sh ip arp sync-entries  vrf all</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display the Address Resolution Protocol (ARP) table information after an ARP table synchronization, use the show ip arp sync-entries vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp sync-entries vrf**

eaf0# sh ip arp sync-entries  vrf all

Flags: D - Static Adjacencies attached to down interface

IP ARP Table for all contexts Address Age MAC Address Interface 41.1.1.11 00:00:15 0000.1111.1410 Bdi410

show ip arp summary vrf

show ip arp summary vrf

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp summary vrf",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ip arp summary vrf all",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out": "all",
              "cnt-resolved": 6,
              "cnt-incomplete": 0,
              "cnt-thrtld-incomplete": 0,
              "cnt-unknown": 0,
              "cnt-total": 6
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_vrf>
         <ROW_vrf>
          <vrf-name-out>all</vrf-name-out>
          <cnt-resolved>6</cnt-resolved>
          <cnt-incomplete>0</cnt-incomplete>
          <cnt-thrtld-incomplete>0</cnt-thrtld-incomplete>
          <cnt-unknown>0</cnt-unknown>
          <cnt-total>6</cnt-total>
         </ROW_vrf>
        </TABLE_vrf>
       </body>
      <input>sh ip arp summary vrf all</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about the MPLS TE explicit paths, use the show ip arp summary vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp summary vrf**

IP ARP Table - Adjacency Summary

Resolved : 6 Incomplete : 0 (Throttled : 0) Unknown : 0 Total : 6

show ip arp statistics

show ip arp statistics

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp statistics",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ip arp statistics",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out1": "default",
              "TABLE_stat": {
                "ROW_stat": {
                  "tx-total": 7,
                  "tx-req": 4,
                  "tx-reply": 1,
                  "tx-req-l2": 0,
                  "tx-reply-l2": 0,
                  "tx-grat": 2,
                  "tx-tunnel": 0,
                  "tx-drop": 0,
                  "tx-mbuf-fail": 0,
                  "tx-ctxt-not-crtd": 0,
                  "tx-bad-ctxt-id": 0,
                  "tx-invalid-ifindex": 0,
                  "tx-invalid-sip": 0,
                  "tx-invalid-dip": 0,
                  "tx-own-ip": 2,
                  "tx-unattached-ip": 2,
                  "tx-adj-create-fail": 0,
                  "tx-null-sip": 0,
                  "tx-null-smac": 0,
                  "tx-client-enq-fail": 0,
                  "tx-dest-unreachable": 0,
                  "tx-enhanced-proxy-dest-unreachable": 0,
                  "tx-l2-port-dest-unreachable": 0,
                  "tx-invalid-local-proxy": 0,
                  "tx-invalid-proxy": 0,
                  "tx-vip-not-active": 0,
                  "rx-total": 0,
                  "rx-req": 3,
                  "rx-reply": 2,
                  "rx-req-l2": 0,
                  "rx-reply-l2": 0,
                  "rx-proxy": 0,
                  "rx-local-proxy": 0,
                  "rx-enhanced-proxy": 0,
                  "rx-enhanced-proxy-anycast": 0,
                  "rx-enhanced-proxy-l2port-track": 0,
                  "rx-tunnel": 0,
                  "rx-fastpath": 0,
                  "rx-snoop": 0,
                  "rx-drop": 4,
                  "rx-srvrport": 0,
                  "bad-if": 0,
                  "bad-len": 0,
                  "invalid-prot": 0,
                  "invalid-hrd-type": 0,
                  "invalid-ctxt": 0,
                  "ctxt-not-crtd": 0,
                  "invalid-l2": 0,
                  "invalid-l3": 0,
                  "invalid-sip": 0,
                  "our-sip": 0,
                  "arp-if-no-mem": 0,
                  "subnet-mismatch": 0,
                  "dir-bcast": 0,
                  "invalid-dip": 0,
                  "non-local-dst": 0,
                  "non-active-fhrp": 0,
                  "invalid-smac": 0,
                  "our-smac": 0,
                  "not-init": 0,
                  "l2-prxy-en": 0,
                  "l2-port-untrusted": 0,
                  "stdby-fhrp-vip": 0,
                  "grat-prxy-en": 0,
                  "arp-req-ignore": 0,
                  "l2-intf": 0,
                  "l2fm-query-fail": 0,
                  "tunnel_fail": 0,
                  "incomplete-drop-count": 0,
                  "recv-glean-count": 5,
                  "adds": 1,
                  "dels": 0,
                  "timeouts": 0
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
           <TABLE_vrf>
            <ROW_vrf>
             <vrf-name-out1>default</vrf-name-out1>
             <TABLE_stat>
              <ROW_stat>
               <tx-total>8</tx-total>
               <tx-req>4</tx-req>
               <tx-reply>2</tx-reply>
               <tx-req-l2>0</tx-req-l2>
               <tx-reply-l2>0</tx-reply-l2>
               <tx-grat>2</tx-grat>
               <tx-tunnel>0</tx-tunnel>
               <tx-drop>0</tx-drop>
               <tx-mbuf-fail>0</tx-mbuf-fail>
               <tx-ctxt-not-crtd>0</tx-ctxt-not-crtd>
               <tx-bad-ctxt-id>0</tx-bad-ctxt-id>
               <tx-invalid-ifindex>0</tx-invalid-ifindex>
               <tx-invalid-sip>0</tx-invalid-sip>
               <tx-invalid-dip>0</tx-invalid-dip>
               <tx-own-ip>2</tx-own-ip>
               <tx-unattached-ip>2</tx-unattached-ip>
               <tx-adj-create-fail>0</tx-adj-create-fail>
               <tx-null-sip>0</tx-null-sip>
               <tx-null-smac>0</tx-null-smac>
               <tx-client-enq-fail>0</tx-client-enq-fail>
               <tx-dest-unreachable>0</tx-dest-unreachable>
               <tx-enhanced-proxy-dest-unreachable>0</tx-enhanced-proxy-dest-unreachable>
               <tx-l2-port-dest-unreachable>0</tx-l2-port-dest-unreachable>
               <tx-invalid-local-proxy>0</tx-invalid-local-proxy>
               <tx-invalid-proxy>0</tx-invalid-proxy>
               <tx-vip-not-active>0</tx-vip-not-active>
               <rx-total>0</rx-total>
               <rx-req>4</rx-req>
               <rx-reply>2</rx-reply>
               <rx-req-l2>0</rx-req-l2>
               <rx-reply-l2>0</rx-reply-l2>
               <rx-proxy>0</rx-proxy>
               <rx-local-proxy>0</rx-local-proxy>
               <rx-enhanced-proxy>0</rx-enhanced-proxy>
               <rx-enhanced-proxy-anycast>0</rx-enhanced-proxy-anycast>
               <rx-enhanced-proxy-l2port-track>0</rx-enhanced-proxy-l2port-track>
               <rx-tunnel>0</rx-tunnel>
               <rx-fastpath>0</rx-fastpath>
               <rx-snoop>0</rx-snoop>
               <rx-drop>4</rx-drop>
               <rx-srvrport>0</rx-srvrport>
               <bad-if>0</bad-if>
               <bad-len>0</bad-len>
               <invalid-prot>0</invalid-prot>
               <invalid-hrd-type>0</invalid-hrd-type>
               <invalid-ctxt>0</invalid-ctxt>
               <ctxt-not-crtd>0</ctxt-not-crtd>
               <invalid-l2>0</invalid-l2>
               <invalid-l3>0</invalid-l3>
               <invalid-sip>0</invalid-sip>
               <our-sip>0</our-sip>
               <arp-if-no-mem>0</arp-if-no-mem>
               <subnet-mismatch>0</subnet-mismatch>
               <dir-bcast>0</dir-bcast>
               <invalid-dip>0</invalid-dip>
               <non-local-dst>0</non-local-dst>
               <non-active-fhrp>0</non-active-fhrp>
               <invalid-smac>0</invalid-smac>
               <our-smac>0</our-smac>
               <not-init>0</not-init>
               <l2-prxy-en>0</l2-prxy-en>
               <l2-port-untrusted>0</l2-port-untrusted>
               <stdby-fhrp-vip>0</stdby-fhrp-vip>
               <grat-prxy-en>0</grat-prxy-en>
               <arp-req-ignore>0</arp-req-ignore>
               <l2-intf>0</l2-intf>
               <l2fm-query-fail>0</l2fm-query-fail>
               <tunnel_fail>0</tunnel_fail>
               <incomplete-drop-count>0</incomplete-drop-count>
               <recv-glean-count>5</recv-glean-count>
               <adds>1</adds>
               <dels>0</dels>
               <timeouts>0</timeouts>
              </ROW_stat>
             </TABLE_stat>
            </ROW_vrf>
           </TABLE_vrf>
          </body>
      <input>sh ip arp statistics</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display the Address Resolution Protocol (ARP) table statistics, use the show ip arp statistics command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp statistics**

leaf0# sh ip arp statistics 
ARP State Machine Stats     

ARP packet statistics for context default Sent:
Total 7, Requests 4, Replies 1, Requests on L2 0, Replies on L2 0, Gratuitous 2, Tunneled 0, Dropped 0
Send packet drops details:
MBUF operation failed : 0
Context not yet created : 0
Invalid context : 0
Invalid ifindex : 0
Invalid SRC IP : 0
Invalid DEST IP : 0
Destination is our own IP : 2
Unattached IP : 2
Adjacency Couldn't be added : 0
Null Source IP : 0
Null Source MAC : 0
Client Enqueue Failed : 0
Dest. not reachable for proxy arp : 0
Dest. unreachable for enhanced proxy: 0
Dest. on L2 port being tracked : 0
Invalid Local proxy arp : 0
Invalid proxy arp : 0
VIP is not active : 0
Received:
Total 0, Requests 3, Replies 2, Requests on L2 0, Replies on L2 0 Proxy arp 0, Local-Proxy arp 0, Enhanced Proxy arp 0, Anycast proxy Proxy arp 0, L2 Port-track Proxy arp 0, Tunneled 0, Fastpath 0, Snooped 0, Dropped 4, on Server Port 0
Received packet drops details:
Appeared on a wrong interface : 0
Incorrect length : 0
Invalid protocol packet : 0
Invalid Hardware type : 0
Invalid context : 0 Context not yet created : 0 Invalid layer 2 address length : 0 Invalid layer 3 address length : 0 Invalid source IP address : 0 Source IP address is our own : 0 No mem to create per intf structure : 0 Source address mismatch with subnet : 0 Directed broadcast source : 0 Invalid destination IP address : 0 Non-local destination IP address : 0 Non-active FHRP dest IP address. Learn and drop : 0 Invalid source MAC address : 0 Source MAC address is our own : 0 Received before arp initialization : 0 L2 packet on proxy-arp-enabled interface : 0 L2 packet on untrusted L2 port : 0 Packet with VIP on standby FHRP : 0 Grat arp received on proxy-arp-enabled interface : 0 Requests came for exising entries : 0 Requests came on a l2 interface : 0 L2FM query failed for a L2 Address : 0 Dropping due to tunneling failures : 0 INCOMPLETE entries drop count due to AM MTS threshold : 0 Glean requests recv count : 5

ARP adjacency statistics

Adds 1, Deletes 0, Timeouts 0

show ip arp suppression topology information

show ip arp suppression topology information

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp suppression topology information",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": " show ip arp suppression topo-info",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_arp_l2rib_topo": {
            "ROW_arp_l2rib_topo": [
              {
                "sw-bd-topo-id": 90,
                "arp-suppr-mode": "L2 ARP Suppression"
              },
              {
                "sw-bd-topo-id": 110,
                "arp-suppr-mode": "L2 ARP Suppression"
              },
              {
                "sw-bd-topo-id": 210,
                "arp-suppr-mode": "ARP Suppression Disabled"
              },
              {
                "sw-bd-topo-id": 410,
                "arp-suppr-mode": "L2/L3 ARP Suppression"
              },
              {
                "sw-bd-topo-id": 610,
                "arp-suppr-mode": "L2/L3 ARP Suppression"
              },
              {
                "sw-bd-topo-id": 710,
                "arp-suppr-mode": "L2/L3 ARP Suppression"
              }
            ]
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
          <TABLE_arp_l2rib_topo>
           <ROW_arp_l2rib_topo>
            <sw-bd-topo-id>90</sw-bd-topo-id>
            <arp-suppr-mode>L2 ARP Suppression</arp-suppr-mode>
           </ROW_arp_l2rib_topo>
           <ROW_arp_l2rib_topo>
            <sw-bd-topo-id>110</sw-bd-topo-id>
            <arp-suppr-mode>L2 ARP Suppression</arp-suppr-mode>
           </ROW_arp_l2rib_topo>
           <ROW_arp_l2rib_topo>
            <sw-bd-topo-id>210</sw-bd-topo-id>
            <arp-suppr-mode>ARP Suppression Disabled</arp-suppr-mode>
           </ROW_arp_l2rib_topo>
           <ROW_arp_l2rib_topo>
            <sw-bd-topo-id>410</sw-bd-topo-id>
            <arp-suppr-mode>L2/L3 ARP Suppression</arp-suppr-mode>
           </ROW_arp_l2rib_topo>
           <ROW_arp_l2rib_topo>
            <sw-bd-topo-id>610</sw-bd-topo-id>
            <arp-suppr-mode>L2/L3 ARP Suppression</arp-suppr-mode>
           </ROW_arp_l2rib_topo>
           <ROW_arp_l2rib_topo>
            <sw-bd-topo-id>710</sw-bd-topo-id>
            <arp-suppr-mode>L2/L3 ARP Suppression</arp-suppr-mode>
           </ROW_arp_l2rib_topo>
          </TABLE_arp_l2rib_topo>
         </body>
      <input> show ip arp suppression topo-info</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display ARP suppression topology information, use the show ip arp suppression topology information command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp suppression topology information**

leaf0# show ip arp suppression topo-info
ARP L2RIB Topology information
Topo-id  ARP-suppression mode
90      L2 ARP Suppression
110     L2 ARP Suppression
210     ARP Suppression Disabled
410     L2/L3 ARP Suppression
610     L2/L3 ARP Suppression
710     L2/L3 ARP Suppression

show ip arp suppression-cache detail

show ip arp suppression-cache detail

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp suppression-cache detail",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "show ip arp suppression-cache  detail",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_arp-suppression": {
            "ROW_arp-suppression": {
              "TABLE_entries": {
                "ROW_entries": [
                  {
                    "ip-addr": "41.1.1.11",
                    "age": "00:07:31",
                    "mac": "0000.1111.1410",
                    "vlan": 410,
                    "physical-iod": "port-channel2",
                    "flag": "L"
                  },
                  {
                    "ip-addr": "41.1.1.10",
                    "age": "00:08:07",
                    "mac": "0000.1110.1410",
                    "vlan": 410,
                    "physical-iod": "Ethernet3/1/1",
                    "flag": "L"
                  }
                ]
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
         <TABLE_arp-suppression>
          <ROW_arp-suppression>
           <TABLE_entries>
            <ROW_entries>
             <ip-addr>41.1.1.11</ip-addr>
             <age>00:07:48</age>
             <mac>0000.1111.1410</mac>
             <vlan>410</vlan>
             <physical-iod>port-channel2</physical-iod>
             <flag>L</flag>
            </ROW_entries>
            <ROW_entries>
             <ip-addr>41.1.1.10</ip-addr>
             <age>00:08:23</age>
             <mac>0000.1110.1410</mac>
             <vlan>410</vlan>
             <physical-iod>Ethernet3/1/1</physical-iod>
             <flag>L</flag>
            </ROW_entries>
           </TABLE_entries>
          </ROW_arp-suppression>
         </TABLE_arp-suppression>
        </body>
      <input>show ip arp suppression-cache  detail</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display detailed ARP suppression information in the cache, use the show ip arp suppression-cache detail command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp suppression-cache detail**

leaf0# show ip arp suppression-cache  detail

Flags: + - Adjacencies synced via CFSoE L - Local Adjacency R - Remote Adjacency L2 - Learnt over L2 interface

Ip Address Age Mac Address Vlan Physical-ifindex Flags Remote Vtep Addrs

41.1.1.11 00:06:54 0000.1111.1410 410 port-channel2 L 41.1.1.10 00:07:29 0000.1110.1410 410 Ethernet3/1/1 L

show ip arp suppression-cache summary

show ip arp suppression-cache summary

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp suppression-cache summary",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "show ip arp suppression-cache  summary",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_arp-suppression": {
            "ROW_arp-suppression": {
              "TABLE_summary": {
                "ROW_summary": {
                  "remote-count": 0,
                  "local-count": 2,
                  "total-count": 2
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
         <TABLE_arp-suppression>
          <ROW_arp-suppression>
           <TABLE_summary>
            <ROW_summary>
             <remote-count>0</remote-count>
             <local-count>2</local-count>
             <total-count>2</total-count>
            </ROW_summary>
           </TABLE_summary>
          </ROW_arp-suppression>
         </TABLE_arp-suppression>
        </body>
      <input>show ip arp suppression-cache  summary</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display summary of ARP suppression information in the cache, use the show ip arp suppression-cache summary command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp suppression-cache summary**

leaf0# sh ip arp suppression-cache summary

IP ARP suppression-cache Summary Remote :0 Local :2 Total :2

show ip arp suppression-cache vlan

show ip arp suppression-cache vlan

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp suppression-cache vlan",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": " sh ip arp suppression-cache vlan 410",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_arp-suppression": {
            "ROW_arp-suppression": {
              "TABLE_entries": {
                "ROW_entries": [
                  {
                    "ip-addr": "41.1.1.11",
                    "age": "00:13:41",
                    "mac": "0000.1111.1410",
                    "vlan": 410,
                    "physical-iod": "port-channel2",
                    "flag": "L"
                  },
                  {
                    "ip-addr": "41.1.1.10",
                    "age": "00:14:16",
                    "mac": "0000.1110.1410",
                    "vlan": 410,
                    "physical-iod": "Ethernet3/1/1",
                    "flag": "L"
                  }
                ]
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
         <TABLE_arp-suppression>
          <ROW_arp-suppression>
           <TABLE_entries>
            <ROW_entries>
             <ip-addr>41.1.1.11</ip-addr>
             <age>00:13:53</age>
             <mac>0000.1111.1410</mac>
             <vlan>410</vlan>
             <physical-iod>port-channel2</physical-iod>
             <flag>L</flag>
            </ROW_entries>
            <ROW_entries>
             <ip-addr>41.1.1.10</ip-addr>
             <age>00:14:28</age>
             <mac>0000.1110.1410</mac>
             <vlan>410</vlan>
             <physical-iod>Ethernet3/1/1</physical-iod>
             <flag>L</flag>
            </ROW_entries>
           </TABLE_entries>
          </ROW_arp-suppression>
         </TABLE_arp-suppression>
        </body>
      <input> sh ip arp suppression-cache vlan 410</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about ARP suppression for a VLAN, use the show ip arp suppression-cache vlan command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp suppression-cache vlan**

leaf0# sh ip arp suppression-cache vlan 410

Flags: + - Adjacencies synced via CFSoE L - Local Adjacency R - Remote Adjacency L2 - Learnt over L2 interface

Ip Address Age Mac Address Vlan Physical-ifindex Flags Remote Vtep Addrs

41.1.1.11 00:13:09 0000.1111.1410 410 port-channel2 L 41.1.1.10 00:13:44 0000.1110.1410 410 Ethernet3/1/1 L

show ip arp vpc-statistics

show ip arp vpc-statistics

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp vpc-statistics",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "show ip arp vpc-statistics",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_arp_vpc_stats": {
            "ROW_arp_vpc_stats": {
              "arp-drp-im-fail": 5,
              "arp-drp-mcecm-fail": 1,
              "arp-drp-pt-lookup-fail": 1,
              "arp-resp-sent": 1,
              "arp-resp-recvd": 1,
              "arp-rcvd-msg": 1,
              "arp-cfs-rel-dnvry-suc": 1,
              "arp-add-adj": 1,
              "arp-del-adj": 1,
              "sync-send-op-add-adj": 1,
              "sync-recv-op-add-adj": 1,
              "sync-push-msg-adj-cnt": 1,
              "arp-sync-adj-cnt": 2
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_arp_vpc_stats>
         <ROW_arp_vpc_stats>
          <arp-drp-im-fail>5</arp-drp-im-fail>
          <arp-drp-mcecm-fail>1</arp-drp-mcecm-fail>
          <arp-drp-pt-lookup-fail>1</arp-drp-pt-lookup-fail>
          <arp-resp-sent>1</arp-resp-sent>
          <arp-resp-recvd>1</arp-resp-recvd>
          <arp-rcvd-msg>1</arp-rcvd-msg>
          <arp-cfs-rel-dnvry-suc>1</arp-cfs-rel-dnvry-suc>
          <arp-add-adj>1</arp-add-adj>
          <arp-del-adj>1</arp-del-adj>
          <sync-send-op-add-adj>1</sync-send-op-add-adj>
          <sync-recv-op-add-adj>1</sync-recv-op-add-adj>
          <sync-push-msg-adj-cnt>1</sync-push-msg-adj-cnt>
          <arp-sync-adj-cnt>2</arp-sync-adj-cnt>
         </ROW_arp_vpc_stats>
        </TABLE_arp_vpc_stats>
       </body>
      <input>show ip arp vpc-statistics</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display the global statistics for the Address Resolution Protocol (ARP) on a virtual port channel, use the show ip arp vpc-statistics command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp vpc-statistics**

leaf0# show ip arp vpc-statistics
ARP sync Enabled

ARP vPC global statistics IM api failed while processing CFS payload : 5 MCECM api failed while processing CFS payload : 1 PT lookup failed while processing CFS payload : 1 Response sent via CFSoE : 1 Response received via CFSoE : 1 Received message via CFSoE : 1 Send message succeeded via CFSoE : 1 Total adjacency additions in offlist database : 1 Total adjacency deletions in offlist database : 1 Total adjacencies sentto the peer to add: 1 Total adjacencies receivedfrom the peer to add : 1 Total gross adjacencies sentperiodically: 1 Total periodic sync adjacencies: 2

show ip arp tunnel-statistics

show ip arp tunnel-statistics

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp tunnel-statistics",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "show ip arp tunnel-statistics",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_ip_arp_tunnel_stat": {
            "ROW_ip_arp_tunnel_stat": {
              "arp-tun-pkt-rcv-cnt": 0,
              "arp-tun-pkt-rcv-ing-vpc": 0,
              "arp-tun-pkt-rcv-ing-gpc": 0,
              "arp-tun-pkt-rcv-ing-orp-vpc": 0,
              "arp-tun-pkt-rcv-ing-orp-vpc-pl": 0,
              "arp-tun-pkt-snd-cnt": 0,
              "arp-tun-pkt-snd-snoop-cnt": 0,
              "arp-tun-pkt-snd-non-local-vip-cnt": 0,
              "arp-tun-pkt-snd-peer-gate-cnt": 0,
              "arp-tun-pkt-snd-ing-vpc": 0,
              "arp-tun-pkt-snd-ing-gpc": 0,
              "arp-tun-pkt-snd-ing-orp-vpc": 0,
              "arp-tun-pkt-snd-ing-orp-vpc-pl": 0,
              "arp-tun-pkt-rcv-drp-cnt": 0,
              "arp-tun-pkt-snd-drp-cnt": 0,
              "arp-tun-pkt-snd-drp-snd-fail-cnt": 0,
              "arp-tun-pkt-rcv-drp-ver-cnt": 0,
              "arp-tun-pkt-rcv-drp-pl-cnt": 0,
              "arp-tun-pkt-rcv-drp-ing-non-mct": 0,
              "arp-tun-pkt-rcv-drp-inv-ing-intf": 0,
              "arp-tun-pkt-snd-drp-inv-ing-intf": 0,
              "arp-tun-pkt-rcvdrp-inv-gpc-core-sw": 0,
              "arp-tun-pkt-rcvdrp-inv-gpc-peer-sw": 0,
              "arp-tun-pkt-drp-inv-mcec": 0,
              "arp-tun-pkt-im-api-fail": 0,
              "arp-tun-pkt-drp-ctxt-inv": 0,
              "arp-tun-pkt-drp-mct-dwn": 0,
              "arp-tun-pkt-rcv-drp-mbuf-op-fail": 0,
              "arp-tun-pkt-snd-drp-mbuf-op-fail": 0,
              "arp-tun-pkt-snd-drp-tunnel": 0,
              "arp-tun-pkt-snd-drp-ce": 0,
              "arp-tun-pkt-snd-drp-inv-gpc": 0,
              "arp-tun-pkt-rcv-drp-inv-gpc": 0,
              "arp-tun-pkt-sys-mcecm-key-not-found": 0
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_ip_arp_tunnel_stat>
         <ROW_ip_arp_tunnel_stat>
          <arp-tun-pkt-rcv-cnt>0</arp-tun-pkt-rcv-cnt>
          <arp-tun-pkt-rcv-ing-vpc>0</arp-tun-pkt-rcv-ing-vpc>
          <arp-tun-pkt-rcv-ing-gpc>0</arp-tun-pkt-rcv-ing-gpc>
          <arp-tun-pkt-rcv-ing-orp-vpc>0</arp-tun-pkt-rcv-ing-orp-vpc>
          <arp-tun-pkt-rcv-ing-orp-vpc-pl>0</arp-tun-pkt-rcv-ing-orp-vpc-pl>
          <arp-tun-pkt-snd-cnt>0</arp-tun-pkt-snd-cnt>
          <arp-tun-pkt-snd-snoop-cnt>0</arp-tun-pkt-snd-snoop-cnt>
          <arp-tun-pkt-snd-non-local-vip-cnt>0</arp-tun-pkt-snd-non-local-vip-cnt>
          <arp-tun-pkt-snd-peer-gate-cnt>0</arp-tun-pkt-snd-peer-gate-cnt>
          <arp-tun-pkt-snd-ing-vpc>0</arp-tun-pkt-snd-ing-vpc>
          <arp-tun-pkt-snd-ing-gpc>0</arp-tun-pkt-snd-ing-gpc>
          <arp-tun-pkt-snd-ing-orp-vpc>0</arp-tun-pkt-snd-ing-orp-vpc>
          <arp-tun-pkt-snd-ing-orp-vpc-pl>0</arp-tun-pkt-snd-ing-orp-vpc-pl>
          <arp-tun-pkt-rcv-drp-cnt>0</arp-tun-pkt-rcv-drp-cnt>
          <arp-tun-pkt-snd-drp-cnt>0</arp-tun-pkt-snd-drp-cnt>
          <arp-tun-pkt-snd-drp-snd-fail-cnt>0</arp-tun-pkt-snd-drp-snd-fail-cnt>
          <arp-tun-pkt-rcv-drp-ver-cnt>0</arp-tun-pkt-rcv-drp-ver-cnt>
          <arp-tun-pkt-rcv-drp-pl-cnt>0</arp-tun-pkt-rcv-drp-pl-cnt>
          <arp-tun-pkt-rcv-drp-ing-non-mct>0</arp-tun-pkt-rcv-drp-ing-non-mct>
          <arp-tun-pkt-rcv-drp-inv-ing-intf>0</arp-tun-pkt-rcv-drp-inv-ing-intf>
          <arp-tun-pkt-snd-drp-inv-ing-intf>0</arp-tun-pkt-snd-drp-inv-ing-intf>
          <arp-tun-pkt-rcvdrp-inv-gpc-core-sw>0</arp-tun-pkt-rcvdrp-inv-gpc-core-sw>
          <arp-tun-pkt-rcvdrp-inv-gpc-peer-sw>0</arp-tun-pkt-rcvdrp-inv-gpc-peer-sw>
          <arp-tun-pkt-drp-inv-mcec>0</arp-tun-pkt-drp-inv-mcec>
          <arp-tun-pkt-im-api-fail>0</arp-tun-pkt-im-api-fail>
          <arp-tun-pkt-drp-ctxt-inv>0</arp-tun-pkt-drp-ctxt-inv>
          <arp-tun-pkt-drp-mct-dwn>0</arp-tun-pkt-drp-mct-dwn>
          <arp-tun-pkt-rcv-drp-mbuf-op-fail>0</arp-tun-pkt-rcv-drp-mbuf-op-fail>
          <arp-tun-pkt-snd-drp-mbuf-op-fail>0</arp-tun-pkt-snd-drp-mbuf-op-fail>
          <arp-tun-pkt-snd-drp-tunnel>0</arp-tun-pkt-snd-drp-tunnel>
          <arp-tun-pkt-snd-drp-ce>0</arp-tun-pkt-snd-drp-ce>
          <arp-tun-pkt-snd-drp-inv-gpc>0</arp-tun-pkt-snd-drp-inv-gpc>
          <arp-tun-pkt-rcv-drp-inv-gpc>0</arp-tun-pkt-rcv-drp-inv-gpc>
          <arp-tun-pkt-sys-mcecm-key-not-found>0</arp-tun-pkt-sys-mcecm-key-not-found>
         </ROW_ip_arp_tunnel_stat>
        </TABLE_ip_arp_tunnel_stat>
       </body>
      <input>show ip arp tunnel-statistics</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about ARP statistics for tunneled packets, use the show ip arp tunnel-statistics command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp tunnel-statistics**

leaf0# show ip arp tunnel-statistics
ARP Tunnel statistics               
Total tunneled packets received              : 0
Tunneled packets rx for ingress vPC          : 0
Tunneled packets rx for ingress GPC          : 0
Tunneled Packets rx for ingress orphan vPC   : 0
Tunneled Packets rx for ingress orphan vPC+  : 0
Total tunneled packets sent                  : 0
Tunneled packets Sent for ARP Snoop          : 0
Tunneled packets sent for Non-Local VIP      : 0
Tunneled Packets sent for Peer Gateway       : 0
Tunneled packets tx for ingress vPC          : 0
Tunneled packets tx for ingress GPC          : 0
Tunneled Packets tx for ingress orphan vPC   : 0
Tunneled Packets tx for ingress orphan vPC+  : 0
Total tunnel packets recv dropped            : 0
Total tunnel packets send dropped            : 0
Drops due to send failed                     : 0
Received packet with invalid version         : 0
Received packet with invalid payload type    : 0
Received packet on non mct interface         : 0
Received packet with invalid ingress port    : 0
Drop send packets for invalid ingress port   : 0
Drop recv pkt, invalid GPC of core switch    : 0
Drop recv pkt, invalid  GPC of peer switch   : 0
Failed to retrieve vPC ID while processing   : 0
IM api failed while processing               : 0
Invalid context while processing              : 0
Tunnel failed as MCT is invalid or down             : 0
Drop recv packets as mbuf operation failed   : 0
Drop send packets as mbuf operation failed   : 0
Cannot tunnel a incoming tunneled packet     : 0
Cannot tunnel in a CE network                : 0
Drop recv pkt, failed in retrieving the GPC  : 0
Drop send pkt, failed in retrieving the GPC  : 0
MCEC_ID to PHY_IF_INDEX not found in DB      : 0

show ip adjacency

show ip adjacency
import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip adjacency",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ip adjacency",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out": "default",
              "TABLE_afi": {
                "ROW_afi": {
                  "afi": "ipv4",
                  "count": 1,
                  "TABLE_adj": {
                    "ROW_adj": {
                      "intf-out": "Ethernet3/2",
                      "ip-addr-out": "113.0.1.1",
                      "mac": "18ef.63e7.1dc2",
                      "pref": 50,
                      "owner": "arp"
                    }
                  }
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_vrf>
         <ROW_vrf>
          <vrf-name-out>default</vrf-name-out>
          <TABLE_afi>
           <ROW_afi>
            <afi>ipv4</afi>
            <count>1</count>
            <TABLE_adj>
             <ROW_adj>
              <intf-out>Ethernet3/2</intf-out>
              <ip-addr-out>113.0.1.1</ip-addr-out>
              <mac>18ef.63e7.1dc2</mac>
              <pref>50</pref>
              <owner>arp</owner>
             </ROW_adj>
            </TABLE_adj>
           </ROW_afi>
          </TABLE_afi>
         </ROW_vrf>
        </TABLE_vrf>
       </body>
      <input>sh ip adjacency</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display the adjacency table, use the show ip adjacency command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip adjacency**

leaf0# sh ip adjacency

Flags: # - Adjacencies Throttled for Glean G - Adjacencies of vPC peer with G/W bit R - Adjacencies learnt remotely

IP Adjacency Table for VRF default Total number of entries: 1 Address MAC Address Pref Source Interface 113.0.1.1 18ef.63e7.1dc2 50 arp Ethernet3/2

show ip adjacency summary

show ip adjacency summary
import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip adjacency summary",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ip adjacency summary",
        "msg": "Success",
        "code": "200",
        "body": {
          "count-static": 0,
          "count-dynamic": 1,
          "count-others": 0,
          "count-throttle": 0,
          "count-total": 1
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <count-static>0</count-static>
        <count-dynamic>1</count-dynamic>
        <count-others>0</count-others>
        <count-throttle>0</count-throttle>
        <count-total>1</count-total>
       </body>
      <input>sh ip adjacency summary</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about about the MPLS TE explicit paths, use the show ip adjacency summary command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip adjacency summary**

leaf0# show ip adjacency summary

IP AM Table - Adjacency Summary

SDB Limit : 131072 Static : 0 Dynamic : 1 Others : 0 (Throttled : 0) Total : 1

show ipv6 adjacency vrf

show ipv6 adjacency vrf

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ipv6 adjacency vrf",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ipv6 adjacency  vrf vni-51000",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out": "vni-51000",
              "TABLE_afi": {
                "ROW_afi": {
                  "afi": "ipv6",
                  "count": 1,
                  "TABLE_adj": {
                    "ROW_adj": {
                      "intf-out": "Bdi410",
                      "ipv6-addr": "41::10",
                      "time-stamp": "00:00:55",
                      "mac": "0000.1110.1410",
                      "pref": 50,
                      "owner": "icmpv6"
                    }
                  }
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_vrf>
         <ROW_vrf>
          <vrf-name-out>vni-51000</vrf-name-out>
          <TABLE_afi>
           <ROW_afi>
            <afi>ipv6</afi>
            <count>1</count>
            <TABLE_adj>
             <ROW_adj>
              <intf-out>Bdi410</intf-out>
              <ipv6-addr>41::10</ipv6-addr>
              <time-stamp>00:00:40</time-stamp>
              <mac>0000.1110.1410</mac>
              <pref>50</pref>
              <owner>icmpv6</owner>
             </ROW_adj>
            </TABLE_adj>
           </ROW_afi>
          </TABLE_afi>
         </ROW_vrf>
        </TABLE_vrf>
       </body>
      <input>sh ipv6 adjacency  vrf vni-51000</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about IPv6 adjaceny for a VRF interface, use the show ipv6 adjacency vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show mpls traffic-eng explicit-paths**

leaf0# sh ipv6 adjacency  vrf vni-51000

Flags: # - Adjacencies Throttled for Glean G - Adjacencies of vPC peer with G/W bit R - Adjacencies learnt remotely

IPv6 Adjacency Table for VRF vni-51000 Total number of entries: 1 Address Age MAC Address Pref Source Interface 41::10 00:00:05 0000.1110.1410 50 icmpv6 Bdi410

show ipv6 neighbor vrf

show ipv6 neighbor vrf

import requests
import json

"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'

myheaders={'content-type':'application/json'}
payload={
 "ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ipv6 neighbor vrf",
  "output_format": "json"
}

response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)

{
  "ins_api": {
    "type": "cli_show",
    "version": "1.2",
    "sid": "eoc",
    "outputs": {
      "output": {
        "input": "sh ipv6 neighbor vrf vni-51000",
        "msg": "Success",
        "code": "200",
        "body": {
          "TABLE_vrf": {
            "ROW_vrf": {
              "vrf-name-out": "vni-51000",
              "TABLE_afi": {
                "ROW_afi": {
                  "afi": "ipv6",
                  "count": 1,
                  "TABLE_adj": {
                    "ROW_adj": {
                      "intf-out": "Bdi410",
                      "ipv6-addr": "41::10",
                      "time-stamp": "00:02:23",
                      "mac": "0000.1110.1410",
                      "pref": 50,
                      "owner": "icmpv6"
                    }
                  }
                }
              }
            }
          }
        }
      }
    }
  }
}
<?xml version="1.0"?>
<ins_api>
  <type>cli_show</type>
  <version>1.2</version>
  <sid>eoc</sid>
  <outputs>
    <output>
      <body>
        <TABLE_vrf>
         <ROW_vrf>
          <vrf-name-out>vni-51000</vrf-name-out>
          <TABLE_afi>
           <ROW_afi>
            <afi>ipv6</afi>
            <count>1</count>
            <TABLE_adj>
             <ROW_adj>
              <intf-out>Bdi410</intf-out>
              <ipv6-addr>41::10</ipv6-addr>
              <time-stamp>00:02:36</time-stamp>
              <mac>0000.1110.1410</mac>
              <pref>50</pref>
              <owner>icmpv6</owner>
             </ROW_adj>
            </TABLE_adj>
           </ROW_afi>
          </TABLE_afi>
         </ROW_vrf>
        </TABLE_vrf>
       </body>
      <input>sh ipv6 neighbor vrf vni-51000</input>
      <msg>Success</msg>
      <code>200</code>
    </output>
  </outputs>
</ins_api>

To display information about the MPLS TE explicit paths, use the show ipv6 neighbor vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ipv6 neighbor vrf**

leaf0# show ipv6 neighbor vrf vni-51000

Flags: # - Adjacencies Throttled for Glean G - Adjacencies of vPC peer with G/W bit R - Adjacencies learnt remotely

IPv6 Adjacency Table for VRF vni-51000 Total number of entries: 1 Address Age MAC Address Pref Source Interface 41::10 00:01:28 0000.1110.1410 50 icmpv6 Bdi410

show ip arp inspection

show ip arp inspection
import requests
import json
 
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
 
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp inspection",
  "output_format": "json"
}
 
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
  "src_mac_valid": 0, 
  "dest_mac_valid": 0, 
  "ip_addr_valid": 0, 
  "TABLE_entry": {
    "ROW_entry": [
      {
        "active_vlan_id": "1", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }, 
      {
        "active_vlan_id": "3", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }, 
      {
        "active_vlan_id": "1001", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }, 
      {
        "active_vlan_id": "4040", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }, 
      {
        "active_vlan_id": "4041", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }, 
      {
        "active_vlan_id": "4044", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }, 
      {
        "active_vlan_id": "4045", 
        "is_insp_enabled": "disabled", 
        "oper_state": "inactive", 
        "is_static_acl": "non-static", 
        "dhcp_logging": "deny"
      }
    ]
  }
}
switch# show ip arp inspection | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
 <nf:data>
  <show>
   <ip>
    <arp>
     <inspection>
      <__XML__OPT_Cmd_show_arp___readonly__>
       <__readonly__>
        <src_mac_valid>0</src_mac_valid>
        <dest_mac_valid>0</dest_mac_valid>
        <ip_addr_valid>0</ip_addr_valid>
        <TABLE_entry>
         <ROW_entry>
          <active_vlan_id>1</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
         <ROW_entry>
          <active_vlan_id>3</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
         <ROW_entry>
          <active_vlan_id>1001</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
         <ROW_entry>
          <active_vlan_id>4040</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
         <ROW_entry>
          <active_vlan_id>4041</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
         <ROW_entry>
          <active_vlan_id>4044</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
         <ROW_entry>
          <active_vlan_id>4045</active_vlan_id>
          <is_insp_enabled>disabled</is_insp_enabled>
          <oper_state>inactive</oper_state>
          <is_static_acl>non-static</is_static_acl>
          <dhcp_logging>deny</dhcp_logging>
         </ROW_entry>
        </TABLE_entry>
       </__readonly__>
      </__XML__OPT_Cmd_show_arp___readonly__>
     </inspection>
    </arp>
   </ip>
  </show>
 </nf:data>
</nf:rpc-reply>
]]>]]>

For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

  Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp inspection**

switch# show ip arp inspection

Source Mac Validation : Disabled Destination Mac Validation : Disabled IP Address Validation : Disabled

Vlan : 1

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

Vlan : 3

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

Vlan : 1001

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

Vlan : 4040

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

Vlan : 4041

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

Vlan : 4044

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

Vlan : 4045

Configuration : Disabled Operation State : Inactive DHCP logging options : Deny

show ip arp inspection interfaces

show ip arp inspection interfaces
import requests
import json
 
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
 
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp inspection interfaces",
  "output_format": "json"
}
 
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
  "intf_header": 0
}
switch# show ip arp inspection interfaces | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
 <nf:data>
  <show>
   <ip>
    <arp>
     <inspection>
      <interfaces>
       <__XML__OPT_Cmd_show_arp_intf_intf1>
        <__XML__OPT_Cmd_show_arp_intf___readonly__>
         <__readonly__>
          <intf_header>0</intf_header>
         </__readonly__>
        </__XML__OPT_Cmd_show_arp_intf___readonly__>
       </__XML__OPT_Cmd_show_arp_intf_intf1>
      </interfaces>
     </inspection>
    </arp>
   </ip>
  </show>
 </nf:data>
</nf:rpc-reply>
]]>]]>

For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

  Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp inspection interfaces**

switch# show ip arp inspection interfaces
 Interface        Trust State
 -------------    -----------          

show ip arp inspection log

show ip arp inspection log
import requests
import json
 
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
 
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp inspection log",
  "output_format": "json"
}
 
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
  "log_buff_size": 32, 
  "log_rate_entries": 5, 
  "log_rate_interval": 1
}
switch# show ip arp inspection log | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
 <nf:data>
  <show>
   <ip>
    <arp>
     <inspection>
      <log>
       <__XML__OPT_Cmd_show_arp_log___readonly__>
        <__readonly__>
         <log_buff_size>32</log_buff_size>
         <log_rate_entries>5</log_rate_entries>
         <log_rate_interval>1</log_rate_interval>
        </__readonly__>
       </__XML__OPT_Cmd_show_arp_log___readonly__>
      </log>
     </inspection>
    </arp>
   </ip>
  </show>
 </nf:data>
</nf:rpc-reply>
]]>]]>

For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

  Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp inspection log**

switch# show ip arp inspection log

Syslog Buffer Size : 32 Syslog Rate : 5 entries per 1 seconds

show ip arp inspection statistics

show ip arp inspection statistics
 
import requests
import json
 
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
 
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp inspection statistics",
  "output_format": "json"
}
 
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
  "TABLE_stats": {
    "ROW_stats": {
      "vlanid": "1", 
      "req_fwded": "0", 
      "res_fwded": "0", 
      "req_dropped": "0", 
      "res_dropped": "0", 
      "dhcp_drops": "0", 
      "dhcp_permits": "0", 
      "req_smac_fails": "0", 
      "res_smac_fails": "0", 
      "res_dmac_fails": "0", 
      "req_ip_fails": "0", 
      "res_ip_fails": "0"
    }
  }
}
switch# show ip arp inspection statistics | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
 <nf:data>
  <show>
   <ip>
    <arp>
     <inspection>
      <statistics>
       <__XML__OPT_Cmd_show_arp_stats_vlan>
        <__XML__OPT_Cmd_show_arp_stats___readonly__>
         <__readonly__>
          <TABLE_stats>
           <ROW_stats>
            <vlanid>1</vlanid>
            <req_fwded>0</req_fwded>
            <res_fwded>0</res_fwded>
            <req_dropped>0</req_dropped>
            <res_dropped>0</res_dropped>
            <dhcp_drops>0</dhcp_drops>
            <dhcp_permits>0</dhcp_permits>
            <req_smac_fails>0</req_smac_fails>
            <res_smac_fails>0</res_smac_fails>
            <res_dmac_fails>0</res_dmac_fails>
            <req_ip_fails>0</req_ip_fails>
            <res_ip_fails>0</res_ip_fails>
           </ROW_stats>
          </TABLE_stats>
         </__readonly__>
        </__XML__OPT_Cmd_show_arp_stats___readonly__>
       </__XML__OPT_Cmd_show_arp_stats_vlan>
      </statistics>
     </inspection>
    </arp>
   </ip>
  </show>
 </nf:data>
</nf:rpc-reply>
]]>]]>

For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

  Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).  
CLI Output

switch# show ip arp inspection statistics

switch# show ip arp inspection statistics
Vlan : 1

ARP Req Forwarded = 0 ARP Res Forwarded = 0 ARP Req Dropped = 0 ARP Res Dropped = 0 DHCP Drops = 0 DHCP Permits = 0 SMAC Fails-ARP Req = 0 SMAC Fails-ARP Res = 0 DMAC Fails-ARP Res = 0 IP Fails-ARP Req = 0 IP Fails-ARP Res = 0

show ip arp inspection vlan

show ip arp inspection vlan <vlan-range>
import requests
import json
 
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
 
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
  "version": "1.0",
  "type": "cli_show",
  "chunk": "0",
  "sid": "1",
  "input": "show ip arp inspection vlan 1",
  "output_format": "json"
}
 
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
  "src_vlan_mac_valid": 0, 
  "dest_vlan_mac_valid": 0, 
  "ip_vlan_addr_valid": 0, 
  "TABLE_vlan": {
    "ROW_vlan": {
      "active_vlan_id": "1", 
      "is_insp_enabled": "enabled", 
      "oper_state": "active", 
      "dhcp_logging": "deny", 
      "is_static_acl": "non-static"
    }
  }
}
switch# show ip arp inspection vlan 1 | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
 <nf:data>
  <show>
   <ip>
    <arp>
     <inspection>
      <vlan>
       <vlan-range>
        <__XML__PARAM_value>1</__XML__PARAM_value>
        <__XML__OPT_Cmd_show_arp_vlan___readonly__>
         <__readonly__>
          <src_vlan_mac_valid>0</src_vlan_mac_valid>
          <dest_vlan_mac_valid>0</dest_vlan_mac_valid>
          <ip_vlan_addr_valid>0</ip_vlan_addr_valid>
          <TABLE_vlan>
           <ROW_vlan>
            <active_vlan_id>1</active_vlan_id>
            <is_insp_enabled>enabled</is_insp_enabled>
            <oper_state>active</oper_state>
            <dhcp_logging>deny</dhcp_logging>
            <is_static_acl>non-static</is_static_acl>
           </ROW_vlan>
          </TABLE_vlan>
         </__readonly__>
        </__XML__OPT_Cmd_show_arp_vlan___readonly__>
       </vlan-range>
      </vlan>
     </inspection>
    </arp>
   </ip>
  </show>
 </nf:data>
</nf:rpc-reply>
]]>]]>

For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.

  Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).

CLI Output

switch# **show ip arp inspection vlan 1**

switch# show ip arp inspection vlan 1
Source Mac Validation      : Disabled
Destination Mac Validation : Disabled
IP Address Validation      : Disabled

Vlan : 1

Configuration : Enabled Operation State : Active DHCP logging options : Deny