ARP Commands
show ip arp
show ip arp
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "default",
"cnt-total": 1,
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Ethernet3/2",
"ip-addr-out": "113.0.1.1",
"time-stamp": "00:01:52",
"mac": "18ef.63e7.1dc2"
}
}
}
}
}
}
}
}
}
To display information about NVE interface, use the show ip arp command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).
CLI Output |
---|
|
show ip arp detail
show ip arp detail
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp detail",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ip arp detail",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "default",
"cnt-total": 1,
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Ethernet3/2",
"ip-addr-out": "113.0.1.1",
"time-stamp": "00:10:15",
"mac": "18ef.63e7.1dc2",
"phy-intf": "Ethernet3/2"
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out>default</vrf-name-out>
<cnt-total>1</cnt-total>
<TABLE_adj>
<ROW_adj>
<intf-out>Ethernet3/2</intf-out>
<ip-addr-out>113.0.1.1</ip-addr-out>
<time-stamp>00:09:52</time-stamp>
<mac>18ef.63e7.1dc2</mac>
<phy-intf>Ethernet3/2</phy-intf>
</ROW_adj>
</TABLE_adj>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ip arp detail</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about detailed ARP table, use the show ip arp detail command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp detail vrf management
show ip arp detail vrf management
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp detail vrf management",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
```PYTHON
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp detail vrf management",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "management",
"cnt-total": 2,
"TABLE_adj": {
"ROW_adj": [{
"intf-out": "mgmt0",
"ip-addr-out": "10.77.143.1",
"time-stamp": "00:00:10",
"mac": "0000.0c9f.f0d3",
"phy-intf": "mgmt0"
}, {
"intf-out": "mgmt0",
"ip-addr-out": "10.77.143.3",
"time-stamp": "00:00:23",
"mac": "5087.894c.abc1",
"phy-intf": "mgmt0"
}]
}
}
}
}
}
}
}
}
To display ARP information about VRF interface, use the show ip arp detail vrf management command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).
CLI Output |
---|
|
show ip arp vrf test
show ip arp vrf test
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp vrf test",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp vrf test",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "test",
"cnt-total": 1,
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Ethernet9/20",
"ip-addr-out": "34.1.1.1",
"time-stamp": "00:17:03",
"mac": "8c60.4ff8.60fc"
}
}
}
}
}
}
}
}
}
To view the virtual routing and forwarding (VRF) instance in the Address Resolution Protocol (ARP) cache table, use the show ip arp vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).
CLI Output |
---|
|
show ip arp vrf management
show ip arp vrf management
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp vrf management",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp vrf management",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "management",
"cnt-total": 2,
"TABLE_adj": {
"ROW_adj": [{
"intf-out": "mgmt0",
"ip-addr-out": "10.77.143.1",
"time-stamp": "00:00:10",
"mac": "0000.0c9f.f0d3"
}, {
"intf-out": "mgmt0",
"ip-addr-out": "10.77.143.3",
"time-stamp": "00:00:23",
"mac": "5087.894c.abc1"
}]
}
}
}
}
}
}
}
}
To view which virtual routing and forwarding (VRF) instance in the Address Resolution Protocol (ARP) cache table, use the show ip arp vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.2(1).
CLI Output |
---|
|
show ip arp sync-entries vrf
show ip arp sync-entries vrf
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp sync-entries vrf",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ip arp sync-entries vrf all",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "all",
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Bdi410",
"ip-addr-out": "41.1.1.11",
"time-stamp": "00:00:49",
"mac": "0000.1111.1410"
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out>all</vrf-name-out>
<TABLE_adj>
<ROW_adj>
<intf-out>Bdi410</intf-out>
<ip-addr-out>41.1.1.11</ip-addr-out>
<time-stamp>00:01:06</time-stamp>
<mac>0000.1111.1410</mac>
</ROW_adj>
</TABLE_adj>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ip arp sync-entries vrf all</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display the Address Resolution Protocol (ARP) table information after an ARP table synchronization, use the show ip arp sync-entries vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp summary vrf
show ip arp summary vrf
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp summary vrf",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ip arp summary vrf all",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "all",
"cnt-resolved": 6,
"cnt-incomplete": 0,
"cnt-thrtld-incomplete": 0,
"cnt-unknown": 0,
"cnt-total": 6
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out>all</vrf-name-out>
<cnt-resolved>6</cnt-resolved>
<cnt-incomplete>0</cnt-incomplete>
<cnt-thrtld-incomplete>0</cnt-thrtld-incomplete>
<cnt-unknown>0</cnt-unknown>
<cnt-total>6</cnt-total>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ip arp summary vrf all</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about the MPLS TE explicit paths, use the show ip arp summary vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp statistics
show ip arp statistics
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp statistics",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ip arp statistics",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out1": "default",
"TABLE_stat": {
"ROW_stat": {
"tx-total": 7,
"tx-req": 4,
"tx-reply": 1,
"tx-req-l2": 0,
"tx-reply-l2": 0,
"tx-grat": 2,
"tx-tunnel": 0,
"tx-drop": 0,
"tx-mbuf-fail": 0,
"tx-ctxt-not-crtd": 0,
"tx-bad-ctxt-id": 0,
"tx-invalid-ifindex": 0,
"tx-invalid-sip": 0,
"tx-invalid-dip": 0,
"tx-own-ip": 2,
"tx-unattached-ip": 2,
"tx-adj-create-fail": 0,
"tx-null-sip": 0,
"tx-null-smac": 0,
"tx-client-enq-fail": 0,
"tx-dest-unreachable": 0,
"tx-enhanced-proxy-dest-unreachable": 0,
"tx-l2-port-dest-unreachable": 0,
"tx-invalid-local-proxy": 0,
"tx-invalid-proxy": 0,
"tx-vip-not-active": 0,
"rx-total": 0,
"rx-req": 3,
"rx-reply": 2,
"rx-req-l2": 0,
"rx-reply-l2": 0,
"rx-proxy": 0,
"rx-local-proxy": 0,
"rx-enhanced-proxy": 0,
"rx-enhanced-proxy-anycast": 0,
"rx-enhanced-proxy-l2port-track": 0,
"rx-tunnel": 0,
"rx-fastpath": 0,
"rx-snoop": 0,
"rx-drop": 4,
"rx-srvrport": 0,
"bad-if": 0,
"bad-len": 0,
"invalid-prot": 0,
"invalid-hrd-type": 0,
"invalid-ctxt": 0,
"ctxt-not-crtd": 0,
"invalid-l2": 0,
"invalid-l3": 0,
"invalid-sip": 0,
"our-sip": 0,
"arp-if-no-mem": 0,
"subnet-mismatch": 0,
"dir-bcast": 0,
"invalid-dip": 0,
"non-local-dst": 0,
"non-active-fhrp": 0,
"invalid-smac": 0,
"our-smac": 0,
"not-init": 0,
"l2-prxy-en": 0,
"l2-port-untrusted": 0,
"stdby-fhrp-vip": 0,
"grat-prxy-en": 0,
"arp-req-ignore": 0,
"l2-intf": 0,
"l2fm-query-fail": 0,
"tunnel_fail": 0,
"incomplete-drop-count": 0,
"recv-glean-count": 5,
"adds": 1,
"dels": 0,
"timeouts": 0
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out1>default</vrf-name-out1>
<TABLE_stat>
<ROW_stat>
<tx-total>8</tx-total>
<tx-req>4</tx-req>
<tx-reply>2</tx-reply>
<tx-req-l2>0</tx-req-l2>
<tx-reply-l2>0</tx-reply-l2>
<tx-grat>2</tx-grat>
<tx-tunnel>0</tx-tunnel>
<tx-drop>0</tx-drop>
<tx-mbuf-fail>0</tx-mbuf-fail>
<tx-ctxt-not-crtd>0</tx-ctxt-not-crtd>
<tx-bad-ctxt-id>0</tx-bad-ctxt-id>
<tx-invalid-ifindex>0</tx-invalid-ifindex>
<tx-invalid-sip>0</tx-invalid-sip>
<tx-invalid-dip>0</tx-invalid-dip>
<tx-own-ip>2</tx-own-ip>
<tx-unattached-ip>2</tx-unattached-ip>
<tx-adj-create-fail>0</tx-adj-create-fail>
<tx-null-sip>0</tx-null-sip>
<tx-null-smac>0</tx-null-smac>
<tx-client-enq-fail>0</tx-client-enq-fail>
<tx-dest-unreachable>0</tx-dest-unreachable>
<tx-enhanced-proxy-dest-unreachable>0</tx-enhanced-proxy-dest-unreachable>
<tx-l2-port-dest-unreachable>0</tx-l2-port-dest-unreachable>
<tx-invalid-local-proxy>0</tx-invalid-local-proxy>
<tx-invalid-proxy>0</tx-invalid-proxy>
<tx-vip-not-active>0</tx-vip-not-active>
<rx-total>0</rx-total>
<rx-req>4</rx-req>
<rx-reply>2</rx-reply>
<rx-req-l2>0</rx-req-l2>
<rx-reply-l2>0</rx-reply-l2>
<rx-proxy>0</rx-proxy>
<rx-local-proxy>0</rx-local-proxy>
<rx-enhanced-proxy>0</rx-enhanced-proxy>
<rx-enhanced-proxy-anycast>0</rx-enhanced-proxy-anycast>
<rx-enhanced-proxy-l2port-track>0</rx-enhanced-proxy-l2port-track>
<rx-tunnel>0</rx-tunnel>
<rx-fastpath>0</rx-fastpath>
<rx-snoop>0</rx-snoop>
<rx-drop>4</rx-drop>
<rx-srvrport>0</rx-srvrport>
<bad-if>0</bad-if>
<bad-len>0</bad-len>
<invalid-prot>0</invalid-prot>
<invalid-hrd-type>0</invalid-hrd-type>
<invalid-ctxt>0</invalid-ctxt>
<ctxt-not-crtd>0</ctxt-not-crtd>
<invalid-l2>0</invalid-l2>
<invalid-l3>0</invalid-l3>
<invalid-sip>0</invalid-sip>
<our-sip>0</our-sip>
<arp-if-no-mem>0</arp-if-no-mem>
<subnet-mismatch>0</subnet-mismatch>
<dir-bcast>0</dir-bcast>
<invalid-dip>0</invalid-dip>
<non-local-dst>0</non-local-dst>
<non-active-fhrp>0</non-active-fhrp>
<invalid-smac>0</invalid-smac>
<our-smac>0</our-smac>
<not-init>0</not-init>
<l2-prxy-en>0</l2-prxy-en>
<l2-port-untrusted>0</l2-port-untrusted>
<stdby-fhrp-vip>0</stdby-fhrp-vip>
<grat-prxy-en>0</grat-prxy-en>
<arp-req-ignore>0</arp-req-ignore>
<l2-intf>0</l2-intf>
<l2fm-query-fail>0</l2fm-query-fail>
<tunnel_fail>0</tunnel_fail>
<incomplete-drop-count>0</incomplete-drop-count>
<recv-glean-count>5</recv-glean-count>
<adds>1</adds>
<dels>0</dels>
<timeouts>0</timeouts>
</ROW_stat>
</TABLE_stat>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ip arp statistics</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display the Address Resolution Protocol (ARP) table statistics, use the show ip arp statistics command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp suppression topology information
show ip arp suppression topology information
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp suppression topology information",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": " show ip arp suppression topo-info",
"msg": "Success",
"code": "200",
"body": {
"TABLE_arp_l2rib_topo": {
"ROW_arp_l2rib_topo": [
{
"sw-bd-topo-id": 90,
"arp-suppr-mode": "L2 ARP Suppression"
},
{
"sw-bd-topo-id": 110,
"arp-suppr-mode": "L2 ARP Suppression"
},
{
"sw-bd-topo-id": 210,
"arp-suppr-mode": "ARP Suppression Disabled"
},
{
"sw-bd-topo-id": 410,
"arp-suppr-mode": "L2/L3 ARP Suppression"
},
{
"sw-bd-topo-id": 610,
"arp-suppr-mode": "L2/L3 ARP Suppression"
},
{
"sw-bd-topo-id": 710,
"arp-suppr-mode": "L2/L3 ARP Suppression"
}
]
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_arp_l2rib_topo>
<ROW_arp_l2rib_topo>
<sw-bd-topo-id>90</sw-bd-topo-id>
<arp-suppr-mode>L2 ARP Suppression</arp-suppr-mode>
</ROW_arp_l2rib_topo>
<ROW_arp_l2rib_topo>
<sw-bd-topo-id>110</sw-bd-topo-id>
<arp-suppr-mode>L2 ARP Suppression</arp-suppr-mode>
</ROW_arp_l2rib_topo>
<ROW_arp_l2rib_topo>
<sw-bd-topo-id>210</sw-bd-topo-id>
<arp-suppr-mode>ARP Suppression Disabled</arp-suppr-mode>
</ROW_arp_l2rib_topo>
<ROW_arp_l2rib_topo>
<sw-bd-topo-id>410</sw-bd-topo-id>
<arp-suppr-mode>L2/L3 ARP Suppression</arp-suppr-mode>
</ROW_arp_l2rib_topo>
<ROW_arp_l2rib_topo>
<sw-bd-topo-id>610</sw-bd-topo-id>
<arp-suppr-mode>L2/L3 ARP Suppression</arp-suppr-mode>
</ROW_arp_l2rib_topo>
<ROW_arp_l2rib_topo>
<sw-bd-topo-id>710</sw-bd-topo-id>
<arp-suppr-mode>L2/L3 ARP Suppression</arp-suppr-mode>
</ROW_arp_l2rib_topo>
</TABLE_arp_l2rib_topo>
</body>
<input> show ip arp suppression topo-info</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display ARP suppression topology information, use the show ip arp suppression topology information command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp suppression-cache detail
show ip arp suppression-cache detail
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp suppression-cache detail",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp suppression-cache detail",
"msg": "Success",
"code": "200",
"body": {
"TABLE_arp-suppression": {
"ROW_arp-suppression": {
"TABLE_entries": {
"ROW_entries": [
{
"ip-addr": "41.1.1.11",
"age": "00:07:31",
"mac": "0000.1111.1410",
"vlan": 410,
"physical-iod": "port-channel2",
"flag": "L"
},
{
"ip-addr": "41.1.1.10",
"age": "00:08:07",
"mac": "0000.1110.1410",
"vlan": 410,
"physical-iod": "Ethernet3/1/1",
"flag": "L"
}
]
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_arp-suppression>
<ROW_arp-suppression>
<TABLE_entries>
<ROW_entries>
<ip-addr>41.1.1.11</ip-addr>
<age>00:07:48</age>
<mac>0000.1111.1410</mac>
<vlan>410</vlan>
<physical-iod>port-channel2</physical-iod>
<flag>L</flag>
</ROW_entries>
<ROW_entries>
<ip-addr>41.1.1.10</ip-addr>
<age>00:08:23</age>
<mac>0000.1110.1410</mac>
<vlan>410</vlan>
<physical-iod>Ethernet3/1/1</physical-iod>
<flag>L</flag>
</ROW_entries>
</TABLE_entries>
</ROW_arp-suppression>
</TABLE_arp-suppression>
</body>
<input>show ip arp suppression-cache detail</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display detailed ARP suppression information in the cache, use the show ip arp suppression-cache detail command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp suppression-cache summary
show ip arp suppression-cache summary
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp suppression-cache summary",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp suppression-cache summary",
"msg": "Success",
"code": "200",
"body": {
"TABLE_arp-suppression": {
"ROW_arp-suppression": {
"TABLE_summary": {
"ROW_summary": {
"remote-count": 0,
"local-count": 2,
"total-count": 2
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_arp-suppression>
<ROW_arp-suppression>
<TABLE_summary>
<ROW_summary>
<remote-count>0</remote-count>
<local-count>2</local-count>
<total-count>2</total-count>
</ROW_summary>
</TABLE_summary>
</ROW_arp-suppression>
</TABLE_arp-suppression>
</body>
<input>show ip arp suppression-cache summary</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display summary of ARP suppression information in the cache, use the show ip arp suppression-cache summary command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp suppression-cache vlan
show ip arp suppression-cache vlan
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp suppression-cache vlan",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": " sh ip arp suppression-cache vlan 410",
"msg": "Success",
"code": "200",
"body": {
"TABLE_arp-suppression": {
"ROW_arp-suppression": {
"TABLE_entries": {
"ROW_entries": [
{
"ip-addr": "41.1.1.11",
"age": "00:13:41",
"mac": "0000.1111.1410",
"vlan": 410,
"physical-iod": "port-channel2",
"flag": "L"
},
{
"ip-addr": "41.1.1.10",
"age": "00:14:16",
"mac": "0000.1110.1410",
"vlan": 410,
"physical-iod": "Ethernet3/1/1",
"flag": "L"
}
]
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_arp-suppression>
<ROW_arp-suppression>
<TABLE_entries>
<ROW_entries>
<ip-addr>41.1.1.11</ip-addr>
<age>00:13:53</age>
<mac>0000.1111.1410</mac>
<vlan>410</vlan>
<physical-iod>port-channel2</physical-iod>
<flag>L</flag>
</ROW_entries>
<ROW_entries>
<ip-addr>41.1.1.10</ip-addr>
<age>00:14:28</age>
<mac>0000.1110.1410</mac>
<vlan>410</vlan>
<physical-iod>Ethernet3/1/1</physical-iod>
<flag>L</flag>
</ROW_entries>
</TABLE_entries>
</ROW_arp-suppression>
</TABLE_arp-suppression>
</body>
<input> sh ip arp suppression-cache vlan 410</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about ARP suppression for a VLAN, use the show ip arp suppression-cache vlan command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp vpc-statistics
show ip arp vpc-statistics
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp vpc-statistics",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp vpc-statistics",
"msg": "Success",
"code": "200",
"body": {
"TABLE_arp_vpc_stats": {
"ROW_arp_vpc_stats": {
"arp-drp-im-fail": 5,
"arp-drp-mcecm-fail": 1,
"arp-drp-pt-lookup-fail": 1,
"arp-resp-sent": 1,
"arp-resp-recvd": 1,
"arp-rcvd-msg": 1,
"arp-cfs-rel-dnvry-suc": 1,
"arp-add-adj": 1,
"arp-del-adj": 1,
"sync-send-op-add-adj": 1,
"sync-recv-op-add-adj": 1,
"sync-push-msg-adj-cnt": 1,
"arp-sync-adj-cnt": 2
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_arp_vpc_stats>
<ROW_arp_vpc_stats>
<arp-drp-im-fail>5</arp-drp-im-fail>
<arp-drp-mcecm-fail>1</arp-drp-mcecm-fail>
<arp-drp-pt-lookup-fail>1</arp-drp-pt-lookup-fail>
<arp-resp-sent>1</arp-resp-sent>
<arp-resp-recvd>1</arp-resp-recvd>
<arp-rcvd-msg>1</arp-rcvd-msg>
<arp-cfs-rel-dnvry-suc>1</arp-cfs-rel-dnvry-suc>
<arp-add-adj>1</arp-add-adj>
<arp-del-adj>1</arp-del-adj>
<sync-send-op-add-adj>1</sync-send-op-add-adj>
<sync-recv-op-add-adj>1</sync-recv-op-add-adj>
<sync-push-msg-adj-cnt>1</sync-push-msg-adj-cnt>
<arp-sync-adj-cnt>2</arp-sync-adj-cnt>
</ROW_arp_vpc_stats>
</TABLE_arp_vpc_stats>
</body>
<input>show ip arp vpc-statistics</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display the global statistics for the Address Resolution Protocol (ARP) on a virtual port channel, use the show ip arp vpc-statistics command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp tunnel-statistics
show ip arp tunnel-statistics
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp tunnel-statistics",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "show ip arp tunnel-statistics",
"msg": "Success",
"code": "200",
"body": {
"TABLE_ip_arp_tunnel_stat": {
"ROW_ip_arp_tunnel_stat": {
"arp-tun-pkt-rcv-cnt": 0,
"arp-tun-pkt-rcv-ing-vpc": 0,
"arp-tun-pkt-rcv-ing-gpc": 0,
"arp-tun-pkt-rcv-ing-orp-vpc": 0,
"arp-tun-pkt-rcv-ing-orp-vpc-pl": 0,
"arp-tun-pkt-snd-cnt": 0,
"arp-tun-pkt-snd-snoop-cnt": 0,
"arp-tun-pkt-snd-non-local-vip-cnt": 0,
"arp-tun-pkt-snd-peer-gate-cnt": 0,
"arp-tun-pkt-snd-ing-vpc": 0,
"arp-tun-pkt-snd-ing-gpc": 0,
"arp-tun-pkt-snd-ing-orp-vpc": 0,
"arp-tun-pkt-snd-ing-orp-vpc-pl": 0,
"arp-tun-pkt-rcv-drp-cnt": 0,
"arp-tun-pkt-snd-drp-cnt": 0,
"arp-tun-pkt-snd-drp-snd-fail-cnt": 0,
"arp-tun-pkt-rcv-drp-ver-cnt": 0,
"arp-tun-pkt-rcv-drp-pl-cnt": 0,
"arp-tun-pkt-rcv-drp-ing-non-mct": 0,
"arp-tun-pkt-rcv-drp-inv-ing-intf": 0,
"arp-tun-pkt-snd-drp-inv-ing-intf": 0,
"arp-tun-pkt-rcvdrp-inv-gpc-core-sw": 0,
"arp-tun-pkt-rcvdrp-inv-gpc-peer-sw": 0,
"arp-tun-pkt-drp-inv-mcec": 0,
"arp-tun-pkt-im-api-fail": 0,
"arp-tun-pkt-drp-ctxt-inv": 0,
"arp-tun-pkt-drp-mct-dwn": 0,
"arp-tun-pkt-rcv-drp-mbuf-op-fail": 0,
"arp-tun-pkt-snd-drp-mbuf-op-fail": 0,
"arp-tun-pkt-snd-drp-tunnel": 0,
"arp-tun-pkt-snd-drp-ce": 0,
"arp-tun-pkt-snd-drp-inv-gpc": 0,
"arp-tun-pkt-rcv-drp-inv-gpc": 0,
"arp-tun-pkt-sys-mcecm-key-not-found": 0
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_ip_arp_tunnel_stat>
<ROW_ip_arp_tunnel_stat>
<arp-tun-pkt-rcv-cnt>0</arp-tun-pkt-rcv-cnt>
<arp-tun-pkt-rcv-ing-vpc>0</arp-tun-pkt-rcv-ing-vpc>
<arp-tun-pkt-rcv-ing-gpc>0</arp-tun-pkt-rcv-ing-gpc>
<arp-tun-pkt-rcv-ing-orp-vpc>0</arp-tun-pkt-rcv-ing-orp-vpc>
<arp-tun-pkt-rcv-ing-orp-vpc-pl>0</arp-tun-pkt-rcv-ing-orp-vpc-pl>
<arp-tun-pkt-snd-cnt>0</arp-tun-pkt-snd-cnt>
<arp-tun-pkt-snd-snoop-cnt>0</arp-tun-pkt-snd-snoop-cnt>
<arp-tun-pkt-snd-non-local-vip-cnt>0</arp-tun-pkt-snd-non-local-vip-cnt>
<arp-tun-pkt-snd-peer-gate-cnt>0</arp-tun-pkt-snd-peer-gate-cnt>
<arp-tun-pkt-snd-ing-vpc>0</arp-tun-pkt-snd-ing-vpc>
<arp-tun-pkt-snd-ing-gpc>0</arp-tun-pkt-snd-ing-gpc>
<arp-tun-pkt-snd-ing-orp-vpc>0</arp-tun-pkt-snd-ing-orp-vpc>
<arp-tun-pkt-snd-ing-orp-vpc-pl>0</arp-tun-pkt-snd-ing-orp-vpc-pl>
<arp-tun-pkt-rcv-drp-cnt>0</arp-tun-pkt-rcv-drp-cnt>
<arp-tun-pkt-snd-drp-cnt>0</arp-tun-pkt-snd-drp-cnt>
<arp-tun-pkt-snd-drp-snd-fail-cnt>0</arp-tun-pkt-snd-drp-snd-fail-cnt>
<arp-tun-pkt-rcv-drp-ver-cnt>0</arp-tun-pkt-rcv-drp-ver-cnt>
<arp-tun-pkt-rcv-drp-pl-cnt>0</arp-tun-pkt-rcv-drp-pl-cnt>
<arp-tun-pkt-rcv-drp-ing-non-mct>0</arp-tun-pkt-rcv-drp-ing-non-mct>
<arp-tun-pkt-rcv-drp-inv-ing-intf>0</arp-tun-pkt-rcv-drp-inv-ing-intf>
<arp-tun-pkt-snd-drp-inv-ing-intf>0</arp-tun-pkt-snd-drp-inv-ing-intf>
<arp-tun-pkt-rcvdrp-inv-gpc-core-sw>0</arp-tun-pkt-rcvdrp-inv-gpc-core-sw>
<arp-tun-pkt-rcvdrp-inv-gpc-peer-sw>0</arp-tun-pkt-rcvdrp-inv-gpc-peer-sw>
<arp-tun-pkt-drp-inv-mcec>0</arp-tun-pkt-drp-inv-mcec>
<arp-tun-pkt-im-api-fail>0</arp-tun-pkt-im-api-fail>
<arp-tun-pkt-drp-ctxt-inv>0</arp-tun-pkt-drp-ctxt-inv>
<arp-tun-pkt-drp-mct-dwn>0</arp-tun-pkt-drp-mct-dwn>
<arp-tun-pkt-rcv-drp-mbuf-op-fail>0</arp-tun-pkt-rcv-drp-mbuf-op-fail>
<arp-tun-pkt-snd-drp-mbuf-op-fail>0</arp-tun-pkt-snd-drp-mbuf-op-fail>
<arp-tun-pkt-snd-drp-tunnel>0</arp-tun-pkt-snd-drp-tunnel>
<arp-tun-pkt-snd-drp-ce>0</arp-tun-pkt-snd-drp-ce>
<arp-tun-pkt-snd-drp-inv-gpc>0</arp-tun-pkt-snd-drp-inv-gpc>
<arp-tun-pkt-rcv-drp-inv-gpc>0</arp-tun-pkt-rcv-drp-inv-gpc>
<arp-tun-pkt-sys-mcecm-key-not-found>0</arp-tun-pkt-sys-mcecm-key-not-found>
</ROW_ip_arp_tunnel_stat>
</TABLE_ip_arp_tunnel_stat>
</body>
<input>show ip arp tunnel-statistics</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about ARP statistics for tunneled packets, use the show ip arp tunnel-statistics command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip adjacency
show ip adjacency
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip adjacency",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ip adjacency",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "default",
"TABLE_afi": {
"ROW_afi": {
"afi": "ipv4",
"count": 1,
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Ethernet3/2",
"ip-addr-out": "113.0.1.1",
"mac": "18ef.63e7.1dc2",
"pref": 50,
"owner": "arp"
}
}
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out>default</vrf-name-out>
<TABLE_afi>
<ROW_afi>
<afi>ipv4</afi>
<count>1</count>
<TABLE_adj>
<ROW_adj>
<intf-out>Ethernet3/2</intf-out>
<ip-addr-out>113.0.1.1</ip-addr-out>
<mac>18ef.63e7.1dc2</mac>
<pref>50</pref>
<owner>arp</owner>
</ROW_adj>
</TABLE_adj>
</ROW_afi>
</TABLE_afi>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ip adjacency</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display the adjacency table, use the show ip adjacency command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip adjacency summary
show ip adjacency summary
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip adjacency summary",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ip adjacency summary",
"msg": "Success",
"code": "200",
"body": {
"count-static": 0,
"count-dynamic": 1,
"count-others": 0,
"count-throttle": 0,
"count-total": 1
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<count-static>0</count-static>
<count-dynamic>1</count-dynamic>
<count-others>0</count-others>
<count-throttle>0</count-throttle>
<count-total>1</count-total>
</body>
<input>sh ip adjacency summary</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about about the MPLS TE explicit paths, use the show ip adjacency summary command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ipv6 adjacency vrf
show ipv6 adjacency vrf
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ipv6 adjacency vrf",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ipv6 adjacency vrf vni-51000",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "vni-51000",
"TABLE_afi": {
"ROW_afi": {
"afi": "ipv6",
"count": 1,
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Bdi410",
"ipv6-addr": "41::10",
"time-stamp": "00:00:55",
"mac": "0000.1110.1410",
"pref": 50,
"owner": "icmpv6"
}
}
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out>vni-51000</vrf-name-out>
<TABLE_afi>
<ROW_afi>
<afi>ipv6</afi>
<count>1</count>
<TABLE_adj>
<ROW_adj>
<intf-out>Bdi410</intf-out>
<ipv6-addr>41::10</ipv6-addr>
<time-stamp>00:00:40</time-stamp>
<mac>0000.1110.1410</mac>
<pref>50</pref>
<owner>icmpv6</owner>
</ROW_adj>
</TABLE_adj>
</ROW_afi>
</TABLE_afi>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ipv6 adjacency vrf vni-51000</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about IPv6 adjaceny for a VRF interface, use the show ipv6 adjacency vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ipv6 neighbor vrf
show ipv6 neighbor vrf
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ipv6 neighbor vrf",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"ins_api": {
"type": "cli_show",
"version": "1.2",
"sid": "eoc",
"outputs": {
"output": {
"input": "sh ipv6 neighbor vrf vni-51000",
"msg": "Success",
"code": "200",
"body": {
"TABLE_vrf": {
"ROW_vrf": {
"vrf-name-out": "vni-51000",
"TABLE_afi": {
"ROW_afi": {
"afi": "ipv6",
"count": 1,
"TABLE_adj": {
"ROW_adj": {
"intf-out": "Bdi410",
"ipv6-addr": "41::10",
"time-stamp": "00:02:23",
"mac": "0000.1110.1410",
"pref": 50,
"owner": "icmpv6"
}
}
}
}
}
}
}
}
}
}
}
<?xml version="1.0"?>
<ins_api>
<type>cli_show</type>
<version>1.2</version>
<sid>eoc</sid>
<outputs>
<output>
<body>
<TABLE_vrf>
<ROW_vrf>
<vrf-name-out>vni-51000</vrf-name-out>
<TABLE_afi>
<ROW_afi>
<afi>ipv6</afi>
<count>1</count>
<TABLE_adj>
<ROW_adj>
<intf-out>Bdi410</intf-out>
<ipv6-addr>41::10</ipv6-addr>
<time-stamp>00:02:36</time-stamp>
<mac>0000.1110.1410</mac>
<pref>50</pref>
<owner>icmpv6</owner>
</ROW_adj>
</TABLE_adj>
</ROW_afi>
</TABLE_afi>
</ROW_vrf>
</TABLE_vrf>
</body>
<input>sh ipv6 neighbor vrf vni-51000</input>
<msg>Success</msg>
<code>200</code>
</output>
</outputs>
</ins_api>
To display information about the MPLS TE explicit paths, use the show ipv6 neighbor vrf command. For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp inspection
show ip arp inspection
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp inspection",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"src_mac_valid": 0,
"dest_mac_valid": 0,
"ip_addr_valid": 0,
"TABLE_entry": {
"ROW_entry": [
{
"active_vlan_id": "1",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
},
{
"active_vlan_id": "3",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
},
{
"active_vlan_id": "1001",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
},
{
"active_vlan_id": "4040",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
},
{
"active_vlan_id": "4041",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
},
{
"active_vlan_id": "4044",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
},
{
"active_vlan_id": "4045",
"is_insp_enabled": "disabled",
"oper_state": "inactive",
"is_static_acl": "non-static",
"dhcp_logging": "deny"
}
]
}
}
switch# show ip arp inspection | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
<nf:data>
<show>
<ip>
<arp>
<inspection>
<__XML__OPT_Cmd_show_arp___readonly__>
<__readonly__>
<src_mac_valid>0</src_mac_valid>
<dest_mac_valid>0</dest_mac_valid>
<ip_addr_valid>0</ip_addr_valid>
<TABLE_entry>
<ROW_entry>
<active_vlan_id>1</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
<ROW_entry>
<active_vlan_id>3</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
<ROW_entry>
<active_vlan_id>1001</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
<ROW_entry>
<active_vlan_id>4040</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
<ROW_entry>
<active_vlan_id>4041</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
<ROW_entry>
<active_vlan_id>4044</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
<ROW_entry>
<active_vlan_id>4045</active_vlan_id>
<is_insp_enabled>disabled</is_insp_enabled>
<oper_state>inactive</oper_state>
<is_static_acl>non-static</is_static_acl>
<dhcp_logging>deny</dhcp_logging>
</ROW_entry>
</TABLE_entry>
</__readonly__>
</__XML__OPT_Cmd_show_arp___readonly__>
</inspection>
</arp>
</ip>
</show>
</nf:data>
</nf:rpc-reply>
]]>]]>
For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp inspection interfaces
show ip arp inspection interfaces
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp inspection interfaces",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"intf_header": 0
}
switch# show ip arp inspection interfaces | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
<nf:data>
<show>
<ip>
<arp>
<inspection>
<interfaces>
<__XML__OPT_Cmd_show_arp_intf_intf1>
<__XML__OPT_Cmd_show_arp_intf___readonly__>
<__readonly__>
<intf_header>0</intf_header>
</__readonly__>
</__XML__OPT_Cmd_show_arp_intf___readonly__>
</__XML__OPT_Cmd_show_arp_intf_intf1>
</interfaces>
</inspection>
</arp>
</ip>
</show>
</nf:data>
</nf:rpc-reply>
]]>]]>
For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp inspection log
show ip arp inspection log
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp inspection log",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"log_buff_size": 32,
"log_rate_entries": 5,
"log_rate_interval": 1
}
switch# show ip arp inspection log | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
<nf:data>
<show>
<ip>
<arp>
<inspection>
<log>
<__XML__OPT_Cmd_show_arp_log___readonly__>
<__readonly__>
<log_buff_size>32</log_buff_size>
<log_rate_entries>5</log_rate_entries>
<log_rate_interval>1</log_rate_interval>
</__readonly__>
</__XML__OPT_Cmd_show_arp_log___readonly__>
</log>
</inspection>
</arp>
</ip>
</show>
</nf:data>
</nf:rpc-reply>
]]>]]>
For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
show ip arp inspection statistics
show ip arp inspection statistics
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp inspection statistics",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"TABLE_stats": {
"ROW_stats": {
"vlanid": "1",
"req_fwded": "0",
"res_fwded": "0",
"req_dropped": "0",
"res_dropped": "0",
"dhcp_drops": "0",
"dhcp_permits": "0",
"req_smac_fails": "0",
"res_smac_fails": "0",
"res_dmac_fails": "0",
"req_ip_fails": "0",
"res_ip_fails": "0"
}
}
}
switch# show ip arp inspection statistics | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
<nf:data>
<show>
<ip>
<arp>
<inspection>
<statistics>
<__XML__OPT_Cmd_show_arp_stats_vlan>
<__XML__OPT_Cmd_show_arp_stats___readonly__>
<__readonly__>
<TABLE_stats>
<ROW_stats>
<vlanid>1</vlanid>
<req_fwded>0</req_fwded>
<res_fwded>0</res_fwded>
<req_dropped>0</req_dropped>
<res_dropped>0</res_dropped>
<dhcp_drops>0</dhcp_drops>
<dhcp_permits>0</dhcp_permits>
<req_smac_fails>0</req_smac_fails>
<res_smac_fails>0</res_smac_fails>
<res_dmac_fails>0</res_dmac_fails>
<req_ip_fails>0</req_ip_fails>
<res_ip_fails>0</res_ip_fails>
</ROW_stats>
</TABLE_stats>
</__readonly__>
</__XML__OPT_Cmd_show_arp_stats___readonly__>
</__XML__OPT_Cmd_show_arp_stats_vlan>
</statistics>
</inspection>
</arp>
</ip>
</show>
</nf:data>
</nf:rpc-reply>
]]>]]>
For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|
ARP Req Forwarded = 0 ARP Res Forwarded = 0 ARP Req Dropped = 0 ARP Res Dropped = 0 DHCP Drops = 0 DHCP Permits = 0 SMAC Fails-ARP Req = 0 SMAC Fails-ARP Res = 0 DMAC Fails-ARP Res = 0 IP Fails-ARP Req = 0 IP Fails-ARP Res = 0
show ip arp inspection vlan
show ip arp inspection vlan <vlan-range>
import requests
import json
"""
Modify these please
"""
url='http://<IP_Address>/ins'
switchuser='<User_ID>'
switchpassword='<Password>'
myheaders={'content-type':'application/json'}
payload={
"ins_api":{
"version": "1.0",
"type": "cli_show",
"chunk": "0",
"sid": "1",
"input": "show ip arp inspection vlan 1",
"output_format": "json"
}
response = requests.post(url,data=json.dumps(payload), headers=myheaders,auth=(switchuser,switchpassword)).json()
output = json.dumps(response, indent=4, sort_keys=True)
{
"src_vlan_mac_valid": 0,
"dest_vlan_mac_valid": 0,
"ip_vlan_addr_valid": 0,
"TABLE_vlan": {
"ROW_vlan": {
"active_vlan_id": "1",
"is_insp_enabled": "enabled",
"oper_state": "active",
"dhcp_logging": "deny",
"is_static_acl": "non-static"
}
}
}
switch# show ip arp inspection vlan 1 | xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<nf:rpc-reply xmlns="http://www.cisco.com/nxos:1.0:dhcp_snoop" xmlns:nf="urn:iet
f:params:xml:ns:netconf:base:1.0">
<nf:data>
<show>
<ip>
<arp>
<inspection>
<vlan>
<vlan-range>
<__XML__PARAM_value>1</__XML__PARAM_value>
<__XML__OPT_Cmd_show_arp_vlan___readonly__>
<__readonly__>
<src_vlan_mac_valid>0</src_vlan_mac_valid>
<dest_vlan_mac_valid>0</dest_vlan_mac_valid>
<ip_vlan_addr_valid>0</ip_vlan_addr_valid>
<TABLE_vlan>
<ROW_vlan>
<active_vlan_id>1</active_vlan_id>
<is_insp_enabled>enabled</is_insp_enabled>
<oper_state>active</oper_state>
<dhcp_logging>deny</dhcp_logging>
<is_static_acl>non-static</is_static_acl>
</ROW_vlan>
</TABLE_vlan>
</__readonly__>
</__XML__OPT_Cmd_show_arp_vlan___readonly__>
</vlan-range>
</vlan>
</inspection>
</arp>
</ip>
</show>
</nf:data>
</nf:rpc-reply>
]]>]]>
For command descriptions, see the Cisco Nexus 7000 Series Switches Command References.
Note: This sample output is generated for Cisco Nexus 7000 Series NX-OS Release 8.3(1).
CLI Output |
---|
|