The deception aci lack decoy command sets the policy used in the case of a full ACI table to deceive.
The undo deception aci lack decoy sets the policy used in the case of a full ACI table to permit.
The policy used in the case of a full ACI table is permit by default.
The ACI table is space-limited. If there are a large number of intranet DNS requests and the ACI table cannot store new mappings, traffic will be deceived or permitted based on the configuration of this command.
To prevent a full ACI table, you can run the deception aci timeout command to set a shorter aging time for ACI entries.