Cisco 3032 Software Configuration Manual page 575

Hide thumbs Also See for 3032:
Table of Contents

Advertisement

Chapter 22
Configuring DHCP Features and IP Source Guard
Beginning in privileged EXEC mode:
Command
Step 1
configure terminal
Step 2
ip device tracking
Step 3
interface interface-id
Step 4
switchport mode access
Step 5
switchport access vlan vlan-id
Step 6
ip verify source tracking port-security
Step 7
ip device tracking maximum number
Step 8
switchport port-security
Step 9
switchport port-security maximum value
Step 10
end
Step 11
show ip verify source interface interface-id
Step 12
show ip device track all
[active | inactive] count
This example shows how to stop IPSG with static hosts on an interface.
Switch(config-if)# no ip verify source
Switch(config-if)# no ip device tracking max
OL-12247-04
Purpose
Enter global configuration mode.
Turn on the IP host table, and globally enable IP device
tracking.
Enter interface configuration mode.
Configure a port as access.
Configure the VLAN for this port.
Enable IPSG for static hosts with MAC address filtering.
Note
Establish a maximum limit for the number of static IPs
that the IP device tracking table allows on the port. The
range is 1to 10. The maximum number is 10.
Note
(Optional) Activate port security for this port.
(Optional) Establish a maximum of MAC addresses for
this port.
Return to privileged EXEC mode.
Verify the configuration and display IPSG permit ACLs
for static hosts.
Verify the configuration by displaying the IP-to-MAC
binding for a given host on the switch interface.
all active—display only the active IP or MAC
binding entries
all inactive—display only the inactive IP or MAC
binding entries
all—display the active and inactive IP or MAC
binding entries
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
Configuring IP Source Guard
When you enable both IP source guard and port
security by using the ip verify source
port-security interface configuration command:
The DHCP server must support option 82, or
the client is not assigned an IP address.
The MAC address in the DHCP packet is not
learned as a secure address. The MAC address
of the DHCP client is learned as a secure
address only when the switch receives
non-DHCP data traffic.
You must configure the ip device tracking
maximum limit-number interface configuration
command.
22-21

Advertisement

Table of Contents
loading

This manual is also suitable for:

3130

Table of Contents