Chapter 2
Catalyst 3750-X and 3560-X Switch Cisco IOS Commands
ip device tracking maximum
Use the ip device tracking maximum command to enable IP port security binding tracking on a
Layer 2 port. Use the no form of this command to disable IP port security on untrusted Layer 2
interfaces.
Syntax Description
number
Defaults
This command has no default setting.
Command Modes
Interface configuration mode
Command History
Release
12.2(53)SE2
Examples
This example shows how to enable IP port security with IP-MAC filters on a Layer 2 access port:
Switch# configure terminal
Enter configuration commands, one per line.
Switch(config)# ip device tracking
Switch(config)# interface gigabitethernet1/0/3
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 1
Switch(config-if)# ip device tracking maximum 5
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 5
Switch(config-if)# ip verify source tracking port-security
Switch(config-if)# end
You can verify your settings by entering the show ip verify source privileged EXEC command.
Related Commands
Command
ip verify source
show ip verify source
OL-29704-01
ip device tracking maximum {number}
no ip device tracking maximum {number}
Specify the number of bindings created in the IP device tracking table for a port. valid
values are from 0 to 2048.
Modification
This command was introduced.
End with CNTL/Z.
Description
Enables IP source guard on untrusted Layer 2 interfaces.
Displays the IP source guard configuration and filters on a
particular interface.
Catalyst 3750-X and 3560-X Switch Command Reference
ip device tracking maximum
2-261