Configuring IP Source Guard
Command
or ip verify source port-security
Step 4
exit
Step 5
ip source binding mac-address vlan
vlan-id ip-address inteface interface-id
Step 6
end
Step 7
show ip verify source [interface
interface-id]
Step 8
show ip source binding [ip-address]
[mac-address] [dhcp-snooping | static]
[inteface interface-id] [vlan vlan-id]
Step 9
copy running-config startup-config
To disable IP source guard with source IP address filtering, use the no ip verify source interface
configuration command.
To delete a static IP source binding entry, use the no ip source global configuration command.
This example shows how to enable IP source guard with source IP and MAC filtering on VLANs 10
and 11:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# ip verify source port-security
Switch(config-if)# exit
Switch(config)# ip source binding 0100.0022.0010 vlan 10 10.0.0.2 interface
gigabitethernet0/1
Switch(config)# ip source binding 0100.0230.0002 vlan 11 10.0.0.4 interface
gigabitethernet0/1
Switch(config)# end
Configuring IP Source Guard for Static Hosts
•
•
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
1-20
Purpose
Enable IP source guard with source IP and MAC address filtering.
When you enable both IP source guard and port security by using the ip
verify source port-security interface configuration command, there are
two caveats:
Return to global configuration mode.
Add a static IP source binding.
Enter this command for each static binding.
Return to privileged EXEC mode.
Verify the IP source guard configuration.
Display the IP source bindings on the switch, on a specific VLAN, or on
a specific interface.
(Optional) Save your entries in the configuration file.
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port, page 1-21
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port, page 1-24
Chapter 1
The DHCP server must support option 82, or the client is not
•
assigned an IP address.
The MAC address in the DHCP packet is not learned as a secure
•
address. The MAC address of the DHCP client is learned as a secure
address only when the switch receives non-DHCP data traffic.
Configuring DHCP Features and IP Source Guard
OL-25303-03