hit counter script

Cisco Catalyst 3560-X Software Configuration Manual page 838

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Configuring Smart Logging
Enabling Smart Logging for Dynamic ARP Inspection Violations
Dynamic ARP inspection intercepts ARP packets on untrusted ports and validates them before
forwarding. The functionality is similar to DHCP snooping but for ARP packets. You can configure
dynamic ARP inspection logging by using the ip arp inspection log-buffer global configuration
command. By default, all dropped packets are logged. You can also configure the switch to apply smart
logging to the same packets that are being logged, sending the packet contents packet to the NetFlow
collector.
Beginning in privileged EXEC mode, follow these steps to enable dynamic ARP inspection smart
logging:
Command
Step 1
configure terminal
Step 2
ip arp inspection smartlog
Step 3
end
Step 4
show ip arp inspection
Step 5
copy running-config startup-config
Enabling Smart Logging for IP Source Guard Violations
IP source guard is a security feature related to DHCP snooping. You can use IP source guard to filter
traffic based on the IP source address or the MAC address. All IP packets with a source address other
than the specified address or addresses learned through DHCP snooping are denied. You can enable IP
source guard smart logging to send the contents of the denied packets to the NetFlow collector.
Beginning in privileged EXEC mode, follow these steps to enable IP source guard smart logging:
Command
Step 1
configure terminal
Step 2
interface interface-id
Step 3
ip verify source smartlog
Step 4
end
Step 5
show ip verify source
Step 6
copy running-config startup-config
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
1-16
Chapter 1
Purpose
Enter global configuration mode.
Specify that whatever packets are currently being logged (the default is all
dropped packets) are also smart-logged.
Return to privileged EXEC mode.
Verify the configuration.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
Specify an interface and enter interface configuration mode.
Enable IP source guard smart logging for all packets that are denied by IP
source guard.
Return to privileged EXEC mode.
Verify your entries. The output shows whether or not smart logging is
enabled on the interface.
(Optional) Save your entries in the configuration file.
Configuring System Message Logging and Smart Logging
OL-25303-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents