Cisco WS-C3560V2-24TS-E Command Reference - Page 466
show ip verify source, Catalyst 3560 Switch Command Reference,
View all Cisco WS-C3560V2-24TS-E manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 466 highlights
show ip verify source Chapter 2 Catalyst 3560 Switch Cisco IOS Commands show ip verify source Use the show ip verify source user EXEC command to display the IP source guard configuration on the switch or on a specific interface. show ip verify source [interface interface-id] [ | {begin | exclude | include} expression] Syntax Description interface interface-id | begin | exclude | include expression (Optional) Display IP source guard configuration on a specific interface. (Optional) Display begins with the line that matches the expression. (Optional) Display excludes lines that match the expression. (Optional) Display includes lines that match the specified expression. Expression in the output to use as a reference point. Command Modes User EXEC Command History Release 12.2(20)SE Modification This command was introduced. Usage Guidelines Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not appear, but the lines that contain Output appear. Examples This is an example of output from the show ip verify source command: Switch> show ip verify source Interface Filter-type Filter-mode IP-address gi0/1 ip active 10.0.0.1 gi0/1 ip active deny-all gi0/2 ip inactive-trust-port gi0/3 ip inactive-no-snooping-vlan gi0/4 ip-mac active 10.0.0.2 gi0/4 ip-mac active 11.0.0.1 gi0/4 ip-mac active deny-all gi0/5 ip-mac active 10.0.0.3 gi0/5 ip-mac active deny-all Mac-address aaaa.bbbb.cccc aaaa.bbbb.cccd deny-all permit-all permit-all Vlan --------10 11-20 10 11 12-20 10 11-20 In the previous example, this is the IP source guard configuration: • On the Gigabit Ethernet 0/1 interface, DHCP snooping is enabled on VLANs 10 to 20. For VLAN 10, IP source guard with IP address filtering is configured on the interface, and a binding exists on the interface. For VLANs 11 to 20, the second entry shows that a default port is applied on the interface for the VLANs on which IP source guard is not configured. • The Gigabit Ethernet 0/2 interface is configured as trusted for DHCP snooping. • On the Gigabit Ethernet 0/3 interface, DHCP snooping is not enabled on the VLANs to which the interface belongs. 2-434 Catalyst 3560 Switch Command Reference 78-16405-05