1-24
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring DHCP Features and IP Source Guard
Configuring IP Source Guard
This example displays all inactive IP or MAC binding entries for all interfaces. The host was first learned
on GigabitEthernet 1/0/1 and then moved to GigabitEthernet 0/2. the IP or MAC binding entries learned
on GigabitEthernet1/ 0/1 are marked as inactive.
Switch# show ip device tracking all inactive
IP Device Tracking = Enabled
IP Device Tracking Probe Count = 3
IP Device Tracking Probe Interval = 30
---------------------------------------------------------------------
IP Address MAC Address Vlan Interface STATE
---------------------------------------------------------------------
200.1.1.8 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.9 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.10 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.1 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.2 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.3 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.4 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.5 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.6 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
200.1.1.7 0001.0600.0000 8 GigabitEthernet1/0/1 INACTIVE
This example displays the count of all IP device tracking host entries for all interfaces:
Switch# show ip device tracking all count
Total IP Device Tracking Host entries: 5
---------------------------------------------------------------------
Interface Maximum Limit Number of Entries
---------------------------------------------------------------------
Gi1/0/3 5
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port
Note You must globally configure the ip device tracking maximum limit-number interface configuration
command globally for IPSG for static hosts to work. If you only configure this command on a port
without enabling IP device tracking globally or setting an IP device tracking maximum on that interface,
IPSG with static hosts will reject all the IP traffic from that interface. This requirement also applies to
IPSG with static hosts on a Layer 2 access port.
Beginning in privileged EXEC mode, follow these steps to configure IPSG for static hosts with IP filters
on a Layer 2 access port:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
vlan vlan-id1 Enter VLAN configuration mode.
Step 3
private-vlan primary Establish a primary VLAN on a private VLAN port.
Step 4
exit Exit VLAN configuration mode.
Step 5
vlan vlan-id2 Enter configuration VLAN mode for another VLAN.
Step 6
private-vlan isolated Establish an isolated VLAN on a private VLAN port.
Step 7
exit Exit VLAN configuration mode.
Step 8
vlan vlan-id1 Enter configuration VLAN mode.
Step 9
private-vlan association 201 Associate the VLAN on an isolated private VLAN port.