11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sip arp inspection trustip arp inspection trustUse the ip arp inspection trust interface configuration comm<strong>and</strong> on the switch stack or on a st<strong>and</strong>aloneswitch to configure an interface trust state that determines which incoming Address Resolution Protocol(ARP) packets are inspected. Use the no form of this comm<strong>and</strong> to return to the default setting.ip arp inspection trustno ip arp inspection trustThis comm<strong>and</strong> is available only if your switch is running the IP services feature set.Syntax DescriptionThis comm<strong>and</strong> has no arguments or keywords.DefaultsThe interface is untrusted.Comm<strong>and</strong> ModesInterface configurationComm<strong>and</strong> HistoryRelease12.2(35)SE2ModificationThis comm<strong>and</strong> was introduced.Usage GuidelinesThe switch does not check ARP packets that it receives on the trusted interface; it simply forwards thepackets.For untrusted interfaces, the switch intercepts all ARP requests <strong>and</strong> responses. It verifies that theintercepted packets have valid IP-to-MAC address bindings before updating the local cache <strong>and</strong> beforeforwarding the packet to the appropriate destination. The switch drops invalid packets <strong>and</strong> logs them inthe log buffer according to the logging configuration specified with the ip arp inspection vlan loggingglobal configuration comm<strong>and</strong>.ExamplesThis example shows how to configure a port to be trusted:<strong>Switch</strong>(config)# interface gigabitethernet1/0/1<strong>Switch</strong>(config-if)# ip arp inspection trustYou can verify your setting by entering the show ip arp inspection interfaces interface-id privilegedEXEC comm<strong>and</strong>.OL-9776-08<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> Reference2-221

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!