1-16
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring System Message Logging and Smart Logging
Configuring Smart Logging
Enabling Smart Logging for Dynamic ARP Inspection Violations
Dynamic ARP inspection intercepts ARP packets on untrusted ports and validates them before
forwarding. The functionality is similar to DHCP snooping but for ARP packets. You can configure
dynamic ARP inspection logging by using the ip arp inspection log-buffer global configuration
command. By default, all dropped packets are logged. You can also configure the switch to apply smart
logging to the same packets that are being logged, sending the packet contents packet to the NetFlow
collector.
Beginning in privileged EXEC mode, follow these steps to enable dynamic ARP inspection smart
logging:
Enabling Smart Logging for IP Source Guard Violations
IP source guard is a security feature related to DHCP snooping. You can use IP source guard to filter
traffic based on the IP source address or the MAC address. All IP packets with a source address other
than the specified address or addresses learned through DHCP snooping are denied. You can enable IP
source guard smart logging to send the contents of the denied packets to the NetFlow collector.
Beginning in privileged EXEC mode, follow these steps to enable IP source guard smart logging:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ip arp inspection smartlog Specify that whatever packets are currently being logged (the default is all
dropped packets) are also smart-logged.
Step 3
end Return to privileged EXEC mode.
Step 4
show ip arp inspection Verify the configuration.
Step 5
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Specify an interface and enter interface configuration mode.
Step 3
ip verify source smartlog Enable IP source guard smart logging for all packets that are denied by IP
source guard.
Step 4
end Return to privileged EXEC mode.
Step 5
show ip verify source Verify your entries. The output shows whether or not smart logging is
enabled on the interface.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.