2-770
Catalyst 4500 Series Switch Cisco IOS Command Reference—Release IOS XE 3.4.0SG and IOS 15.1(2)SG)
OL-27596 -01
Chapter 2 Cisco IOS Commands for the Catalyst 4500 Series Switches
show ip verify source
• This output appears when you enter the show ip verify source interface fa6/4 command and the
interface fa6/4 has an IP source filter mode that is configured as IP MAC and the existing IP MAC
that binds 10.0.0.2/aaaa.bbbb.cccc on VLAN 10 and 11.0.0.1/aaaa.bbbb.cccd on VLAN 11:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/4 ip-mac active 10.0.0.2 aaaa.bbbb.cccc 10
fa6/4 ip-mac active 11.0.0.1 aaaa.bbbb.cccd 11
fa6/4 ip-mac active deny-all deny-all 12-20
• This output appears when you enter the show ip verify source interface fa6/5 command and the
interface fa6/5 has IP source filter mode that is configured as IP MAC and existing IP MAC binding
10.0.0.3/aaaa.bbbb.ccce on VLAN 10, but port security is not enabled on fa6/5:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/5 ip-mac active 10.0.0.3 permit-all 10
fa6/5 ip-mac active deny-all permit-all 11-20
Note Enable port security first because the DHCP security MAC filter cannot apply to the port or
VLAN.
• This output appears when you enter the show ip verify source interface fa6/6 command and the
interface fa6/6 does not have IP source filter mode that is configured:
DHCP security is not configured on the interface fa6/6.
This example shows how to display all the interfaces on the switch that have DHCP snooping security
and IP Port Security tracking enabled with the show ip verify source command.
The output is an accumulation of per-interface show CLIs:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/1 ip active 10.0.0.1 10
fa6/1 ip active deny-all 11-20
fa6/2 ip inactive-trust-port
Fa6/3 ip trk active 40.1.1.24 10
Fa6/3 ip trk active 40.1.1.20 10
Fa6/3 ip trk active 40.1.1.21 10
fa6/4 ip-mac active 10.0.0.2 aaaa.bbbb.cccc 10
fa6/4 ip-mac active 11.0.0.1 aaaa.bbbb.cccd 11
fa6/4 ip-mac active deny-all deny-all 12-20
fa6/5 ip-mac active 10.0.0.3 permit-all 10
fa6/5 ip-mac active deny-all permit-all 11-20