306
IP source guard configuration commands
NOTE:
ï‚· In this chapter, the term
Layer 3 Ethernet interface
refers to Ethernet interfaces working in Layer 3 mode. For
information about working mode switching, see the
Layer 2—LAN Switching Configuration Guide
.
ï‚· The A5500 SI Switch Series does not support Layer 3 Ethernet interface.
display ip check source
Syntax
display ip check source [ ipv6 ] [ interface interface-type interface-number | ip-address ip-address | mac-
address mac-address ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
ipv6: Displays the dynamic IPv6 source guard binding entries. Without this keyword, the command
displays the dynamic IPv4 source guard binding entries.
interface interface-type interface-number: Displays the dynamic binding entries of the interface specified
by its type and number.
ip-address ip-address: Displays the dynamic binding entries of an IP address.
mac-address mac-address: Displays the dynamic binding entries of an MAC address (in the format H-H-
H).
slot slot-number: Displays the dynamic bindings on an IRF member switch. The slot-number argument
represents the IRF member ID of the switch, which you can display with the display irf command. The
value range for the slot-number argument depends on the number of members and numbering conditions
in the current IRF fabric. If no IRF fabric exists, the slot-number argument is the current device number.
|: Filters command output by specifying a regular expression. For more information about regular
expressions, see the Fundamentals Configuration Guide.
begin: Displays the first line that matches the specified regular expression and all lines that follow.
exclude: Displays all lines that do not match the specified regular expression.
include: Displays all lines that match the specified regular expression.
regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Description
Use the display ip check source command to display dynamic IP source guard binding entries: