Debugging dynamic IP lockdown
To enable the debugging of packets dropped by dynamic IP lockdown, enter the
debug dynamic-ip-lockdown
command.
Syntax:
debug dynamic-ip-lockdown
To send command output to the active CLI session, enter the
debug destination session
command.
Counters for denied packets are displayed in the
debug dynamic-ip-lockdown
command output. Packet counts are updated every five minutes. An example of the command output is shown in
Output for the debug dynamic-ip-lockdown command.
When dynamic IP lockdown drops IP packets in VLAN traffic that do not contain a known source IP-to-MAC address binding for the port on which the packets are received, a message is entered in the event log.
Output for the debug dynamic-ip-lockdown command
switch(config)# debug dynamic-ip-lockdown DIPLD 01/01/90 00:01:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 1 packets DIPLD 01/01/90 00:06:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 294 packets DIPLD 01/01/90 00:11:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 300 packets DIPLD 01/01/90 00:16:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 300 packets DIPLD 01/01/90 00:21:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 299 packets DIPLD 01/01/90 00:26:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 300 packets DIPLD 01/01/90 00:31:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 300 packets DIPLD 01/01/90 00:36:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 299 packets DIPLD 01/01/90 00:41:25 : denied ip 192.168.2.100 (0) (PORT 4) -> 192.168.2.1 (0), 300 packets