Purpose
Command or Action
Exits interface configuration mode and returns to
privileged EXEC mode.
end
Example:
Device(config-if)# end
Step 10
Specifying the Security Violation Mode
When there is a security violation on a port, the port can be shut down or traffic can be restricted. By default,
the port is shut down. You can configure the period of time for which the port is shut down.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
interface type slot / port
4.
switchport
5.
switchport mode
access
6.
authentication port-control auto
7.
mab
[
eap
]
8.
authentication violation
{
restrict
|
shutdown
}
9.
authentication timer restart seconds
10.
end
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example:
Device> enable
•
Enter your password if prompted.
Enters global configuration mode.
configure terminal
Example:
Device# configure terminal
Step 2
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1047
How to Configure MAC Authentication Bypass
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......