Purpose
Command or Action
Returns to user EXEC mode.
end
Example:
Device(config-if-srv)# end
Step 9
Configuring a MAC Address Violation
Perform this task to specify the expected behavior of a device when an attempt to dynamically learn a MAC
address fails because the configured MAC security policy on the service instance was violated.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
interface type number
4.
service instance id
ethernet
5.
encapsulation dot1q vlan-id
6.
bridge-domain bridge-id
7.
Do one of the following:
•
mac security violation restrict
•
mac security violation protect
8.
mac security
9.
end
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example:
Device> enable
•
Enter your password if prompted.
Enters global configuration mode.
configure terminal
Example:
Device# configure terminal
Step 2
Layer 2 Configuration Guide for Cisco NCS 4200 Series
53
Configuring MAC Address Security on Service Instances and EVC Port Channels
Configuring a MAC Address Violation