Purpose
Command or Action
Returns to user EXEC mode.
end
Example:
Device(config-if-srv)# end
Step 9
Configuring a MAC Address Violation
Perform this task to specify the expected behavior of a device when an attempt to dynamically learn a MAC
address fails because the configured MAC security policy on the service instance was violated.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
interface type number
4.
service instance id
ethernet
5.
encapsulation dot1q vlan-id
6.
bridge-domain bridge-id
7.
Do one of the following:
•
mac security violation restrict
•
mac security violation protect
8.
mac security
9.
end
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example:
Device> enable
•
Enter your password if prompted.
Enters global configuration mode.
configure terminal
Example:
Device# configure terminal
Step 2
Carrier Ethernet Configuration Guide (Cisco ASR 920 Series)
101
Configuring MAC Address Limiting on Service Instances Bridge Domains and EVC Port Channels
Configuring a MAC Address Violation
Содержание ASR 920 series
Страница 2: ... 2014 Cisco Systems Inc All rights reserved ...
Страница 273: ...Carrier Ethernet Configuration Guide Cisco ASR 920 Series 255 Configuring Ethernet CFM Designing CFM Domains ...
Страница 302: ...Carrier Ethernet Configuration Guide Cisco ASR 920 Series 284 Configuring Ethernet CFM Glossary ...