Configuring A Mac Address Violation - Cisco ASR 920 Series Configuration Manual Ethernet Router

Hide thumbs Also See for ASR 920 Series:
Table of Contents

Advertisement

Configuring MAC Address Limiting on Service Instances Bridge Domains and EVC Port Channels
Command or Action
Step 9
end
Example:
Device(config-if-srv)# end

Configuring a MAC Address Violation

Perform this task to specify the expected behavior of a device when an attempt to dynamically learn a MAC
address fails because the configured MAC security policy on the service instance was violated.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. service instance id
5. encapsulation dot1q vlan-id
6. bridge-domain bridge-id
7. Do one of the following:
8. mac security
9. end
DETAILED STEPS
Command or Action
Step 1
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
ethernet
• mac security violation restrict
• mac security violation protect
Configuring a MAC Address Violation
Purpose
Returns to user EXEC mode.
Purpose
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Carrier Ethernet Configuration Guide (Cisco ASR 920 Series)
101

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents