This command is used to configure the action to be taken when a security violation occurs on a port. The authentication violation can occur when a device tries to connect to a port where maximum number of devices has been exceeded.
| Default | Restrict |
| Format | authentication violation { protect | restrict | shutdown } |
| Mode | Interface Config |