Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
The only thing I can think of is to do command authorization and only allow the users to go under the interfaces that are access ports and not authorize him to do "interface " for the trunk interfaces.
I hope it helps.
PK
Learn, share, save
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.