The only thing I can think of is to do command authorization and only allow the users to go under the interfaces that are access ports and not authorize him to do "interface " for the trunk interfaces.
I hope it helps.
PK
Learn, share, save
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.