Key Name | Type | Required |
---|---|---|
protect_log |
bool | None |
Log new addresses seen after limit is reached in protect mode.
NOTE: We are using the same format as jq to specify the path to the key.
.custom_platform_settings[].structured_config.ethernet_interfaces[].switchport.port_security.violation.protect_log