Table of Contents
1 Port Security Commands··························································································································1-1
Port Security Commands ························································································································1-1
display port-security·························································································································1-2
mac-address security ······················································································································1-5
port-security enable ·························································································································1-7
port-security guest-vlan ···················································································································1-8
port-security intrusion-mode ············································································································1-9
port-security max-mac-count·········································································································1-11
port-security ntk-mode···················································································································1-12
port-security oui ·····························································································································1-13
port-security port-mode ·················································································································1-14
port-security trap····························································································································1-19
i