1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview ····················································································································1-1
Port Security Features·····················································································································1-1
Port Security Modes ························································································································1-2
Support for Guest VLAN··················································································································1-5
Enabling Port Security·····························································································································1-5
Configuration Prerequisites ·············································································································1-5
Configuration Procedure··················································································································1-5
Configuration Prerequisites ·············································································································1-7
Configuring Procedure·····················································································································1-7
Configuring NTK ······························································································································1-8
Configuring Trapping ·······················································································································1-9
Configuration Prerequisites ···········································································································1-10
Configuration Procedure················································································································1-10
Table of Contents
i