1 Port Security Configuration······················································································································1-1
Port Security Overview····························································································································1-1
Introduction······································································································································1-1
Port Security Features·····················································································································1-1
Port Security Modes ························································································································1-1
Enabling Port Security ·····················································································································1-4
Port Security Configuration Example ····························································································1-10
2 Port Binding Configuration ······················································································································2-1
Port Binding Overview·····························································································································2-1
Introduction······································································································································2-1
Configuring Port Binding ·················································································································2-1
Port Binding Configuration Example ·······························································································2-2
Table of Contents
i