1 Port Security Configuration······················································································································1-1
Introduction to Port Security····················································································································1-1
Port Security Overview ····················································································································1-1
Port Security Features·····················································································································1-2
Port Security Modes ························································································································1-2
Enabling Port Security·····························································································································1-5
Configuration Prerequisites ·············································································································1-5
Configuration Procedure··················································································································1-5
Configuration Prerequisites ·············································································································1-6
Configuring Procedure·····················································································································1-7
Configuring NTK ······························································································································1-7
Configuring Trapping ·······················································································································1-9
Configuration Prerequisites ·············································································································1-9
Configuration Procedure··················································································································1-9
Table of Contents
i