Port Security Overview ······························································································· 1-1
Introduction ·········································································································· 1-1
Port Security Modes ····························································································· 1-2
Port Security Features ·························································································· 1-8
Enabling Port Security ·························································································· 1-9
Port Binding Overview ································································································ 2-1
Introduction ·········································································································· 2-1
Port Binding Configuration Example ······································································ 2-2
Table of Contents
i