iTable of Contents1 Port Security Configuration······················································································································1-1Port Security Overview····························································································································1-1Introduction······································································································································1-1Port Security Features·····················································································································1-1Port Security Modes ························································································································1-1Port Security Configuration Task List······································································································1-4Enabling Port Security ·····················································································································1-5Setting the Maximum Number of MAC Addresses Allowed on a Port ············································1-5Setting the Port Security Mode········································································································1-6Configuring Port Security Features ·································································································1-7Configuring Guest VLAN for a Port in macAddressOrUserLoginSecure mode ······························1-8Ignoring the Authorization Information from the RADIUS Server····················································1-9Configuring Security MAC Addresses ···························································································1-10Displaying and Maintaining Port Security Configuration·······································································1-11Port Security Configuration Example ····································································································1-12Port Security Configuration Example ····························································································1-12Guest VLAN Configuration Example ·····························································································1-132 Port Binding Configuration ······················································································································2-1Port Binding Overview·····························································································································2-1Introduction······································································································································2-1Configuring Port Binding ·················································································································2-1Displaying and Maintaining Port Binding Configuration··········································································2-2Port Binding Configuration Example ·······································································································2-2Port Binding Configuration Example ·······························································································2-2