Precedence of security options

This section explains how port-based security options, and client-based attributes used for authentication, get prioritized on the switch.