Precedence of Port-based security options

Where the switch is running multiple security options, it implements network traffic security based on the OSI (Open Systems Interconnection model) precedence of the individual options, from the lowest to the highest. The following list shows the order in which the switch implements configured security features on traffic moving through a given port.

Procedure
  1. Disabled/Enabled physical port
  2. MAC lockout (applies to all ports on the switch.)
  3. MAC lockdown
  4. Port security
  5. Authorized IP Managers
  6. Application features at higher levels in the OSI model, such as SSH.

The above list does not address the mutually exclusive relationship that exists among some security features.