Port security Basic operation Eavesdrop Prevention Blocked unauthorized traffic Overview Trunk group exclusion Planning port security Port security command options and operation Configuring port security Lock a MAC to a port-VLAN pair Retention of static addresses Clear MAC address table