Port security configuration examples