This document discusses switch security and port security configuration. It covers common physical threats to switches, configuring passwords and login banners to restrict access. It also discusses the differences between Telnet and SSH access, and how to configure port security on Cisco switches to limit MAC addresses per port and shut down unused ports. Configuring port security involves setting port security on an interface, specifying the maximum number of MAC addresses allowed, and the violation mode. The show commands can be used to verify the port security configuration and display the secure MAC addresses.