This document explains switchport port security features including modes (protect, restrict, shutdown), sticky addresses, maximum hosts, and violations. It provides examples of configuring port security on a switch port to secure access and detect unauthorized devices. Key steps include enabling port security on an interface, setting the maximum hosts, selecting the violation mode, and using sticky learning to automatically secure learned MAC addresses.