Precedence of security options
This section explains how port-based security options, and client-based attributes used for authentication, get prioritized on the switch.
This section explains how port-based security options, and client-based attributes used for authentication, get prioritized on the switch.