Using Port Security Enabling port security eavesdrop-prevention Configuring DHCP snooping Enabling Dynamic ARP protection Enabling Dynamic IP Lockdown Removing MAC Addresses Removing a MAC Address from the Authorized list for a port Clear MAC address table Deploying MAC Lockdown Adding an IP-to-MAC Binding to the DHCP Database Verifying the dynamic IP lockdown configuration Adding a MAC Address to a port Checking for intrusions, listing intrusion alerts, and resetting alert flags (CLI) Checking for intrusions, listing intrusion alerts, and resetting alert flags (Menu) Using the event log to find intrusion alerts CLI Using the event log to find intrusion alerts menu