Using Port Security Enabling port security eavesdrop-prevention Configuring DHCP snooping Enabling Dynamic ARP protection Enabling Dynamic IP Lockdown Removing MAC Addresses Removing a MAC Address from the Authorized list for a port Clear MAC address table Deploying MAC Lockdown Adding an IP-to-MAC Binding to the DHCP Database Verifying the dynamic IP lockdown configuration Adding a MAC Address to a port Checking for intrusions, listing intrusion alerts, and resetting alert flags (CLI) Using the event log to find intrusion alerts CLI