Restrictions and guidelines: Port security configuration
This feature applies to networks, such as a WLAN, that require different authentication methods for different users on a port.
As a best practice, use the 802.1X authentication or MAC authentication feature rather than port security for scenarios that require only 802.1X authentication or MAC authentication. For more information about 802.1X and MAC authentication, see "Configuring 802.1X" and "Configuring MAC authentication."
Port security settings are supported only on Layer 2 Ethernet interfaces that do not belong to a Layer 2 aggregation group.