This document discusses port security on switches. It describes switches as devices that forward data from input and output ports to their destinations. It outlines different types of port security including dynamic, static, and sticky MAC address configurations. It also discusses what causes port security violations and the different violation modes of shutdown, protect, and restrict.