(The most commonly used understanding of port security is that network traffic can be controlled and managed based on MAC addresses. For example, MAC addresses are bound to specific ports to limit the number of MAC addresses that can pass through specific ports. Allow frame traffic for certain MAC addresses to pass.)