This section describes the procedure you can use to configure the security list to manage the port members in a security list.