Use the procedures in this section to configure the security list to manage the port members in a security list.