Explore Layer 2 attacks, security best practices, and how to identify some common Layer 2 attacks. Examine port security on a Cisco switch, how to configure it, and how to verify the configuration.
SWITCH 2.0 : L2 Attacks and Port Security
- describe Layer 2 attacks and related security best practices
- describe port security on a Cisco switch and configure and verify port security