Common Layer 2 Attacks

  • Describe Layer 2 security using Cisco switches
  • Describe VLAN security
  • Implement VLANs and trunking
  • Implement spanning tree