 | |
| Introduction to Layer 2 Attacks |
|
 | |
| Types of attacks |
|
 |
| MAC Address, ARP, and DHCP Vulnerabilities |
|
 | |
| CAM table overflow attack |
 |
| Mitigating the CAM table overflow attack |
 |
| MAC spoofing – man in the middle attacks |
 |
| Mitigating MAC spoofing attacks |
 |
| Using dynamic ARP inspection to mitigate MAC spoofing attacks |
 |
| DHCP starvation attacks |
 |
| Mitigating DHCP starvation attacks |
|
 |
| VLAN Vulnerabilities |
|
 | |
| VLAN hopping attacks |
 |
| Mitigating VLAN hopping attacks |
 |
| Private VLAN vulnerabilities |
 |
| Defending private VLANs |
|
 |
| Spanning-Tree Protocol Vulnerabilities |
|
 | |
| Spanning-Tree Protocol vulnerabilities |
 |
| Preventing Spanning-Tree Protocol manipulation |
|
 |