Summary

This module discussed vulnerabilities and attacks that are specific to Layer 2 of the OSI model. Several types of Layer 2 attacks were introduced along with steps that can be taken to mitigate them. Students should now be able to discuss the types of Layer 2 network attacks that can be mitigated using Cisco IOS commands. Students should be able to describe how CAM table overflow is used in a network attack, as well as how to prevent CAM table overflow. Students should understand MAC spoofing attacks and how to prevent them. Students should also be able to explain how DHCP can be used in a network attack.