This is the 3rd and last part of Layer 2 Security. We have already discussed MAC Attacks, VLAN Hopping attacks in Part 1 and DHCP Attacks, and GARP Attacks in Part 2. If you really need to secure your Layer-2 of the network, then please follow all the parts, and apply Layer-2 Security in your […]