Ahmed Eldeeb No Comments

Mac Flooding Attack , Port Security and Deployment Considerations

This article is the 4th in Layer 2 security series. We will be discussing a very common layer 2 attack

which is MAC flooding and its TMtigation “Port Security MAC limiting”

If you didn’t read the previous 3 articles; DHCP snooping, Dynamic ARP Inspection, and IP Source

Guard; I recommend that you take a quick look at them just to get an overview on layer 2 security. Read more