Layer 2 security – DHCP Details, DHCP Snooping

This article is the first of a series explaining layer 2 attacks identification and mitigation techniques, which will be a part of a bigger series discussing Security Infrastructure.