This article is the 4th in Layer 2 security series. We will be discussing a very common layer 2 attack
which is MAC flooding and its TMtigation “Port Security MAC limiting”
If you didn’t read the previous 3 articles; DHCP snooping, Dynamic ARP Inspection, and IP Source
Guard; I recommend that you take a quick look at them just to get an overview on layer 2 security. Read more