Layer 2 security – DHCP Details, DHCP Snooping
This article is the first of a series explaining layer 2 attacks identification and mitigation techniques, which will be a part of a bigger series discussing Security Infrastructure.
We will be discussing the most common attacks and how to mitigate them; but more important, we will discuss deployment and design considerations.
During this series of articles, I will follow two different approaches;
1) Explain attacks related to OSI model layers (Like this layer2 security series)
2) Securing a specific traffic flow (Like securing user Internet traffic)
There will also be video lectures, webinars, and open discussions at the end of each major part. If you are interested in security infrastructure architecture, stay tuned.