Abstract:
Data Link layer, Layer 2 of the OSI Model is considered as the weakest link in a secured network. According to the domino effect, if an initial attack occurs at layer 2, the whole network system can be compromised. To demonstrate the weakness of Layer 2 network, some attacking tools are discussed. Although paper strongly against malicious attacks and use prevention, detection and mitigation technique to the network, the best way to protect a network is to know how it can be attacked. Network communication in LAN can use peripherals hub, switch and bridge. Paper presented switch can provide about 90 percent of security features environment. The main purpose of paper is to discuss the mitigation of security attacks in Layer2/L2 switching by using practical examples so that easy to understand with scenarios. The final part of paper is configuration command-practice for hardening layer 2 security attacks and their mitigations.