I am not quite fond of layer 2 security features as they appear to be simple and easy to understand rather than to implement.
Kindly help me on a layer 2 security query,
We have a single switch network:
External
^
|
|
FW
|
|
Core switch
^
|
|
Insid...