Hello,I was watching several L2 attacks like:MAC flooding attacks/CAM table overflowARP Spoofing/PoisoningOther Security Subjects,DHCP Server SpoofingMAC address spoofingSome of them can be mitigated with por example Port security others by DHCP snoo...