(The attacks and deceptions mentioned above mainly come from the second layer of the network. In the actual network environment, its origin can be integrated into two paths: human execution, virus or worm. Human execution usually refers to using some hacker's tools to scan and sniff the network, obtain management accounts and related passwords, install Trojan horses on the network, and then further steal confidential documents. The attack and deception process is usually relatively shadowy and quiet, but the damage to enterprises with high information security requirements is great. Trojan and worm attacks are not only attacks and deceptions, but also bring about increased network traffic, high CPU utilization of devices, L2 spanning tree loops, and network paralysis.
This document includes the following attachments:
Layer 2 attack introduction and prevention methods.pdf
Including multiple files, please download and test by yourself!)