Module Summary To secure network access at Layer 2, follow these steps: Protect administrative access to the switch. Protect the switch management port. Turn off unused network services. Lock down the ports. Use Cisco Catalyst switch security features. VLAN hopping, STP manipulation, ARP spoofing, CAM table overflow, and MAC spoofing are the Layer 2 attacks used to compromise LANs. Port security used along with security best practices will mitigate against these attacks. Cisco Catalyst switch security features greatly reduce the chances of network attack. WLANs are secured by applying 802.11i mechanisms, which include 802.1x authentication.