• Implementing port security features.
  • Mitigating common Layer 2 security threats.