This document discusses layer 2 security attacks on Ethernet switches and their mitigation. It begins with an overview of layer 2 attacks and caveats. It then discusses specific MAC address attacks like CAM overflow attacks, which can be used to flood a switch's CAM table and cause traffic to flood on a VLAN. The document recommends port security features on switches to mitigate MAC flooding attacks by limiting the number of MAC addresses that can be learned or used on a particular port.