Layer 2 Security Configuration Using the CLI

Use the following sections to help you configure Layer 2 security features and protect the network by mitigating various types of attacks, using the Command Line Interface (CLI).

For IPv4 deployments, configure:

For IPv6 deployments, configure: