This document provides an overview of layer 2 attacks and mitigations. It discusses common layer 2 protocols like ARP, DHCP, STP, VTP, DTP and CDP and explains how they can be exploited through spoofing, flooding, and other techniques. Specific attacks covered include ARP poisoning, DHCP starvation, CAM table overflow, CDP attacks, VTP attacks, DTP attacks, HSRP abuse, spanning tree attacks, VLAN hopping, and PVLAN attacks. The document then offers configuration recommendations to mitigate these threats, such as enabling port security, DHCP snooping, root guard, and disabling unused protocols.