There are no technologies or protocols completely secure in network infrastructures. for this reason. this document aims to demonstrate the importance of configuring security options on network equipments. On this occasion we will focus on the data link layer of the OSI model. https://www.popularfilm.blog/