This document discusses common layer 2 security threats and attacks, including MAC layer attacks, VLAN attacks, spoofing attacks, and attacks against switch devices. It describes several specific attacks such as MAC flooding, VLAN hopping, DHCP starvation, and CDP manipulation. The document also provides mitigation strategies for each threat, such as using port security, private VLANs, DHCP snooping, and disabling unused protocols.