Implementation should include port security to mitigate MAC address table attacks.