DISA STIG Cisco IOS Switch L2S v2r3

Audit Details

Name: DISA STIG Cisco IOS Switch L2S v2r3

Updated: 9/12/2023

Authority: DISA STIG

Plugin: Cisco

Revision: 1.2

Estimated Item Count: 23

File Details

Filename: DISA_STIG_Cisco_IOS_Switch_L2S_v2r3.audit

Size: 48.2 kB

MD5: 4b7389f78deb94fe803e23d45c661cff
SHA256: eb272587a0f3cf3575949e2075b997daf3d05b219d40519cb30a59963502834b

Audit Items

DescriptionCategories
CISC-L2-000020 - The Cisco switch must uniquely identify and authenticate all network-connected endpoint devices before establishing any connection

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000030 - The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.

IDENTIFICATION AND AUTHENTICATION

CISC-L2-000040 - The Cisco switch must manage excess bandwidth to limit the effects of packet-flooding types of denial-of-service (DoS) attacks.

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000100 - The Cisco switch must have Bridge Protocol Data Unit (BPDU) Guard enabled on all user-facing or untrusted access switch ports.

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000110 - The Cisco switch must have Spanning Tree Protocol (STP) Loop Guard enabled

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000120 - The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000150 - The Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000160 - The Cisco switch must have Storm Control configured on all host-facing switchports.

CONFIGURATION MANAGEMENT

CISC-L2-000170 - The Cisco switch must have IGMP or MLD Snooping configured on all VLANs

CONFIGURATION MANAGEMENT

CISC-L2-000180 - The Cisco switch must implement Rapid Spanning Tree Protocol (STP) where VLANs span multiple switches with redundant links.

CONFIGURATION MANAGEMENT

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.

CONFIGURATION MANAGEMENT

CISC-L2-000200 - The Cisco switch must have all trunk links enabled statically.

CONFIGURATION MANAGEMENT

CISC-L2-000210 - The Cisco switch must have all disabled switch ports assigned to an unused VLAN.

CONFIGURATION MANAGEMENT

CISC-L2-000220 - The Cisco switch must not have the default VLAN assigned to any host-facing switch ports.

CONFIGURATION MANAGEMENT

CISC-L2-000230 - The Cisco switch must have the default VLAN pruned from all trunk ports that do not require it.

CONFIGURATION MANAGEMENT

CISC-L2-000240 - The Cisco switch must not use the default VLAN for management traffic.

CONFIGURATION MANAGEMENT

CISC-L2-000250 - The Cisco switch must have all user-facing or untrusted ports configured as access switch ports.

CONFIGURATION MANAGEMENT

CISC-L2-000260 - The Cisco switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.

CONFIGURATION MANAGEMENT

CISC-L2-000270 - The Cisco switch must not have any switchports assigned to the native VLAN.

CONFIGURATION MANAGEMENT

DISA_STIG_Cisco_IOS_Switch_L2S_v2r3.audit from DISA Cisco IOS Switch L2S v2r3 STIG