DISA STIG Cisco NX-OS Switch L2S v2r2

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG Cisco NX-OS Switch L2S v2r2

Updated: 4/8/2024

Authority: DISA STIG

Plugin: Cisco

Revision: 1.3

Estimated Item Count: 23

File Details

Filename: DISA_STIG_Cisco_NX-OS_Switch_L2S_v2r2.audit

Size: 48.8 kB

MD5: 3829fc6caf6d31eee3b6dc34fa27a115
SHA256: 2cf6dd166ced0b42f560475ade1324e0e9c65f725024b45aaa368993641cd62c

Audit Changelog

 
Revision 1.3

Apr 8, 2024

Functional Update
  • CISC-L2-000030 - The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
Revision 1.2

Apr 3, 2024

Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.1

Dec 12, 2023

Miscellaneous
  • Metadata updated.
  • See also link updated.
Added
  • CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection.
  • CISC-L2-000080 - The Cisco switch must authenticate all endpoint devices before establishing any connection.
  • CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
  • CISC-L2-000170 - The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.
Removed
  • CISC-L2-000020 - The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection
  • CISC-L2-000080 - The Cisco switch must authenticate all endpoint devices before establishing any connection
  • CISC-L2-000130 - The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources
  • CISC-L2-000170 - The Cisco switch must have IGMP or MLD Snooping configured on all VLANs