CISC-L2-000160 - The Cisco switch must have Storm Control configured on all host-facing switchports.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network disruption by suppressing ingress traffic when the number of packets reaches a configured threshold levels.

Traffic storm control monitors ingress traffic levels on a port and drops traffic when the number of packets reaches the configured threshold level during any one-second interval.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure storm control for each host-facing interface as shown in the example below:

SW1(config)#int range g0/2 - 8
SW1(config-if-range)#storm-control unicast bps 62000000
SW1(config-if-range)#storm-control broadcast level bps 20000000


Note: The acceptable range is 10000000 -1000000000 for a gigabit Ethernet interface, and 100000000-10000000000 for a 10-gigabit interface. Storm control is not supported on most FastEthernet interfaces.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_Switch_Y22M07_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000366, Rule-ID|SV-220636r648763_rule, STIG-ID|CISC-L2-000160, STIG-Legacy|SV-110243, STIG-Legacy|V-101139, Vuln-ID|V-220636

Plugin: Cisco

Control ID: 599060e648b7c9b79ed977f78ef5831845a7128f81a2b01e7d0946cd9f834f5b