CISC-L2-000240 - The Cisco switch must not use the default VLAN for management traffic.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with directly connected switches using Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and Port Aggregation Protocol (PAgP)-all untagged traffic. As a consequence, the default VLAN may unwisely span the entire network if not appropriately pruned. If its scope is large enough, the risk of compromise can increase significantly.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the switch for management access to use a VLAN other than the default VLAN.

SW1(config)#int vlan 22
SW1(config-if)#ip add 10.1.22.3 255.255.255.0
SW1(config-if)#no shut

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_XE_Switch_Y22M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-220670r539671_rule, STIG-ID|CISC-L2-000240, STIG-Legacy|SV-110315, STIG-Legacy|V-101211, Vuln-ID|V-220670

Plugin: Cisco

Control ID: 12369d61fd21b6af949a4fce6d78231c3bdd0ec5309fb1bc90e1d253f7c91577