NET-VLAN-004 - VLAN 1 is being used as a user VLAN - 'no ip address'.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The IAO/NSO will ensure VLAN1 is not used for user VLANs.

In a VLAN-based network, switches use VLAN1 as the default VLAN for in-band management and to communicate with other networking devices using Spanning-Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and Port Aggregation Protocol (PAgP)-all untagged traffic. As a consequence, VLAN 1 may unwisely span the entire network if not appropriately pruned. If its scope is large enough, the risk of compromise can increase significantly.

NOTE: This check is derived from the L3 switch guidance, if the scan target is a router the check can be ignored.

Solution

Best practices for VLAN-based networks is to prune unnecessary ports from gaining access to VLAN1 as well as the management VLAN, and to separate in-band management, device protocol, and data traffic.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-3(2), CAT|II, Rule-ID|SV-3971r2_rule, STIG-ID|NET-VLAN-004, Vuln-ID|V-3971

Plugin: Cisco

Control ID: f891350ba9dbe76fbef2196f46c801b5dfb73b8944df67c2e5a162f6ea806d87