OS10-L2S-000100 - The Dell OS10 Switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.

Information

If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priority than the existing root bridge, it will become the new root bridge and cause a topology change, rendering the network in a suboptimal state. The STP PortFast BPDU guard enhancement allows network designers to enforce the STP domain borders and keep the active topology predictable. The devices behind the ports that have STP PortFast enabled are not able to influence the STP topology. At the reception of BPDUs, the BPDU guard operation disables the port that has PortFast configured. The BPDU guard transitions the port into err disable state and sends a log message.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the Dell OS10 Switch to enable BPDU Guard on all user-facing or untrusted access switch ports, as shown in the example below:

OS10(config)# interface ethernet 1/1/1
OS10(conf-if-eth1/1/1)# spanning-tree bpduguard enable

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Dell_OS10_Switch_Y24M12_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5, CAT|II, CCI|CCI-002385, Rule-ID|SV-269956r1052254_rule, STIG-ID|OS10-L2S-000100, Vuln-ID|V-269956

Plugin: Dell_OS10

Control ID: 9207d96401059c2380c8d11f306dbb7cb5d82882c4541cb1a0fb307eea25e5dc