STIGQter STIGQter: STIG Summary: SEL-2740S L2S Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 02 May 2019:

The SEL-2740S must be configured to forward only frames from allowed network-connected endpoint devices.

DISA Rule

SV-102371r1_rule

Vulnerability Number

V-92283

Group Title

SRG-NET-000512-L2S-000031

Rule Version

SELS-SW-000310

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure only authentic allowed traffic by creating flow rules to restrict protocol, source, and destination of information.

For adding an SEL-2740S Flow Rule to forward traffic, do the following:
1. Log on to OTSDN Controller using Permission Level 3.
2. Click "Flow Entries" in Navigation Menu.
3. Click "Add Flow" button.
4. Enter General settings values for "Switch", "Enable". Optional: Enter General Settings for "Table ID", "Priority", "Idle Timeout", and "Hard Timeout".
5. Depending on communication protocol behavior, enter appropriate Match Field values for "ARP Opcode" ("Request" or "Reply"), "ARP Source", "ARP Target", "Communication Service Type (CST) Match", "Ethernet Destination", "Ethernet Source", "Ethernet Type", "InPort", "IP Proto", "IPv4 Destination", "IPv4 Source", "TCP Destination", "TCP Source", "UDP Destination", "UDP Source", "VLAN Priority", and/or "VLAN Virtually ID".
6. Enter appropriate Write-Actions for "Pop VLAN ID", "Push VLAN ID", "Set VLAN ID", "Set VLAN Priority", "Set Queue", "Group by Alias or Value", and/or "Output by Alias or Value".
7. Click "Submit".

Check Contents

To ensure only allowed traffic is being forwarded through the device, check the flow rules for source and destination information on each connected device and port.

If there are any flow rules that are not restrictive, this is a finding.

Vulnerability Number

V-92283

Documentable

False

Rule Version

SELS-SW-000310

Severity Override Guidance

To ensure only allowed traffic is being forwarded through the device, check the flow rules for source and destination information on each connected device and port.

If there are any flow rules that are not restrictive, this is a finding.

Check Content Reference

M

Target Key

3385

Comments