STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch L2S Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 08 May 2020:

The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.

DISA Rule

SV-110337r1_rule

Vulnerability Number

V-101233

Group Title

SRG-NET-000362-L2S-000022

Rule Version

CISC-L2-000100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the switch to have BPDU Guard enabled on all user-facing or untrusted access switch ports as shown in the configuration example below:

SW1(config)# int e1/1 -44
SW1(config-if-range)# spanning-tree bpduguard enable

Note: BPDU guard can also be enabled globally on all edge ports via the following command:

spanning-tree port type edge bpduguard default

Check Contents

Review the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports as shown in the configuration example below:

interface Ethernet1/1



spanning-tree bpduguard enable

interface Ethernet1/2



spanning-tree bpduguard enable

If the switch has not enabled BPDU Guard, this is a finding.

Vulnerability Number

V-101233

Documentable

False

Rule Version

CISC-L2-000100

Severity Override Guidance

Review the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports as shown in the configuration example below:

interface Ethernet1/1



spanning-tree bpduguard enable

interface Ethernet1/2



spanning-tree bpduguard enable

If the switch has not enabled BPDU Guard, this is a finding.

Check Content Reference

M

Target Key

3551

Comments