STIGQter STIGQter: STIG Summary: Cisco IOS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco perimeter switch must be configured to have Link Layer Discovery Protocol (LLDP) disabled on all external interfaces.

DISA Rule

SV-220449r622190_rule

Vulnerability Number

V-220449

Group Title

SRG-NET-000364-RTR-000111

Rule Version

CISC-RT-000360

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Disable LLDP transmit on all external interfaces as shown in the example below:

SW1(config)#int g0/1
SW1(config-if)#no lldp transmit

Check Contents

Step 1: Verify LLDP is not enabled globally via the command.

lldp run

By default, LLDP is not enabled globally. If LLDP is enabled, proceed to Step 2.

Step 2: Verify LLDP is not enabled on any external interface as shown in the example below:

interface GigabitEthernet0/1
ip address x.1.12.1 255.255.255.252
no lldp transmit

Note: LLDP is enabled by default on all interfaces once it is enabled globally; hence the command "lldp transmit" will not be visible on the interface configuration.

If LLDP transmit is enabled on any external interface, this is a finding.

Vulnerability Number

V-220449

Documentable

False

Rule Version

CISC-RT-000360

Severity Override Guidance

Step 1: Verify LLDP is not enabled globally via the command.

lldp run

By default, LLDP is not enabled globally. If LLDP is enabled, proceed to Step 2.

Step 2: Verify LLDP is not enabled on any external interface as shown in the example below:

interface GigabitEthernet0/1
ip address x.1.12.1 255.255.255.252
no lldp transmit

Note: LLDP is enabled by default on all interfaces once it is enabled globally; hence the command "lldp transmit" will not be visible on the interface configuration.

If LLDP transmit is enabled on any external interface, this is a finding.

Check Content Reference

M

Target Key

4065

Comments