STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco perimeter switch must be configured to have Link Layer Discovery Protocol (LLDP) disabled on all external interfaces.

DISA Rule

SV-221096r622190_rule

Vulnerability Number

V-221096

Group Title

SRG-NET-000364-RTR-000111

Rule Version

CISC-RT-000360

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Disable LLDP transmit on all external interfaces as shown in the example below:

SW2(config)# int e2/2
SW2(config-if)# no lldp transmit
SW2(config-if)# end

Check Contents

Step 1: Verify LLDP is not enabled globally via the command feature lldp.

By default the LLDP feature is not enabled. If LLDP is enabled, proceed to Step 2.

Step 2: Verify LLDP is not enabled on any external interface as shown in the example below:

interface Ethernet2/2
description link to DISN
no switchport
no lldp transmit

Note: LLDP is enabled by default on all interfaces once it is enabled globally; hence the command lldp transmit will not be visible on the interface configuration.

If LLDP transmit is enabled on any external interface, this is a finding.

Vulnerability Number

V-221096

Documentable

False

Rule Version

CISC-RT-000360

Severity Override Guidance

Step 1: Verify LLDP is not enabled globally via the command feature lldp.

By default the LLDP feature is not enabled. If LLDP is enabled, proceed to Step 2.

Step 2: Verify LLDP is not enabled on any external interface as shown in the example below:

interface Ethernet2/2
description link to DISN
no switchport
no lldp transmit

Note: LLDP is enabled by default on all interfaces once it is enabled globally; hence the command lldp transmit will not be visible on the interface configuration.

If LLDP transmit is enabled on any external interface, this is a finding.

Check Content Reference

M

Target Key

4075

Comments