STIGQter STIGQter: STIG Summary:

Cisco IOS XE Switch L2S Security Technical Implementation Guide

Version: 2

Release: 1 Benchmark Date: 23 Apr 2021

CheckedNameTitle
SV-220648r539671_ruleThe Cisco switch must be configured to disable non-essential capabilities.
SV-220649r539671_ruleThe Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection.
SV-220650r539671_ruleThe Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
SV-220651r539671_ruleThe Cisco switch must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.
SV-220652r539671_ruleThe Cisco switch must be configured for authorized users to select a user session to capture.
SV-220653r539671_ruleThe Cisco switch must be configured to provide the capability for authorized users to remotely view, in real time, all content related to an established user session from a component separate from the Cisco switch.
SV-220654r539671_ruleThe Cisco switch must authenticate all endpoint devices before establishing any connection.
SV-220655r539671_ruleThe Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.
SV-220656r539671_ruleThe Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.
SV-220657r539671_ruleThe Cisco switch must have STP Loop Guard enabled.
SV-220658r539671_ruleThe Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.
SV-220659r539671_ruleThe Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
SV-220660r539671_ruleThe Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.
SV-220661r539671_ruleThe Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
SV-220662r648766_ruleThe Cisco switch must have Storm Control configured on all host-facing switchports.
SV-220663r539671_ruleThe Cisco switch must have IGMP or MLD Snooping configured on all VLANs.
SV-220664r539671_ruleThe Cisco switch must implement Rapid STP where VLANs span multiple switches with redundant links.
SV-220665r539671_ruleThe Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.
SV-220666r539671_ruleThe Cisco switch must have all trunk links enabled statically.
SV-220667r539671_ruleThe Cisco switch must have all disabled switch ports assigned to an unused VLAN.
SV-220668r539671_ruleThe Cisco switch must not have the default VLAN assigned to any host-facing switch ports.
SV-220669r539671_ruleThe Cisco switch must have the default VLAN pruned from all trunk ports that do not require it.
SV-220670r539671_ruleThe Cisco switch must not use the default VLAN for management traffic.
SV-220671r539671_ruleThe Cisco switch must have all user-facing or untrusted ports configured as access switch ports.
SV-220672r539671_ruleThe Cisco switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.
SV-220673r539671_ruleThe Cisco switch must not have any switchports assigned to the native VLAN.