UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-220637 CISC-L2-000170 SV-220637r539671_rule Low
Description
IGMP and MLD snooping provide a way to constrain multicast traffic at Layer 2. By monitoring the IGMP or MLD membership reports sent by hosts within a VLAN, the snooping application can set up Layer 2 multicast forwarding tables to deliver specific multicast traffic only to interfaces connected to hosts interested in receiving the traffic, thereby significantly reducing the volume of multicast traffic that would otherwise flood the VLAN.
STIG Date
Cisco IOS Switch L2S Security Technical Implementation Guide 2022-09-12

Details

Check Text ( C-22352r507957_chk )
Review the switch configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively. The example below shows the steps to verify that IGMP snooping is enabled for each VLAN.

Step 1: Verify that IGMP or MLD snooping is enabled globally. By default, IGMP snooping is enabled globally; hence, the following command should not be in the switch configuration:

no ip igmp snooping

Step 2: Verify that IGMP snooping is not disabled for any VLAN as shown in the example below:

no ip igmp snooping vlan 11

Note: When IGMP snooping is globally enabled, it is also enabled by default on all VLANs but can be disabled on a per-VLAN basis. If global snooping is disabled, VLAN snooping cannot be enabled.

If the switch is not configured to implement IGMP or MLD snooping for each VLAN, this is a finding.
Fix Text (F-22341r507958_fix)
Globally configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively:

SW1(config)#ip igmp snooping