UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-220663 CISC-L2-000170 SV-220663r802438_rule Low
Description
IGMP and MLD snooping provides a way to constrain multicast traffic at Layer 2. By monitoring the IGMP or MLD membership reports sent by hosts within a VLAN, the snooping application can set up Layer 2 multicast forwarding tables to deliver specific multicast traffic only to interfaces connected to hosts interested in receiving the traffic, thereby significantly reducing the volume of multicast traffic that would otherwise flood the VLAN.
STIG Date
Cisco IOS XE Switch L2S Security Technical Implementation Guide 2023-06-01

Details

Check Text ( C-22378r802437_chk )
Review the switch configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively. The example below are the steps to verify that IGMP snooping is enabled for each VLAN.

Step 1: Verify that IGMP or MLD snooping is enabled globally. By default, IGMP snooping is enabled globally; hence, the following command should not be in the switch configuration:

no ip igmp snooping

Note: For VLANs managed via 802.1x, this check is N/A.

Step 2: Verify that IGMP snooping is not disabled for any VLAN as shown in the example below:

no ip igmp snooping vlan 11

Note: When globally enabled, it is also enabled by default on all VLANs, but can be disabled on a per-VLAN basis. If global snooping is disabled, VLAN snooping cannot be enabled.

If the switch is not configured to implement IGMP or MLD snooping for each VLAN, this is a finding.
Fix Text (F-22367r507538_fix)
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively globally.

SW1(config)#ip igmp snooping