V-66051 | High | HP FlexFabric Switch must authenticate all network-connected endpoint devices before establishing any connection. | Controlling LAN access via 802.1x authentication or MAC authentication can assist in preventing a malicious user from connecting an unauthorized PC to a switch port to inject or receive data from... |
V-66057 | Medium | The HP FlexFabric Switch must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks. | Denial of service is a condition when a resource is not available for legitimate users. Packet flooding DDoS attacks are referred to as volumetric attacks and have the objective of overloading a... |
V-66059 | Medium | The HP FlexFabric Switch must provide the capability for authorized users to select a user session to capture. | Without the capability to select a user session to capture/record or view/hear, investigations into suspicious or harmful events would be hampered by the volume of information captured. The volume... |
V-66095 | Medium | The HP FlexFabric Switch must have the native VLAN assigned to a VLAN ID other than the default VLAN ID for all 802.1q trunk links. | VLAN hopping can be initiated by an attacker who has access to a switch port belonging to the same VLAN as the native VLAN of the trunk link connecting to another switch that the victim is... |
V-66097 | Medium | The HP FlexFabric Switch must not have any access switch ports assigned to the native VLAN. | Double encapsulation can be initiated by an attacker who has access to a switch port belonging to the native VLAN of the trunk port. Knowing the victim’s MAC address and with the victim attached... |
V-66091 | Medium | The HP FlexFabric Switch must not use the default VLAN for management traffic. | Switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with directly connected switches using Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP), VLAN... |
V-66079 | Medium | The HP FlexFabric Switch must enable Device Link Detection Protocol (DLDP) to protect against one-way connections. | In topologies where fiber optic interconnections are used, physical misconnections can occur that allow a link to appear to be up when there is a mismatched set of transmit/receive pairs. When... |
V-66075 | Medium | The HP FlexFabric Switch must have Dynamic ARP Inspection (DAI) enabled on all user VLANs. | DAI intercepts Address Resolution Protocol (ARP) requests and verifies that each of these packets has a valid IP-to-MAC address binding before updating the local ARP cache and before forwarding... |
V-66073 | Medium | The HP FlexFabric Switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports. | IP Source Guard provides source IP address filtering on a Layer 2 port to prevent a malicious host from impersonating a legitimate host by assuming the legitimate host's IP address. The feature... |
V-66071 | Medium | The HP FlexFabric Switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources as well as rate-limit DHCP traffic. | In an enterprise network, devices under administrative control are trusted sources. These devices include the switches, routers, and servers in the network. Host ports and unknown Dynamic Host... |
V-66069 | Medium | The HP FlexFabric Switch must have unknown storm-constrain enabled. | Access layer switches use the Content Addressable Memory (CAM) table to direct traffic to specific ports based on the VLAN number and the destination MAC address of the frame. When a router has an... |
V-66093 | Medium | The HP FlexFabric Switch must have all user-facing or untrusted ports configured as access switch ports. | Double encapsulation can be initiated by an attacker who has access to a switch port belonging to the native VLAN of the trunk port. Knowing the victim's MAC address and with the victim attached... |
V-65961 | Medium | The HP FlexFabric Switch must be configured to disable non-essential capabilities. | A compromised switch introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of... |
V-66077 | Medium | The HP FlexFabric Switch must implement Rapid STP where VLANs span multiple switches with redundant links. | Spanning Tree Protocol (STP) is implemented on bridges and switches to prevent layer 2 loops when a broadcast domain spans multiple bridges and switches and when redundant links are provisioned to... |
V-66067 | Medium | The HP FlexFabric Switch must have STP Loop Protection enabled all non-designated STP switch ports. | The Spanning Tree Protocol (STP) loop Protection feature provides additional protection against STP loops. An STP loop is created when an STP blocking port in a redundant topology erroneously... |
V-66081 | Medium | The HP FlexFabric Switch must have all trunk links enabled statically. | When trunk negotiation is enabled via Dynamic Trunk Protocol (DTP), considerable time can be spent negotiating trunk settings (802.1q or ISL) when a node or interface is restored. While this... |
V-66087 | Medium | The HP FlexFabric Switch must not have the default VLAN assigned to any host-facing switch ports. | In a VLAN-based network, switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with other networking devices using Spanning-Tree Protocol (STP), Dynamic Trunking... |
V-66085 | Medium | The HP FlexFabric Switch must have all disabled switch ports assigned an unused VLAN. | It is possible that a disabled port that is assigned to a user or management VLAN becomes enabled by accident or by an attacker and as a result gains access to that VLAN as a member. |
V-66065 | Medium | The HP FlexFabric Switch must have BPDU Guard enabled on all user-facing access ports. | If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priority than the existing root bridge, it will become the new root bridge... |
V-66089 | Medium | The HP FlexFabric Switch must have the default VLAN pruned from all trunk ports that do not require it. | The default VLAN (i.e., VLAN 1) is a special VLAN used for control plane traffic such as Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and Port... |
V-66061 | Medium | The HP FlexFabric Switch must provide the capability for authorized users to remotely view, in real time, all content related to an established user session from a component separate from the HP FlexFabric Switch. | Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activity would be hampered. Real-time monitoring allows authorized personnel... |
V-66063 | Medium | The HP FlexFabric Switch must have Root Guard enabled on all ports where the root bridge should not appear. | Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the switched network. Any switch can be the root bridge in a network.... |