UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Layer 2 Switch Security Requirements Guide


Overview

Date Finding Count (31)
2024-05-30 CAT I (High): 1 CAT II (Med): 26 CAT III (Low): 4
STIG Description
This Security Requirements Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-206647 High The layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.
V-206649 Medium The layer 2 switch must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.
V-206648 Medium The layer 2 switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
V-206646 Medium The layer 2 switch must be configured to disable non-essential capabilities.
V-206663 Medium The layer 2 switch must implement Rapid STP where VLANs span multiple switches with redundant links.
V-206660 Medium The layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
V-206667 Medium The layer 2 switch must not have the default VLAN assigned to any host-facing switch ports.
V-206666 Medium The layer 2 switch must have all disabled switch ports assigned to an unused VLAN.
V-206665 Medium The layer 2 switch must have all trunk links enabled statically.
V-206664 Medium The layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.
V-206669 Medium The layer 2 switch must not use the default VLAN for management traffic.
V-206668 Medium The layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it.
V-206656 Medium The layer 2 switch must have STP Loop Guard enabled on all non-designated STP switch ports.
V-206657 Medium The layer 2 switch must have Unknown Unicast Flood Blocking (UUFB) enabled.
V-206655 Medium The layer 2 switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.
V-206652 Medium The layer 2 switch must provide the capability for authorized users to remotely view, in real time, all content related to an established user session from a component separate from the layer 2 switch.
V-206653 Medium The layer 2 switch must authenticate all network-connected endpoint devices before establishing any connection.
V-206650 Medium The layer 2 switch must be configured to fail securely in the event of an operational failure.
V-206651 Medium The layer 2 switch must provide the capability for authorized users to select a user session to capture.
V-263666 Medium The layer 2 switch must employ organization-defined controls by type of denial-of-service (DoS) to achieve the DoS objective.
V-263667 Medium The layer 2 switch must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
V-206658 Medium The layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
V-206659 Medium The layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.
V-206670 Medium The layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.
V-206671 Medium The layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.
V-263668 Medium The layer 2 switch must establish organization-defined alternate communications paths for system operations organizational command and control.
V-216507 Medium The layer 2 switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
V-206662 Low The layer 2 switch must have IGMP or MLD Snooping configured on all VLANs
V-206661 Low The layer 2 switch must have Storm Control configured on all host-facing switch ports.
V-206672 Low The layer 2 switch must not have any switch ports assigned to the native VLAN.
V-206654 Low The layer 2 switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.