UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The layer 2 switch must employ organization-defined controls by type of denial-of-service (DoS) to achieve the DoS objective.


Overview

Finding ID Version Rule ID IA Controls Severity
V-263666 SRG-NET-000705-L2S-000110 SV-263666r991548_rule Medium
Description
DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth. Such attacks can occur across a wide range of network protocols (e.g., IPv4, IPv6). A variety of technologies are available to limit or eliminate the origination and effects of DoS events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of DoS attacks. Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to DoS events.
STIG Date
Layer 2 Switch Security Requirements Guide 2024-05-30

Details

Check Text ( C-67579r982271_chk )
Verify the layer 2 switch is configured to employ organization-defined controls by type of DoS to achieve the DoS objective.

If the layer 2 switch is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix Text (F-67487r982272_fix)
Configure the layer 2 switch to employ organization-defined controls by type of DoS to achieve the DoS objective.