UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Link Layer Discovery Protocols (LLDPs) must be disabled on all external facing interfaces.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3077 NET0710 SV-3077r4_rule Low
Description
LLDPs are primarily used to obtain protocol addresses of neighboring devices and discover platform capabilities of those devices. Use of SNMP with the LLDP Management Information Base (MIB) allows network management applications to learn the device type and the SNMP agent address of neighboring devices; thereby, enabling the application to send SNMP queries to those devices. LLDPs are also media- and protocol-independent as they run over the data link layer; therefore, two systems that support different network-layer protocols can still learn about each other. Allowing LLDP messages to reach external network nodes is dangerous as it provides an attacker a method to obtain information of the network infrastructure that can be useful to plan an attack. Examples of LLDPs are Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and Link Layer Discovery Protocol – Media Endpoint Discovery (LLDP-MED).
STIG Date
Perimeter Router Security Technical Implementation Guide Juniper 2016-12-23

Details

Check Text ( C-3550r5_chk )
Review all router configurations to ensure LLDPs are not included in the global configuration or LLDPs are not included for each active external interface.

On Cisco routers ensure "no cdp run" is included in the global configuration or "no cdp enable" is included for each active external interface.

If LLDPs are configured globally or on any external facing interfaces, this is a finding.
Fix Text (F-3102r3_fix)
Configure the device so Link Layer Discovery Protocols are not included in the global configuration or Link Layer Discovery Protocols are not included for each active external interface.