Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review the HP FlexFabric Switch configuration to determine if services or functions not required for operation, or not related to switch functionality, are enabled. If unnecessary services and functions are enabled on the HP FlexFabric Switch, this is a finding. [HP] display ftp-server FTP is not configured. [HP] display current-configuration | include telnet Note: When Telnet server is enabled, the output for this command is telnet server enable.
Remove unneeded services and functions from the HP FlexFabric Switch. Removal is recommended since the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function. Disable unsecure protocols and services on the HP FlexFabric Switch: [HP] undo ftp server enable [HP] undo telnet server enable Note: By default, both FTP and Telnet services are disabled.
Verify all access switch ports connecting to LAN outlets are configured for 802.1x or MAC authentication as shown in these configuration examples. 802.1x example: interface Ten-GigabitEthernet1/0/4 port link-mode bridge port access vlan 200 dot1x MAC authentication example: interface Ten-GigabitEthernet1/0/5 port link-mode bridge port access vlan 200 mac-authentication If all access switch ports connecting to LAN outlets are not configured for 802.1x or MAC authentication, this is a finding.
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured. [HP] dot1x [HP] dot1x authentication-method eap [HP] domain radius jitc [HP] radius scheme jitc [HP-radius-jitc]radius scheme jitc [HP-radius-jitc]primary authentication 15.252.76.124 [HP-radius-jitc]primary accounting 15.252.76.124 [HP-radius-jitc]accounting-on enable [HP-radius-jitc]key authentication simple test123 [HP-radius-jitc]user-name-format without-domain [HP-radius-jitc]nas-ip 15.252.78.99 [HP]domain jitc [HP-isp-jitc]domain jitc [HP-isp-jitc]authentication lan-access radius-scheme jitc [HP-isp-jitc]authorization lan-access radius-scheme jitc [HP] interface gigbitethernet 1/0/1 [HP-Gigabitethernet1/0/1] undo dot1x handshake dot1x mandatory-domain jitc undo dot1x multicast-trigger
Check if the HP FlexFabric Switch is configured to protect against known DoS attacks by implementing a control plane QoS policy to rate limit specify traffic types destined to the switch. [HP] display qos policy control-plane pre-defined [HP] display qos policy user-defined If the HP FlexFabric Switch is not configured with a control plane QoS policy, this is a finding.
Configure QoS policy and apply it to the control plane: [HP] traffic classifier Net-Protocols operator and [HP-classifier Net-Protocols] if-match control-plane protocol icmp [HP-classifier Net-Protocols] quit [HP] traffic behavior Net-Protocols [HP-behavior-Net-Protocols] car cir 320 [HP-behavior-Net-Protocols] quit [HP] qos policy Net-protocols [HP-qospolicy-Net-Protocols] classifier Net-Protocols behavior Net-protocols [HP-qospolicy-Net-Protocols] quit [HP] control-plane slot 1 [HP-cp-slot1] qos apply policy Net-Protocols inbound Note: In addition, ACLs can be deployed to address specific types of attacks based on IP, MAC, protocols and ports. Note: By default, the HP FlexFabric Switches are configured with pre-defined control plane QoS policies, which take effect on the control planes by default.
Verify that the HP FlexFabric Switch is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session. If the HP FlexFabric Switch is not capable of capturing ingress and egress packets from a designated switch port, this is a finding. [HP]display mirroring-group X Mirroring group X: Type: Remote source Status: Active Mirroring port: GigabitEthernet1/0/1 Both Monitor port: GigabitEthernet1/0/2
Configure the HP FlexFabric Switch to capture ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session as shown in the following example: [HP]mirroring-group 1 local [HP]mirroring-group 1 mirroring-port GigabitEthernet 1/0/1 both [HP]mirroring-group 1 monitor-port GigabitEthernet 1/0/2
Verify that the HP FlexFabric Switch is capable of capturing ingress and egress packets from any designated switch port for the purpose of remotely monitoring a specific user session. If the HP FlexFabric Switch is not capable of capturing ingress and egress packets from a designated switch port for the purpose of remotely monitoring a specific user session, this is a finding.
Configure the HP FlexFabric Switch to remotely capture ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session as shown in the following example: [HP]mirroring-group 1 remote-source [HP]mirroring-group 1 mirroring-port GigabitEthernet 1/0/1 both [HP]mirroring-group 1 monitor-port GigabitEthernet 1/0/2
Review the HP FlexFabric Switch topology as well as the configuration to verify that root guard is enabled on switch ports facing users or switches that are downstream from the root bridge. If the switch has not enabled Root Guard on all ports where the root bridge should not appear, this is a finding. [HP]display stp -------[CIST Global Info][Mode MSTP]------- Bridge ID : 0.bcea-fa14-f0a4 Bridge times : Hello 2s MaxAge 20s FwdDelay 15s MaxHops 20 Root ID/ERPC : 0.bcea-fa14-f0a4, 0 RegRoot ID/IRPC : 0.bcea-fa14-f0a4, 0 RootPort ID : 0.0 BPDU-Protection : Disabled Bridge Config- Digest-Snooping : Disabled TC or TCN received : 19824 Time since last TC : 0 days 1h:3m:4s ----[Port1(GigabitEthernet1/0/1)][DISCARDING]---- Port protocol : Enabled Port role : Designated Port (Boundary) Port ID : 128.1 Port cost(Legacy) : Config=auto, Active=20 Desg.bridge/port : 0.bcea-fa14-f0a4, 128.1 Port edged : Config=disabled, Active=disabled Point-to-Point : Config=auto, Active=true Transmit limit : 10 packets/hello-time TC-Restriction : Disabled Role-Restriction : Disabled Protection type : ROOT
Configure the HP FlexFabric Switch to have Root Guard enabled on all ports where the root bridge should not appear. [HP-GigabitEthernet1/0/1]stp root-protection
Review the HP FlexFabric Switch configuration to verify that BPDU Protection is enabled on all user-facing switch ports. If the HP FlexFabric Switch has not enabled BPDU protection, this is a finding. [HP] display stp -------[CIST Global Info][Mode MSTP]------- Bridge ID : 32768.7848-596a-6580 Bridge times : Hello 2s MaxAge 20s FwdDelay 15s MaxHops 20 Root ID/ERPC : 32768.7848-596a-6580, 0 RegRoot ID/IRPC : 32768.7848-596a-6580, 0 RootPort ID : 0.0 BPDU-Protection : Enabled Bridge Config- Digest-Snooping : Disabled TC or TCN received : 0 Time since last TC : 3 days interface GigabitEthernet1/0/1 stp edged-port
Configure the HP FlexFabric Switch to have BPDU Guard enabled on all user-facing switch ports. [HP]stp bpdu-protection [HP-GigabitEthernet1/0/1]stp edged-port
Review the HP FlexFabric Switch configuration to verify that STP Loop Protection is enabled. If STP Loop Protection is not configured globally or at a minimum on non-designated STP ports, this is a finding. [HPinterface Ten-GigabitEthernet1/0/8] port link-mode bridge stp loop-protection
Configure the HP FlexFabric Switch to have STP Loop Protection enabled globally or at a minimum on all non-designated switch ports. [HPinterface Ten-GigabitEthernet1/0/8] stp loop-protection
Review the HP FlexFabric Switch configuration to verify that unknown storm-constrain is enabled on all access switch ports. If any access switch ports do not have storm-constrain enabled, this is a finding. [HP] display storm-constrain Abbreviation: BC - broadcast; MC - multicast; UC - unicast FW - forwarding Flow Statistic Interval: 10 (in seconds) Port Type Lower Upper Unit CtrlMode Status Trap Log SwitchNum -------------------------------------------------------------------------------- XGE1/0/10 UC 1 1 pps shutdown FW on on 0
Configure the HP FlexFabric Switch to have unknown storm-constrain enabled. [HP-GigabitEthernet1/0/1]storm-constrain unicast pps 1 1 [HP-GigabitEthernet1/0/1]storm-constrain control shutdown
Review the HP FlexFabric Switch configuration and verify that DHCP snooping is enabled on a per-VLAN basis. If the HP FlexFabric Switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources as well as rate-limit DHCP traffic, this is a finding. Note: Enabling DHCP snooping on a range of VLANs is permissible. Sample output: [HP]dhcp snooping enable [HP-GigabitEthernet1/0/1]dhcp snooping rate-limit
Configure the HP FlexFabric Switch to have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources as well as rate-limit DHCP traffic. [HP]dhcp snooping enable [HP-GigabitEthernet1/0/1]dhcp snooping rate-limit
Review the HP FlexFabric Switch configuration to verify that IP Source Guard is enabled on all untrusted access switch ports. If the HP FlexFabric Switch does not have IP Source Guard enabled on all user-facing or untrusted access switch ports, this is a finding. [HP]dis ip source binding static Total entries found: 0 IP Address MAC Address Interface VLAN Type
Configure the HP FlexFabric Switch to have IP Source Guard enabled on all user-facing or untrusted access switch ports. [HP-Ten-GigabitEthernet1/0/10] [HP-Ten-GigabitEthernet1/0/10]ip verify source ip-address [ mac-address ] [HP-Ten-GigabitEthernet1/0/10]ip source binding ip-address ip-address [ mac-address mac-address ] [ vlan vlan-id ]
Review the HP FlexFabric Switch configuration to verify that Dynamic ARP Inspection (DAI) feature is enabled on all user VLANs. If DAI is not enabled on all user VLANs, this is a finding. [HP]display arp detection ARP detection is enabled in the following VLANs: 2 [HP]display arp detection statistics interface Ten-GigabitEthernet 1/0/11 State: U-Untrusted T-Trusted ARP packets dropped by ARP inspect checking: Interface(State) IP Src-MAC Dst-MAC Inspect XGE1/0/11(T) 0 0 0 0 [HP]
Configure the HP FlexFabric Switch to have Dynamic ARP Inspection (DAI) enabled on all user VLANs. [HP-vlan2]arp detection enable [HP-Ten-GigabitEthernet1/0/11]arp detection trust
In cases where VLANs do not span multiple switches, it is a best practice to not implement STP. Avoiding the use of STP will provide the most deterministic and highly available network topology. If STP is required, then review the HP FlexFabric Switch configuration to verify that Rapid STP has been implemented. If Rapid STP has not been implemented where STP is required, this is a finding. [HP]display stp vlan X
Configure Rapid STP to be implemented at the access and distribution layers where VLANs span multiple switches.
If any of the switch ports have fiber optic interconnections with neighbors, review the HP FlexFabric Switch configuration to verify that DLDP is enabled globally or on a per interface basis. If the HP FlexFabric Switch has fiber optic interconnections with neighbors and DLDP is not enabled, this is a finding. <HP> display dldp DLDP global status : disable DLDP interval : 5s DLDP work-mode : enhance DLDP authentication-mode : none DLDP unidirectional-shutdown : auto DLDP delaydown-timer : 1s The number of enabled ports is 2. [HP-Interface Ethernet1/1] DLDP port state : advertisement DLDP link state : up The neighbor number of the port is 0. [HP-Interface Ethernet1/2] DLDP port state : advertisement DLDP link state : up The neighbor number of the port is 0.
Configure the HP FlexFabric Switch to enable Device Link Detection Protocol (DLDP) to protect against one-way connections. [HP]dldp global enable [HP-Ten-GigabitEthernet1/0/47]dldp enable
Review the HP FlexFabric Switch configuration to verify that trunk negotiation is disabled by statically configuring all trunk links. Configuring a command to manually disable negotiation may also be required for some switch platforms. If trunk negotiation is enabled on any interface, this is a finding. Sample output: interface GigabitEthernet1/0/1 port link-type trunk port trunk permit vlan X
Configure the HP FlexFabric Switch to enable trunk links statically. [HP-GigabitEthernet1/0/1]port link-type trunk
Review the HP FlexFabric Switch configurations and examine all access switch ports. Each access switch port not in use should have membership to an inactive VLAN that is not used for any purpose and is not allowed on any trunk links. If there are any access switch ports not in use and not in an inactive VLAN, this is a finding. <HP>display vlan X VLAN ID: X VLAN type: Static Route interface: Configured: Description: VLAN 000X Name: VLAN 000X Tagged ports: None Untagged ports: GigabitEthernet1/0/1 GigabitEthernet1/0/2 GigabitEthernet1/0/3 GigabitEthernet1/0/4
Assign all switch ports not in use to an inactive VLAN. [HP-vlanX]port GigabitEthernet 1/0/1 to GigabitEthernet 1/0/48
Review the HP FlexFabric Switch configurations and verify that no access switch ports have been assigned membership to the default VLAN (i.e., VLAN 1). A good method of ensuring there is not membership to the default VLAN is to have it disabled (i.e., shutdown) on the switch. If there are access switch ports assigned to the default VLAN, this is a finding. <HP>display vlan 1 VLAN ID: 1 VLAN type: Static Route interface: Configured: Description: VLAN 0001 Name: VLAN 0001 Tagged ports: None Untagged ports: GigabitEthernet1/0/1 GigabitEthernet1/0/2 GigabitEthernet1/0/3 GigabitEthernet1/0/4 [HP-GigabitEthernet1/0/12]shutdown
Remove the assignment of the default VLAN from all access switch ports. <HP>display vlan 1 [HP-vlan2]port GigabitEthernet 1/0/1 to GigabitEthernet 1/0/48 [HP-GigabitEthernet1/0/1]shutdown
Review the HP FlexFabric Switch configuration and verify that the default VLAN is pruned from trunk links that do not require it. If the default VLAN is not pruned from trunk links that should not be transporting frames for the VLAN, this is a finding. <HP>display vlan 1 VLAN ID: 1 VLAN type: Static Route interface: Configured Description: VLAN 0001 Name: VLAN 0001 Tagged ports: None Untagged ports: GigabitEthernet1/0/1 GigabitEthernet1/0/2 GigabitEthernet1/0/3 GigabitEthernet1/0/4 GigabitEthernet1/0/5 GigabitEthernet1/0/6 GigabitEthernet1/0/7 GigabitEthernet1/0/8
Remove the native vlan from trunks that do not require it. [HP-interface GigabitEthernet1/0/1] undo port trunk permit vlan 1
Review the HP FlexFabric Switch configuration and verify that the default VLAN is not used to access the switch for management. If the default VLAN is being used to access the HP FlexFabric Switch, this is a finding. <HP>display vlan 1 VLAN ID: 1 VLAN type: Static Route interface: Configured Description: VLAN 0001 Name: VLAN 0001 Tagged ports: None Untagged ports: GigabitEthernet1/0/1 GigabitEthernet1/0/2 GigabitEthernet1/0/3 GigabitEthernet1/0/4 GigabitEthernet1/0/5 GigabitEthernet1/0/6 GigabitEthernet1/0/7 GigabitEthernet1/0/8
Configure the HP FlexFabric Switch for management access to use a VLAN other than the default VLAN. interface Vlan-interface xxxx description MGMT VLAN ip address xxx.xxx.xxx.xxx <mask>
Review the HP FlexFabric Switch configuration and ensure all user-facing or untrusted ports are configured as access port. If any of the user-facing switch ports are configured as a trunk, this is a finding [HP]display current-configuration interface gigabitEthernet 1/0/1 Brief information on interface(s) under bridge mode: Link: ADM - administratively down; Stby - standby Speed or Duplex: (a)/A - auto; H - half; F - full Type: A - access; T - trunk; H - hybrid Interface Link Speed Duplex Type PVID Description XGE1/0/1 UP 1G(a) F(a) A 100 XGE1/0/2 UP 1G(a) F(a) A 100 XGE1/0/3 UP 1G(a) F(a) A 100 XGE1/0/4 UP 1G(a) F(a) A 100
Configure all user-facing or untrusted ports as access ports. [HP-GigabitEthernet1/0/13]port link-type access
Review the HP FlexFabric Switch configurations and examine all trunk links. Verify the native VLAN has been configured to a VLAN ID other than the default VLAN 1. Connect to switch via console or SSH. <HP> display current interface Bridge-Aggregation # interface Bridge-Aggregation1 description To-DistroEast(10G) port link-type trunk undo port trunk permit vlan 1 port trunk permit vlan 2100 to 2102 4017 port trunk pvid vlan 4017 link-aggregation mode dynamic If any of the trunk links are assigned to VLAN 1, this is a finding.
Configure the ID of the native vlan on all trunk port(s). [HP-GigabitEthernet1/0/13] undo port trunk permit vlan 1 [HP-GigabitEthernet1/0/13]port trunk pvid vlan 4017
Verify all access switch ports are not part of the native VLAN (VLAN 1). If any access switch port is assigned to the native VLAN (VLAN 1), this is a finding. <HP>display interface GigabitEthernet brief Brief information on interface(s) under bridge mode: Link: ADM - administratively down; Stby - standby Speed or Duplex: (a)/A - auto; H - half; F - full Type: A - access; T - trunk; H - hybrid Interface Link Speed Duplex Type PVID Description GE1/0/1 UP 1G(a) F(a) A 1 GE1/0/2 UP 1G(a) F(a) A 100 GE1/0/3 UP 10M(a) F(a) A 100 XGE1/0/1 UP 10G(a) F(a) A 200 XGE1/0/2 UP 10G(a) F(a) A 200 If any access switch port are configured for the native vlan. This is a finding.
Remove the native vlan of the trunk ports. [HP-GigabitEthernet1/0/1] undo port trunk permit vlan 1