Layer 2 Switch Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V1R5). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-100097 Medium The layer 2 switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-L2S-000014
- Vuln IDs
-
- V-62065
- Rule IDs
-
- SV-76555r1_rule
Checks: C-62869r1_chk
Review the switch configuration to determine if services or functions not required for operation, or not related to switch functionality, are enabled. If unnecessary services and functions are enabled on the switch, this is a finding.
Fix: F-67985r1_fix
Remove unneeded services and functions from the switch. Removal is recommended since the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-3
- Severity
- H
- CCI
- CCI-000778
- Version
- SRG-NET-000148-L2S-000015
- Vuln IDs
-
- V-62155
- Rule IDs
-
- SV-95193r1_rule
Checks: C-62959r3_chk
Verify if the switch configuration has 802.1x authentication implemented for all access switch ports connecting to LAN outlets (i.e., RJ-45 wall plates) or devices not located in the telecom room, wiring closets, or equipment rooms. MAC Authentication Bypass (MAB) must be configured on those switch ports connected to devices that do not support an 802.1x supplicant. If 802.1x authentication or MAB is not configured on all access switch ports connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms, this is a finding.
Fix: F-68075r1_fix
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-L2S-000019
- Vuln IDs
-
- V-62161
- Rule IDs
-
- SV-76651r1_rule
Checks: C-62965r2_chk
Review the switch configuration to verify if VTP is enabled. If VTP is enabled, verify that authentication has been configured. If VTP has been configured on the switch and is not authenticating VTP messages with a hash function using the most secured cryptographic algorithm available, this is a finding.
Fix: F-68081r1_fix
Configure the switch to authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-L2S-000020
- Vuln IDs
-
- V-62163
- Rule IDs
-
- SV-76653r1_rule
Checks: C-62967r2_chk
Review the switch configuration to verify that QoS has been enabled to ensure that sufficient capacity is available for mission-critical traffic such as voice and enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies. If the switch is not configured to implement a QoS policy, this is a finding.
Fix: F-68083r1_fix
Implement a QoS policy for traffic prioritization and bandwidth reservation. This policy must enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000235-L2S-000031
- Vuln IDs
-
- V-62165
- Rule IDs
-
- SV-76655r2_rule
Checks: C-62969r2_chk
Review the vendor documentation to determine if the layer 2 switch will fail to a secure state in the event that the system initialization fails, shutdown fails, or abort fails. If the layer 2 switch does not fail to a secure state in the event that the system initialization fails, shutdown fails, or abort fails, this is a finding.
Fix: F-68085r1_fix
Configure the layer 2 switch to fail to a secure state upon failure of initialization, shutdown, or abort actions.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001919
- Version
- SRG-NET-000331-L2S-000001
- Vuln IDs
-
- V-62167
- Rule IDs
-
- SV-76657r1_rule
Checks: C-62971r1_chk
Verify that the switch is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session. If the switch is not capable of capturing ingress and egress packets from a designated switch port, this is a finding.
Fix: F-68087r1_fix
Enable the feature or configure the switch so that it is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001920
- Version
- SRG-NET-000332-L2S-000002
- Vuln IDs
-
- V-62169
- Rule IDs
-
- SV-76659r1_rule
Checks: C-62973r1_chk
Verify that the switch is capable of capturing ingress and egress packets from any designated switch port for the purpose of remotely monitoring a specific user session. If the switch is not capable of capturing ingress and egress packets from a designated switch port for the purpose of remotely monitoring a specific user session, this is a finding.
Fix: F-68089r1_fix
Enable the feature or configure the switch so that it is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-L2S-000016
- Vuln IDs
-
- V-62171
- Rule IDs
-
- SV-76661r1_rule
Checks: C-62975r2_chk
Verify if the switch configuration has 802.1x authentication implemented for all access switch ports connecting to LAN outlets (i.e., RJ-45 wall plates) or devices not located in the telecom room, wiring closets, or equipment rooms. MAC Authentication Bypass (MAB) must be configured on those switch ports connected to devices that do not provide an 802.1x supplicant. If 802.1x authentication or MAB is not on configured on all access switch ports connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms, this is a finding.
Fix: F-68091r1_fix
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000021
- Vuln IDs
-
- V-62173
- Rule IDs
-
- SV-76663r2_rule
Checks: C-62977r4_chk
Review the switch topology as well as the switch configuration to verify that Root Guard is enabled on all switch ports connecting to access layer switches and hosts. If the switch has not enabled Root Guard on all switch ports connecting to access layer switches and hosts, this is a finding.
Fix: F-68093r2_fix
Configure the switch to have Root Guard enabled on all switch ports connecting to access layer switches and hosts.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000022
- Vuln IDs
-
- V-62175
- Rule IDs
-
- SV-76665r1_rule
Checks: C-62979r2_chk
Review the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports. If the switch has not enabled BPDU Guard, this is a finding.
Fix: F-68095r1_fix
Configure the switch to have BPDU Guard enabled on all user-facing or untrusted access switch ports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000023
- Vuln IDs
-
- V-62177
- Rule IDs
-
- SV-76667r1_rule
Checks: C-62981r2_chk
Review the switch configuration to verify that STP Loop Guard is enabled. If STP Loop Guard is not configured globally or on non-designated STP ports, this is a finding.
Fix: F-68097r1_fix
Configure the switch to have STP Loop Guard enabled globally or at a minimum on all non-designated STP switch ports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000024
- Vuln IDs
-
- V-62179
- Rule IDs
-
- SV-76669r1_rule
Checks: C-62983r2_chk
Review the switch configuration to verify that UUFB is enabled on all access switch ports. If any access switch ports do not have UUFB enabled, this is a finding.
Fix: F-68099r1_fix
Configure the switch to have Unknown Unicast Flood Blocking (UUFB) enabled.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000025
- Vuln IDs
-
- V-62181
- Rule IDs
-
- SV-76671r2_rule
Checks: C-62985r3_chk
Review the switch configuration and verify that DHCP snooping is enabled on all user VLANs. If the switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources, this is a finding.
Fix: F-68101r2_fix
Configure the switch to have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000026
- Vuln IDs
-
- V-62183
- Rule IDs
-
- SV-76673r1_rule
Checks: C-62987r2_chk
Review the switch configuration to verify that IP Source Guard is enabled on all user-facing or untrusted access switch ports. If the switch does not have IP Source Guard enabled on all untrusted access switch ports, this is a finding.
Fix: F-68103r1_fix
Configure the switch to have IP Source Guard enabled on all user-facing or untrusted access switch ports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000027
- Vuln IDs
-
- V-62185
- Rule IDs
-
- SV-76675r1_rule
Checks: C-62989r2_chk
Review the switch configuration to verify that Dynamic Address Resolution Protocol (ARP) Inspection (DAI) feature is enabled on all user VLANs. If DAI is not enabled on all user VLANs, this is a finding.
Fix: F-68105r1_fix
Configure the switch to have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000003
- Vuln IDs
-
- V-62193
- Rule IDs
-
- SV-76683r1_rule
Checks: C-62997r1_chk
In cases where VLANs do not span multiple switches, it is a best practice to not implement STP. Avoiding the use of STP will provide the most deterministic and highly available network topology. If STP is required, then review the switch configuration to verify that Rapid STP has been implemented. If Rapid STP has not been implemented where STP is required, this is a finding.
Fix: F-68113r1_fix
Configure Rapid STP to be implemented at the access and distribution layers where VLANs span multiple switches.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000004
- Vuln IDs
-
- V-62195
- Rule IDs
-
- SV-76685r1_rule
Checks: C-62999r1_chk
If any of the switch ports have fiber optic interconnections with neighbors, review the switch configuration to verify that UDLD is enabled globally or on a per interface basis. If the switch has fiber optic interconnections with neighbors and UDLD is not enabled, this is a finding.
Fix: F-68115r1_fix
Configure the switch to enable Unidirectional Link Detection (UDLD) to protect against one-way connections. Note: UDLD is a Cisco-proprietary protocol. However, other switch vendors, such as 3Com, Extreme, and D-Link, have similar functionality in their products, respectively: Device Link Detection Protocol (DLDP), Extreme Link Status Monitoring (ELSM), and D-Link Unidirectional Link Detection (DULD).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000005
- Vuln IDs
-
- V-62197
- Rule IDs
-
- SV-76687r1_rule
Checks: C-63001r2_chk
Review the switch configuration to verify that trunk negotiation is disabled by statically configuring all trunk links. Configuring a command to manually disable negotiation may also be required for some switch platforms. If trunk negotiation is enabled on any interface, this is a finding.
Fix: F-68117r1_fix
Configure the switch to enable trunk links statically.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000007
- Vuln IDs
-
- V-62201
- Rule IDs
-
- SV-76691r1_rule
Checks: C-63005r1_chk
Review the switch configurations and examine all access switch ports. Each access switch port not in use should have membership to an inactive VLAN that is not used for any purpose and is not allowed on any trunk links. If there are any access switch ports not in use and not in an inactive VLAN, this is a finding. Note: Switch ports configured for 802.1x are exempt from this requirement.
Fix: F-68121r1_fix
Assign all switch ports not in use to an inactive VLAN. Note: Switch ports configured for 802.1x are exempt from this requirement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000008
- Vuln IDs
-
- V-62203
- Rule IDs
-
- SV-76693r1_rule
Checks: C-63007r2_chk
Review the switch configurations and verify that no access switch ports have been assigned membership to the default VLAN (i.e., VLAN 1). A good method of ensuring there is not membership to the default VLAN is to have it disabled (i.e., shutdown) on the switch. This technique does not prevent switch control plane protocols such as CDP, DTP, VTP, and PAgP from using the default VLAN. If there are access switch ports assigned to the default VLAN, this is a finding.
Fix: F-68123r1_fix
Remove the assignment of the default VLAN from all access switch ports.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000009
- Vuln IDs
-
- V-62205
- Rule IDs
-
- SV-76695r1_rule
Checks: C-63009r2_chk
Review the switch configuration and verify that the default VLAN is pruned from trunk links that do not require it. If the default VLAN is not pruned from trunk links that should not be transporting frames for the VLAN, this is a finding.
Fix: F-68125r1_fix
Best practice for VLAN-based networks is to prune unnecessary trunk links from gaining access to the default VLAN and to ensure that frames belonging to the default VLAN do not traverse trunks not requiring frames from the VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000010
- Vuln IDs
-
- V-62207
- Rule IDs
-
- SV-76697r1_rule
Checks: C-63011r2_chk
Review the switch configuration and verify that the default VLAN is not used to access the switch for management. If the default VLAN is being used to access the switch, this is a finding.
Fix: F-68127r1_fix
Configure the switch for management access to use a VLAN other than the default VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000011
- Vuln IDs
-
- V-62209
- Rule IDs
-
- SV-76699r1_rule
Checks: C-63013r2_chk
Review the switch configurations and examine all user-facing or untrusted switch ports. If any of the user-facing switch ports are configured as a trunk, this is a finding.
Fix: F-68129r1_fix
Disable trunking on all user-facing or untrusted switch ports.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000012
- Vuln IDs
-
- V-62211
- Rule IDs
-
- SV-76701r1_rule
Checks: C-63015r2_chk
Review the switch configurations and examine all trunk links. Verify the native VLAN has been configured to a VLAN ID other than the ID of the default VLAN (i.e. VLAN 1). If the native VLAN has the same VLAN ID as the default VLAN, this is a finding.
Fix: F-68131r1_fix
To ensure the integrity of the trunk link and prevent unauthorized access, the ID of the native VLAN of the trunk port must be changed from the default VLAN (i.e., VLAN 1) to its own unique VLAN ID. The native VLAN ID must be the same on both ends of the trunk link; otherwise, traffic could accidentally leak between broadcast domains. Note: An alternative to configuring a dedicated native VLAN is to ensure that all native VLAN traffic is tagged. This will mitigate the risk of VLAN hopping since there will always be an outer tag for native traffic as it traverses an 802.1q trunk link.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000013
- Vuln IDs
-
- V-62213
- Rule IDs
-
- SV-76703r2_rule
Checks: C-63017r2_chk
Review the switch configurations and examine all access switch ports. Verify that they do not belong to the native VLAN. If any access switch ports have been assigned to the same VLAN ID as the native VLAN, this is a finding.
Fix: F-68133r1_fix
Configure all access switch ports to a VLAN other than the native VLAN.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000001
- Vuln IDs
-
- V-95879
- Rule IDs
-
- SV-105017r1_rule
Checks: C-94709r1_chk
Review the switch configuration to verify that storm control is enabled on host-facing interfaces. If storm control is not enabled on all host-facing switch ports, this is a finding.
Fix: F-101547r1_fix
Configure storm control on each host-facing switch ports.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000002
- Vuln IDs
-
- V-95881
- Rule IDs
-
- SV-105019r1_rule
Checks: C-94711r1_chk
Review the switch configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively. If the switch is not configured to implement IGMP or MLD snooping for each VLAN, this is a finding.
Fix: F-101549r1_fix
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000100
- Vuln IDs
-
- V-100097
- Rule IDs
-
- SV-109201r1_rule
Checks: C-98949r1_chk
Determine if the switch is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-105783r1_fix
Configure the switch to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.