Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review the switch configuration to determine if services or functions not required for operation, or not related to switch functionality, are enabled. If unnecessary services and functions are enabled on the switch, this is a finding.
Remove unneeded services and functions from the switch. Removal is recommended since the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
Verify if the switch configuration has 802.1x authentication implemented for all access switch ports connecting to LAN outlets (i.e., RJ-45 wall plates) or devices not located in the telecom room, wiring closets, or equipment rooms. MAC Authentication Bypass (MAB) must be configured on those switch ports connected to devices that do not support an 802.1x supplicant. If 802.1x authentication or MAB is not configured on all access switch ports connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms, this is a finding.
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.
Review the switch configuration to verify if VTP is enabled. If VTP is enabled, verify that authentication has been configured. If VTP has been configured on the switch and is not authenticating VTP messages with a hash function using the most secured cryptographic algorithm available, this is a finding.
Configure the switch to authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
Review the switch configuration to verify that QoS has been enabled to ensure that sufficient capacity is available for mission-critical traffic such as voice and enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies. If the switch is not configured to implement a QoS policy, this is a finding.
Implement a QoS policy for traffic prioritization and bandwidth reservation. This policy must enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies.
Review the vendor documentation to determine if the layer 2 switch will fail to a secure state in the event that the system initialization fails, shutdown fails, or abort fails. If the layer 2 switch does not fail to a secure state in the event that the system initialization fails, shutdown fails, or abort fails, this is a finding.
Configure the layer 2 switch to fail to a secure state upon failure of initialization, shutdown, or abort actions.
Verify that the switch is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session. If the switch is not capable of capturing ingress and egress packets from a designated switch port, this is a finding.
Enable the feature or configure the switch so that it is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session.
Verify that the switch is capable of capturing ingress and egress packets from any designated switch port for the purpose of remotely monitoring a specific user session. If the switch is not capable of capturing ingress and egress packets from a designated switch port for the purpose of remotely monitoring a specific user session, this is a finding.
Enable the feature or configure the switch so that it is capable of capturing ingress and egress packets from any designated switch port for the purpose of monitoring a specific user session.
Verify if the switch configuration has 802.1x authentication implemented for all access switch ports connecting to LAN outlets (i.e., RJ-45 wall plates) or devices not located in the telecom room, wiring closets, or equipment rooms. MAC Authentication Bypass (MAB) must be configured on those switch ports connected to devices that do not provide an 802.1x supplicant. If 802.1x authentication or MAB is not on configured on all access switch ports connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms, this is a finding.
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.
Review the switch topology as well as the switch configuration to verify that Root Guard is enabled on all switch ports connecting to access layer switches and hosts. If the switch has not enabled Root Guard on all switch ports connecting to access layer switches and hosts, this is a finding.
Configure the switch to have Root Guard enabled on all switch ports connecting to access layer switches and hosts.
Review the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports. If the switch has not enabled BPDU Guard, this is a finding.
Configure the switch to have BPDU Guard enabled on all user-facing or untrusted access switch ports.
Review the switch configuration to verify that STP Loop Guard is enabled. If STP Loop Guard is not configured globally or on non-designated STP ports, this is a finding.
Configure the switch to have STP Loop Guard enabled globally or at a minimum on all non-designated STP switch ports.
Review the switch configuration to verify that UUFB is enabled on all access switch ports. If any access switch ports do not have UUFB enabled, this is a finding.
Configure the switch to have Unknown Unicast Flood Blocking (UUFB) enabled.
Review the switch configuration and verify that DHCP snooping is enabled on all user VLANs. If the switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources, this is a finding.
Configure the switch to have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
Review the switch configuration to verify that IP Source Guard is enabled on all user-facing or untrusted access switch ports. If the switch does not have IP Source Guard enabled on all untrusted access switch ports, this is a finding.
Configure the switch to have IP Source Guard enabled on all user-facing or untrusted access switch ports.
Review the switch configuration to verify that Dynamic Address Resolution Protocol (ARP) Inspection (DAI) feature is enabled on all user VLANs. If DAI is not enabled on all user VLANs, this is a finding.
Configure the switch to have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
Review the switch configuration to verify that storm control is enabled on host-facing interfaces. If storm control is not enabled on all host-facing switch ports, this is a finding.
Configure storm control on each host-facing switch ports.
Review the switch configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively. If the switch is not configured to implement IGMP or MLD snooping for each VLAN, this is a finding.
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VLAN.
In cases where VLANs do not span multiple switches, it is a best practice to not implement STP. Avoiding the use of STP will provide the most deterministic and highly available network topology. If STP is required, then review the switch configuration to verify that Rapid STP has been implemented. If Rapid STP has not been implemented where STP is required, this is a finding.
Configure Rapid STP to be implemented at the access and distribution layers where VLANs span multiple switches.
If any of the switch ports have fiber optic interconnections with neighbors, review the switch configuration to verify that UDLD is enabled globally or on a per interface basis. If the switch has fiber optic interconnections with neighbors and UDLD is not enabled, this is a finding.
Configure the switch to enable Unidirectional Link Detection (UDLD) to protect against one-way connections. Note: UDLD is a Cisco-proprietary protocol. However, other switch vendors, such as 3Com, Extreme, and D-Link, have similar functionality in their products, respectively: Device Link Detection Protocol (DLDP), Extreme Link Status Monitoring (ELSM), and D-Link Unidirectional Link Detection (DULD).
Review the switch configuration to verify that trunk negotiation is disabled by statically configuring all trunk links. Configuring a command to manually disable negotiation may also be required for some switch platforms. If trunk negotiation is enabled on any interface, this is a finding.
Configure the switch to enable trunk links statically.
Review the switch configurations and examine all access switch ports. Each access switch port not in use should have membership to an inactive VLAN that is not used for any purpose and is not allowed on any trunk links. If there are any access switch ports not in use and not in an inactive VLAN, this is a finding. Note: Switch ports configured for 802.1x are exempt from this requirement.
Assign all switch ports not in use to an inactive VLAN. Note: Switch ports configured for 802.1x are exempt from this requirement.
Review the switch configurations and verify that no access switch ports have been assigned membership to the default VLAN (i.e., VLAN 1). A good method of ensuring there is not membership to the default VLAN is to have it disabled (i.e., shutdown) on the switch. This technique does not prevent switch control plane protocols such as CDP, DTP, VTP, and PAgP from using the default VLAN. If there are access switch ports assigned to the default VLAN, this is a finding.
Remove the assignment of the default VLAN from all access switch ports.
Review the switch configuration and verify that the default VLAN is pruned from trunk links that do not require it. If the default VLAN is not pruned from trunk links that should not be transporting frames for the VLAN, this is a finding.
Best practice for VLAN-based networks is to prune unnecessary trunk links from gaining access to the default VLAN and to ensure that frames belonging to the default VLAN do not traverse trunks not requiring frames from the VLAN.
Review the switch configuration and verify that the default VLAN is not used to access the switch for management. If the default VLAN is being used to access the switch, this is a finding.
Configure the switch for management access to use a VLAN other than the default VLAN.
Review the switch configurations and examine all user-facing or untrusted switch ports. If any of the user-facing switch ports are configured as a trunk, this is a finding.
Disable trunking on all user-facing or untrusted switch ports.
Review the switch configurations and examine all trunk links. Verify the native VLAN has been configured to a VLAN ID other than the ID of the default VLAN (i.e. VLAN 1). If the native VLAN has the same VLAN ID as the default VLAN, this is a finding.
To ensure the integrity of the trunk link and prevent unauthorized access, the ID of the native VLAN of the trunk port must be changed from the default VLAN (i.e., VLAN 1) to its own unique VLAN ID. The native VLAN ID must be the same on both ends of the trunk link; otherwise, traffic could accidentally leak between broadcast domains. Note: An alternative to configuring a dedicated native VLAN is to ensure that all native VLAN traffic is tagged. This will mitigate the risk of VLAN hopping since there will always be an outer tag for native traffic as it traverses an 802.1q trunk link.
Review the switch configurations and examine all access switch ports. Verify that they do not belong to the native VLAN. If any access switch ports have been assigned to the same VLAN ID as the native VLAN, this is a finding.
Configure all access switch ports to a VLAN other than the native VLAN.
Determine if the switch is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Configure the switch to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Verify the layer 2 switch is configured to employ organization-defined controls by type of DoS to achieve the DoS objective. If the layer 2 switch is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Configure the layer 2 switch to employ organization-defined controls by type of DoS to achieve the DoS objective.
Verify the layer 2 switch is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the layer 2 switch is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Configure the layer 2 switch to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
Verify the layer 2 switch is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the layer 2 switch is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Configure the layer 2 switch to establish organization-defined alternate communications paths for system operations organizational command and control.