Layer 2 Switch Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −3
Comparison against the immediately-prior release (V3R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 3
- V-206651 Medium The layer 2 switch must provide the capability for authorized users to select a user session to capture.
- V-206652 Medium The layer 2 switch must provide the capability for authorized users to remotely view, in real time, all content related to an established user session from a component separate from the layer 2 switch.
- V-263666 Medium The layer 2 switch must employ organization-defined controls by type of denial-of-service (DoS) to achieve the DoS objective.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-L2S-000014
- Vuln IDs
-
- V-206646
- V-62065
- Rule IDs
-
- SV-206646r382903_rule
- SV-76555
Checks: C-6904r298368_chk
Review the switch configuration to determine if services or functions not required for operation, or not related to switch functionality, are enabled. If unnecessary services and functions are enabled on the switch, this is a finding.
Fix: F-6904r298369_fix
Remove unneeded services and functions from the switch. Removal is recommended since the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-3
- Severity
- H
- CCI
- CCI-000778
- Version
- SRG-NET-000148-L2S-000015
- Vuln IDs
-
- V-206647
- V-62155
- Rule IDs
-
- SV-206647r385501_rule
- SV-95193
Checks: C-6905r298371_chk
Verify if the switch configuration has 802.1x authentication implemented for all access switch ports connecting to LAN outlets (i.e., RJ-45 wall plates) or devices not located in the telecom room, wiring closets, or equipment rooms. MAC Authentication Bypass (MAB) must be configured on those switch ports connected to devices that do not support an 802.1x supplicant. If 802.1x authentication or MAB is not configured on all access switch ports connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms, this is a finding.
Fix: F-6905r298372_fix
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-L2S-000019
- Vuln IDs
-
- V-206648
- V-62161
- Rule IDs
-
- SV-206648r385516_rule
- SV-76651
Checks: C-6906r298374_chk
Review the switch configuration to verify if VTP is enabled. If VTP is enabled, verify that authentication has been configured. If VTP has been configured on the switch and is not authenticating VTP messages with a hash function using the most secured cryptographic algorithm available, this is a finding.
Fix: F-6906r298375_fix
Configure the switch to authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-L2S-000020
- Vuln IDs
-
- V-206649
- V-62163
- Rule IDs
-
- SV-206649r385534_rule
- SV-76653
Checks: C-6907r298377_chk
Review the switch configuration to verify that QoS has been enabled to ensure that sufficient capacity is available for mission-critical traffic such as voice and enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies. If the switch is not configured to implement a QoS policy, this is a finding.
Fix: F-6907r298378_fix
Implement a QoS policy for traffic prioritization and bandwidth reservation. This policy must enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000235-L2S-000031
- Vuln IDs
-
- V-206650
- V-62165
- Rule IDs
-
- SV-206650r383119_rule
- SV-76655
Checks: C-6908r298380_chk
Review the vendor documentation to determine if the layer 2 switch will fail to a secure state in the event that the system initialization fails, shutdown fails, or abort fails. If the layer 2 switch does not fail to a secure state in the event that the system initialization fails, shutdown fails, or abort fails, this is a finding.
Fix: F-6908r298381_fix
Configure the layer 2 switch to fail to a secure state upon failure of initialization, shutdown, or abort actions.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-L2S-000016
- Vuln IDs
-
- V-206653
- V-62171
- Rule IDs
-
- SV-206653r856583_rule
- SV-76661
Checks: C-6911r298389_chk
Verify if the switch configuration has 802.1x authentication implemented for all access switch ports connecting to LAN outlets (i.e., RJ-45 wall plates) or devices not located in the telecom room, wiring closets, or equipment rooms. MAC Authentication Bypass (MAB) must be configured on those switch ports connected to devices that do not provide an 802.1x supplicant. If 802.1x authentication or MAB is not on configured on all access switch ports connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms, this is a finding.
Fix: F-6911r298390_fix
Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000021
- Vuln IDs
-
- V-206654
- V-62173
- Rule IDs
-
- SV-206654r856584_rule
- SV-76663
Checks: C-6912r298392_chk
Review the switch topology as well as the switch configuration to verify that Root Guard is enabled on all switch ports connecting to access layer switches and hosts. If the switch has not enabled Root Guard on all switch ports connecting to access layer switches and hosts, this is a finding.
Fix: F-6912r298393_fix
Configure the switch to have Root Guard enabled on all switch ports connecting to access layer switches and hosts.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000022
- Vuln IDs
-
- V-206655
- V-62175
- Rule IDs
-
- SV-206655r856585_rule
- SV-76665
Checks: C-6913r298395_chk
Review the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports. If the switch has not enabled BPDU Guard, this is a finding.
Fix: F-6913r298396_fix
Configure the switch to have BPDU Guard enabled on all user-facing or untrusted access switch ports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000023
- Vuln IDs
-
- V-206656
- V-62177
- Rule IDs
-
- SV-206656r856586_rule
- SV-76667
Checks: C-6914r298398_chk
Review the switch configuration to verify that STP Loop Guard is enabled. If STP Loop Guard is not configured globally or on non-designated STP ports, this is a finding.
Fix: F-6914r298399_fix
Configure the switch to have STP Loop Guard enabled globally or at a minimum on all non-designated STP switch ports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000024
- Vuln IDs
-
- V-206657
- V-62179
- Rule IDs
-
- SV-206657r856587_rule
- SV-76669
Checks: C-6915r298401_chk
Review the switch configuration to verify that UUFB is enabled on all access switch ports. If any access switch ports do not have UUFB enabled, this is a finding.
Fix: F-6915r298402_fix
Configure the switch to have Unknown Unicast Flood Blocking (UUFB) enabled.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000025
- Vuln IDs
-
- V-206658
- V-62181
- Rule IDs
-
- SV-206658r856588_rule
- SV-76671
Checks: C-6916r298404_chk
Review the switch configuration and verify that DHCP snooping is enabled on all user VLANs. If the switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources, this is a finding.
Fix: F-6916r298405_fix
Configure the switch to have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000026
- Vuln IDs
-
- V-206659
- V-62183
- Rule IDs
-
- SV-206659r856589_rule
- SV-76673
Checks: C-6917r298407_chk
Review the switch configuration to verify that IP Source Guard is enabled on all user-facing or untrusted access switch ports. If the switch does not have IP Source Guard enabled on all untrusted access switch ports, this is a finding.
Fix: F-6917r298408_fix
Configure the switch to have IP Source Guard enabled on all user-facing or untrusted access switch ports.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-L2S-000027
- Vuln IDs
-
- V-206660
- V-62185
- Rule IDs
-
- SV-206660r856590_rule
- SV-76675
Checks: C-6918r298410_chk
Review the switch configuration to verify that Dynamic Address Resolution Protocol (ARP) Inspection (DAI) feature is enabled on all user VLANs. If DAI is not enabled on all user VLANs, this is a finding.
Fix: F-6918r298411_fix
Configure the switch to have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000001
- Vuln IDs
-
- V-206661
- V-95879
- Rule IDs
-
- SV-206661r385561_rule
- SV-105017
Checks: C-6919r298413_chk
Review the switch configuration to verify that storm control is enabled on host-facing interfaces. If storm control is not enabled on all host-facing switch ports, this is a finding.
Fix: F-6919r298414_fix
Configure storm control on each host-facing switch ports.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000002
- Vuln IDs
-
- V-206662
- V-95881
- Rule IDs
-
- SV-206662r385561_rule
- SV-105019
Checks: C-6920r298416_chk
Review the switch configuration to verify that IGMP or MLD snooping has been configured for IPv4 and IPv6 multicast traffic respectively. If the switch is not configured to implement IGMP or MLD snooping for each VLAN, this is a finding.
Fix: F-6920r298417_fix
Configure IGMP or MLD snooping for IPv4 and IPv6 multicast traffic respectively for each VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000003
- Vuln IDs
-
- V-206663
- V-62193
- Rule IDs
-
- SV-206663r385561_rule
- SV-76683
Checks: C-6921r298419_chk
In cases where VLANs do not span multiple switches, it is a best practice to not implement STP. Avoiding the use of STP will provide the most deterministic and highly available network topology. If STP is required, then review the switch configuration to verify that Rapid STP has been implemented. If Rapid STP has not been implemented where STP is required, this is a finding.
Fix: F-6921r298420_fix
Configure Rapid STP to be implemented at the access and distribution layers where VLANs span multiple switches.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000004
- Vuln IDs
-
- V-206664
- V-62195
- Rule IDs
-
- SV-206664r539566_rule
- SV-76685
Checks: C-6922r298422_chk
If any of the switch ports have fiber optic interconnections with neighbors, review the switch configuration to verify that UDLD is enabled globally or on a per interface basis. If the switch has fiber optic interconnections with neighbors and UDLD is not enabled, this is a finding.
Fix: F-6922r539565_fix
Configure the switch to enable Unidirectional Link Detection (UDLD) to protect against one-way connections. Note: UDLD is a Cisco-proprietary protocol. However, other switch vendors, such as 3Com, Extreme, and D-Link, have similar functionality in their products, respectively: Device Link Detection Protocol (DLDP), Extreme Link Status Monitoring (ELSM), and D-Link Unidirectional Link Detection (DULD).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000005
- Vuln IDs
-
- V-206665
- V-62197
- Rule IDs
-
- SV-206665r385561_rule
- SV-76687
Checks: C-6923r298425_chk
Review the switch configuration to verify that trunk negotiation is disabled by statically configuring all trunk links. Configuring a command to manually disable negotiation may also be required for some switch platforms. If trunk negotiation is enabled on any interface, this is a finding.
Fix: F-6923r298426_fix
Configure the switch to enable trunk links statically.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000007
- Vuln IDs
-
- V-206666
- V-62201
- Rule IDs
-
- SV-206666r385561_rule
- SV-76691
Checks: C-6924r298428_chk
Review the switch configurations and examine all access switch ports. Each access switch port not in use should have membership to an inactive VLAN that is not used for any purpose and is not allowed on any trunk links. If there are any access switch ports not in use and not in an inactive VLAN, this is a finding. Note: Switch ports configured for 802.1x are exempt from this requirement.
Fix: F-6924r298429_fix
Assign all switch ports not in use to an inactive VLAN. Note: Switch ports configured for 802.1x are exempt from this requirement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000008
- Vuln IDs
-
- V-206667
- V-62203
- Rule IDs
-
- SV-206667r385561_rule
- SV-76693
Checks: C-6925r298431_chk
Review the switch configurations and verify that no access switch ports have been assigned membership to the default VLAN (i.e., VLAN 1). A good method of ensuring there is not membership to the default VLAN is to have it disabled (i.e., shutdown) on the switch. This technique does not prevent switch control plane protocols such as CDP, DTP, VTP, and PAgP from using the default VLAN. If there are access switch ports assigned to the default VLAN, this is a finding.
Fix: F-6925r298432_fix
Remove the assignment of the default VLAN from all access switch ports.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000009
- Vuln IDs
-
- V-206668
- V-62205
- Rule IDs
-
- SV-206668r385561_rule
- SV-76695
Checks: C-6926r298434_chk
Review the switch configuration and verify that the default VLAN is pruned from trunk links that do not require it. If the default VLAN is not pruned from trunk links that should not be transporting frames for the VLAN, this is a finding.
Fix: F-6926r298435_fix
Best practice for VLAN-based networks is to prune unnecessary trunk links from gaining access to the default VLAN and to ensure that frames belonging to the default VLAN do not traverse trunks not requiring frames from the VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000010
- Vuln IDs
-
- V-206669
- V-62207
- Rule IDs
-
- SV-206669r385561_rule
- SV-76697
Checks: C-6927r298437_chk
Review the switch configuration and verify that the default VLAN is not used to access the switch for management. If the default VLAN is being used to access the switch, this is a finding.
Fix: F-6927r298438_fix
Configure the switch for management access to use a VLAN other than the default VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000011
- Vuln IDs
-
- V-206670
- V-62209
- Rule IDs
-
- SV-206670r385561_rule
- SV-76699
Checks: C-6928r298440_chk
Review the switch configurations and examine all user-facing or untrusted switch ports. If any of the user-facing switch ports are configured as a trunk, this is a finding.
Fix: F-6928r298441_fix
Disable trunking on all user-facing or untrusted switch ports.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000012
- Vuln IDs
-
- V-206671
- V-62211
- Rule IDs
-
- SV-206671r539568_rule
- SV-76701
Checks: C-6929r298443_chk
Review the switch configurations and examine all trunk links. Verify the native VLAN has been configured to a VLAN ID other than the ID of the default VLAN (i.e. VLAN 1). If the native VLAN has the same VLAN ID as the default VLAN, this is a finding.
Fix: F-6929r539567_fix
To ensure the integrity of the trunk link and prevent unauthorized access, the ID of the native VLAN of the trunk port must be changed from the default VLAN (i.e., VLAN 1) to its own unique VLAN ID. The native VLAN ID must be the same on both ends of the trunk link; otherwise, traffic could accidentally leak between broadcast domains. Note: An alternative to configuring a dedicated native VLAN is to ensure that all native VLAN traffic is tagged. This will mitigate the risk of VLAN hopping since there will always be an outer tag for native traffic as it traverses an 802.1q trunk link.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000013
- Vuln IDs
-
- V-206672
- V-62213
- Rule IDs
-
- SV-206672r385561_rule
- SV-76703
Checks: C-6930r298446_chk
Review the switch configurations and examine all access switch ports. Verify that they do not belong to the native VLAN. If any access switch ports have been assigned to the same VLAN ID as the native VLAN, this is a finding.
Fix: F-6930r298447_fix
Configure all access switch ports to a VLAN other than the native VLAN.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-L2S-000100
- Vuln IDs
-
- V-216507
- V-100097
- Rule IDs
-
- SV-216507r539569_rule
- SV-109201
Checks: C-17742r298449_chk
Determine if the switch is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-17740r298450_fix
Configure the switch to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-L2S-000120
- Vuln IDs
-
- V-263667
- Rule IDs
-
- SV-263667r982573_rule
Checks: C-67580r982572_chk
Verify the layer 2 switch is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the layer 2 switch is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-67488r982275_fix
Configure the layer 2 switch to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-L2S-000160
- Vuln IDs
-
- V-263668
- Rule IDs
-
- SV-263668r982575_rule
Checks: C-67581r982574_chk
Verify the layer 2 switch is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the layer 2 switch is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-67489r982278_fix
Configure the layer 2 switch to establish organization-defined alternate communications paths for system operations organizational command and control.