STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Dell OS10 Switch Layer 2 Switch Security Technical Implementation Guide

V-269957

CAT II (Medium)

The Dell OS10 Switch must have STP Loop Guard enabled on all nondesignated STP switch ports.

Rule ID

SV-269957r1052257_rule

STIG

Dell OS10 Switch Layer 2 Switch Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002385

Discussion

The Spanning Tree Protocol (STP) loop guard feature provides additional protection against STP loops. An STP loop is created when an STP blocking port in a redundant topology erroneously transitions to the forwarding state. In its operation, STP relies on continuous reception and transmission of Bridge Protocol Data Unit (BPDUs) based on the port role. The designated port transmits BPDUs, and the nondesignated port receives BPDUs. When one of the ports in a physically redundant topology no longer receives BPDUs, the STP conceives that the topology is loop free. Eventually, the blocking port from the alternate or backup port becomes a designated port and moves to a forwarding state. This situation creates a loop. The loop guard feature makes additional checks. If BPDUs are not received on a nondesignated port and loop guard is enabled, that port is moved into the STP loop-inconsistent blocking state.

Check Content

Review the switch configuration to verify that STP Loop Guard is enabled on at least all nondesignated STP ports.

Verify that the spanning-tree guard loop setting is enabled on each interface.

interface ethernet1/1/1
 no shutdown
 switchport mode trunk
 switchport access vlan 100
 flowcontrol receive off
 spanning-tree guard loop
!

If STP Loop Guard is not configured globally or on nondesignated STP ports, this is a finding.

Fix Text

Configure the switch to have STP Loop Guard enabled globally, or at a minimum, on all nondesignated STP switch ports.

OS10(config)# interface range ethernet 1/1/1-1/1/58
OS10(conf-range-eth1/1/1-1/1/58)# spanning-tree guard loop