STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to RUCKUS ICX Layer 2 Switch Security Technical Implementation Guide

V-273684

CAT III (Low)

The RUCKUS ICX switch must have Storm Control configured on all host-facing switch ports.

Rule ID

SV-273684r1110987_rule

STIG

RUCKUS ICX Layer 2 Switch Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network disruption by suppressing ingress traffic when the number of packets reaches configured threshold levels. Traffic storm control monitors ingress traffic levels on a port and drops traffic when the number of packets reaches the configured threshold level during any one-second interval.

Check Content

Review the configuration for the desired storm control settings on host-facing ports.  
!
interface ethernet 1/1/5
 broadcast limit 8787
 multicast limit 777
 unknown-unicast limit 888
!

If host facing ports are not configured for storm control protection, this is a finding.

Fix Text

Configure storm control on each host-facing switch ports.

1. Enter global configuration mode:
device#configure terminal

2. Configure storm control:
device (config-if-e2500-1/1/5)#broadcast limit 8787 
device (config-if-e2500-1/1/5)#multicast limit 777 
device (config-if-e2500-1/1/5)#unknown-unicast limit 888