STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Layer 2 Switch Security Requirements Guide

V-206655

CAT II (Medium)

The layer 2 switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.

Rule ID

SV-206655r856585_rule

STIG

Layer 2 Switch Security Requirements Guide

Version

V3R4

CCIs

CCI-002385

Discussion

If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priority than the existing root bridge, it will become the new root bridge and cause a topology change, rendering the network in a suboptimal state. The STP PortFast BPDU guard enhancement allows network designers to enforce the STP domain borders and keep the active topology predictable. The devices behind the ports that have STP PortFast enabled are not able to influence the STP topology. At the reception of BPDUs, the BPDU guard operation disables the port that has PortFast configured. The BPDU guard transitions the port into errdisable state and sends a log message.

Check Content

Review the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports.

If the switch has not enabled BPDU Guard, this is a finding.

Fix Text

Configure the switch to have BPDU Guard enabled on all user-facing or untrusted access switch ports.