STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cisco IOS XE Switch L2S Security Technical Implementation Guide

V-220657

CAT II (Medium)

The Cisco switch must have STP Loop Guard enabled.

Rule ID

SV-220657r856279_rule

STIG

Cisco IOS XE Switch L2S Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-002385

Discussion

The Spanning Tree Protocol (STP) loop guard feature provides additional protection against STP loops. An STP loop is created when an STP blocking port in a redundant topology erroneously transitions to the forwarding state. In its operation, STP relies on continuous reception and transmission of BPDUs based on the port role. The designated port transmits BPDUs, and the non-designated port receives BPDUs. When one of the ports in a physically redundant topology no longer receives BPDUs, the STP conceives that the topology is loop free. Eventually, the blocking port from the alternate or backup port becomes a designated port and moves to a forwarding state. This situation creates a loop. The loop guard feature makes additional checks. If BPDUs are not received on a non-designated port and loop guard is enabled, that port is moved into the STP loop-inconsistent blocking state.

Check Content

Review the switch configuration to verify that STP Loop Guard is enabled as shown in the configuration example below:

hostname SW2
…
…
…
spanning-tree mode pvst
spanning-tree loopguard default

If STP Loop Guard is not enabled, this is a finding.

Fix Text

Configure the switch to have STP Loop Guard enabled via the spanning-tree loopguard default global command.