STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cisco NX OS Switch RTR Security Technical Implementation Guide

V-221078

CAT II (Medium)

The Cisco switch must not be configured to have any feature enabled that calls home to the vendor.

Rule ID

SV-221078r999687_rule

STIG

Cisco NX OS Switch RTR Security Technical Implementation Guide

Version

V3R4

CCIs

CCI-002403

Discussion

Call home services will routinely send data such as configuration and diagnostic information to the vendor for routine or emergency analysis and troubleshooting. There is a risk that transmission of sensitive data sent to unauthorized persons could result in data loss or downtime due to an attack.

Check Content

Review the switch configuration to determine if the call home service is enabled as shown in the example below:

callhome
 contract-id CompanyXYZ
 customer-id CompanyXYZ
 email-contact netadmin@CompanyXYZ.com
 phone-contact +1-800-555-4567
 enable

If the call home feature is configured to call home to the vendor, this is a finding.

Fix Text

Disable the call home feature as shown below:

SW1(config)# callhome
SW1(config-callhome)# no enable 
SW1(config-callhome)# end