STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 13 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Cisco ACI Layer 2 Switch Security Technical Implementation Guide

Version

V1R2

Release Date

Dec 11, 2025

SCAP Benchmark ID

Cisco_ACI_L2S_STIG

Total Checks

7

Tags

network
CAT I: 1CAT II: 4CAT III: 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (7)

V-272029HIGHThe Cisco ACI layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.V-272032MEDIUMThe Cisco ACI layer 2 switch must authenticate all network-connected endpoint devices before establishing any connection.V-272033MEDIUMThe Cisco ACI layer 2 switch must have Unknown Unicast Flood Blocking (UUFB) set to "Hardware Proxy".V-272037MEDIUMThe Cisco ACI layer 2 switch must enable port security.V-272038LOWThe Cisco ACI layer 2 switch must have Storm Control configured on all host-facing switch ports.V-272039LOWThe Cisco ACI layer 2 switch must have Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping configured on all VLANs.V-272045MEDIUMThe Cisco ACI layer 2 switch must employ a first-hop-security (FHS) policy to protect against denial-of-service (DoS) attacks.