STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Cisco IOS XE Switch L2S Security Technical Implementation Guide

Version

V3R2

Benchmark ID

Cisco_IOS_XE_Switch_L2S_STIG

Total Checks

22

Tags

networkmobile
CAT I: 1CAT II: 17CAT III: 4

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (22)

V-220649HIGHThe Cisco switch must uniquely identify and authenticate all network-connected endpoint devices before establishing any connection.V-220650MEDIUMThe Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.V-220651MEDIUMThe Cisco switch must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.V-220655LOWThe Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.V-220656MEDIUMThe Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.V-220657MEDIUMThe Cisco switch must have STP Loop Guard enabled.V-220658MEDIUMThe Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.V-220659MEDIUMThe Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.V-220660MEDIUMThe Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.V-220661MEDIUMThe Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.V-220662LOWThe Cisco switch must have Storm Control configured on all host-facing switchports.V-220663LOWThe Cisco switch must have IGMP or MLD Snooping configured on all VLANs.V-220664MEDIUMThe Cisco switch must implement Rapid STP where VLANs span multiple switches with redundant links.V-220665MEDIUMThe Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.V-220666MEDIUMThe Cisco switch must have all trunk links enabled statically.V-220667MEDIUMThe Cisco switch must have all disabled switch ports assigned to an unused VLAN.V-220668MEDIUMThe Cisco switch must not have the default VLAN assigned to any host-facing switch ports.V-220669MEDIUMThe Cisco switch must have the default VLAN pruned from all trunk ports that do not require it.V-220670MEDIUMThe Cisco switch must not use the default VLAN for management traffic.V-220671MEDIUMThe Cisco switch must have all user-facing or untrusted ports configured as access switch ports.V-220672MEDIUMThe Cisco switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.V-220673LOWThe Cisco switch must not have any switchports assigned to the native VLAN.