STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Dell OS10 Switch Layer 2 Switch Security Technical Implementation Guide

Version

V1R1

Release Date

Dec 11, 2024

SCAP Benchmark ID

Dell_OS10_Switch_L2S_STIG

Total Checks

20

Tags

network
CAT I: 1CAT II: 15CAT III: 4

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (20)

V-269953HIGHThe Dell OS10 Switch must uniquely identify all network-connected endpoint devices before establishing any connection.V-269954MEDIUMThe Dell OS10 Switch must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.V-269955LOWThe Dell OS10 Switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.V-269956MEDIUMThe Dell OS10 Switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.V-269957MEDIUMThe Dell OS10 Switch must have STP Loop Guard enabled on all nondesignated STP switch ports.V-269958MEDIUMThe Dell OS10 Switch must have Unknown Unicast Flood Blocking (UUFB) enabled.V-269959MEDIUMThe Dell OS10 Switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.V-269960MEDIUMThe Dell OS10 Switch must have Source Address Validation (SAV) enabled on all user-facing or untrusted access switch ports.V-269961MEDIUMThe Dell OS10 Switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.V-269962LOWThe Dell OS10 Switch must have Storm Control configured on all host-facing switch ports.V-269963LOWThe Dell OS10 Switch must have IGMP or MLD Snooping configured on all VLANsV-269964MEDIUMThe Dell OS10 Switch must implement Rapid Spanning Tree Protocol (STP) where VLANs span multiple switches with redundant links.V-269965MEDIUMThe Dell OS10 Switch must enable Far-End Failure Detection (FEFD) to protect against one-way connections.V-269966MEDIUMThe Dell OS10 Switch must have all disabled switch ports assigned to an unused VLAN.V-269967MEDIUMThe Dell OS10 Switch must not have the default VLAN assigned to any host-facing switch ports.V-269968MEDIUMThe Dell OS10 Switch must have the default VLAN pruned from all trunk ports that do not require it.V-269969MEDIUMThe Dell OS10 Switch must not use the default VLAN for management traffic.V-269970MEDIUMThe Dell OS10 Switch must have all user-facing or untrusted ports configured as access switch ports.V-269971LOWThe Dell OS10 Switch must not have any switch ports assigned to the native VLAN.V-269972MEDIUMThe Dell OS10 Switch must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.