STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Layer 2 Switch Security Requirements Guide

Version

V3R4

Release Date

Feb 12, 2026

SCAP Benchmark ID

Layer_2_Switch_SRG

Total Checks

36

Tags

network
CAT I: 1CAT II: 31CAT III: 4

This Security Requirements Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (36)

V-206646MEDIUMThe layer 2 switch must be configured to disable non-essential capabilities.V-206647HIGHThe layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.V-206648MEDIUMWhen using VLAN Trunk Protocol (VTP) or similar features, the layer 2 switch must authenticate all VTP messages with a hash function using the most secured cryptographic algorithm available.V-206649MEDIUMThe layer 2 switch must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.V-206650MEDIUMThe layer 2 switch must be configured to fail securely in the event of an operational failure.V-206653MEDIUMThe layer 2 switch must authenticate all network-connected endpoint devices before establishing any connection.V-206654LOWThe layer 2 switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.V-206655MEDIUMThe layer 2 switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.V-206656MEDIUMThe layer 2 switch must have STP Loop Guard enabled on all non-designated STP switch ports.V-206657MEDIUMThe layer 2 switch must have Unknown Unicast Flood Blocking (UUFB) enabled.V-206658MEDIUMThe layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.V-206659MEDIUMThe layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.V-206660MEDIUMThe layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.V-206661LOWThe layer 2 switch must have Storm Control configured on all host-facing switch ports.V-206662LOWThe layer 2 switch must have IGMP or MLD Snooping configured on all VLANsV-206663MEDIUMThe layer 2 switch must implement Rapid STP where VLANs span multiple switches with redundant links.V-206664MEDIUMThe layer 2 switch must be configured to protect against one-way connections.V-206665MEDIUMThe layer 2 switch must have all trunk links enabled statically.V-206666MEDIUMThe layer 2 switch must have all disabled switch ports assigned to an unused VLAN.V-206667MEDIUMThe layer 2 switch must not have the default VLAN assigned to any host-facing switch ports.V-206668MEDIUMThe layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it.V-206669MEDIUMThe layer 2 switch must not use the default VLAN for management traffic.V-206670MEDIUMThe layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.V-206671MEDIUMThe layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.V-206672LOWThe layer 2 switch must not have any switch ports assigned to the native VLAN.V-216507MEDIUMThe layer 2 switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.V-263667MEDIUMThe layer 2 switch must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.V-263668MEDIUMThe layer 2 switch must establish organization-defined alternate communications paths for system operations organizational command and control.V-278980MEDIUMThe layer 2 switch must dynamically associate security attributes with organization-defined subjects in accordance with organization-defined security policies as information is created and combined.V-278981MEDIUMThe layer 2 switch must validate the integrity of transmitted security attributes.V-278982MEDIUMThe layer 2 switch must use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.V-278983MEDIUMThe layer 2 switch must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.V-278984MEDIUMThe layer 2 switch must uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.V-278985MEDIUMThe layer 2 switch, when transferring information between different security domains, must apply the same security policy filtering to metadata as it applies to data payloads.V-278986MEDIUMThe layer 2 switch must fail securely in the event of an operational failure of a boundary protection device.V-278987MEDIUMThe layer 2 switch must dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.