Skip to content

Cisco IOS Switch L2S Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000148-L2S-000015

    Group
  • SRG-NET-000168-L2S-000019

    Group
  • SRG-NET-000193-L2S-000020

    Group
  • The Cisco switch must manage excess bandwidth to limit the effects of packet-flooding types of denial-of-service (DoS) attacks.

    Denial of service is a condition when a resource is not available for legitimate users. Packet-flooding distributed DoS (DDoS) attacks are referred to as volumetric attacks and have the objective o...
    Rule Medium Severity
  • SRG-NET-000362-L2S-000021

    Group
  • SRG-NET-000362-L2S-000022

    Group
  • SRG-NET-000362-L2S-000023

    Group
  • The Cisco switch must have Spanning Tree Protocol (STP) Loop Guard enabled.

    The STP loop guard feature provides additional protection against STP loops. An STP loop is created when an STP blocking port in a redundant topology erroneously transitions to the forwarding state...
    Rule Medium Severity
  • SRG-NET-000362-L2S-000024

    Group
  • The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled.

    Access layer switches use the Content Addressable Memory (CAM) table to direct traffic to specific ports based on the VLAN number and the destination MAC address of the frame. When a router has an ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules