SEL-2740S L2S Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000148-L2S-000015
Group -
The SEL-2740S must uniquely identify all network-connected endpoint devices before establishing any connection.
Controlling LAN access via identification of connecting hosts can assist in preventing a malicious user from connecting an unauthorized PC to a switch port to inject or receive data from the networ...Rule High Severity -
The SEL-2740S -must be configured to limit excess bandwidth and denial of service (DoS) attacks.
Denial of service is a condition when a resource is not available for legitimate users. Packet flooding DDoS attacks are referred to as volumetric attacks and have the objective of overloading a ne...Rule Medium Severity -
The SEL-2740S must be configured to mitigate the risk of ARP cache poisoning attacks.
The SEL-2740S must deter ARP cache poisoning attacks and configure the specific ARP flows that are only necessary to the control system network.Rule Medium Severity -
SRG-NET-000512-L2S-000029
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules