1. Home
  2. Security Hardening
  3. DISA STIG Cisco IOS Switch L2S V2R2
  4. CISC-L2-000220 – The Cisco switch must not have the default VLAN assigned to any host-facing switch ports.

CISC-L2-000220 – The Cisco switch must not have the default VLAN assigned to any host-facing switch ports.

Details

In a VLAN-based network, switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with other networking devices using Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and Port Aggregation Protocol (PAgP) – all untagged traffic.

As a consequence, the default VLAN may unwisely span the entire network if not appropriately pruned. If its scope is large enough, the risk of compromise can increase significantly.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Remove the assignment of the default VLAN from all access switch ports.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Cisco.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles