STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch L2S Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 08 May 2020:

The Cisco switch must be configured to disable non-essential capabilities.

DISA Rule

SV-110323r1_rule

Vulnerability Number

V-101219

Group Title

SRG-NET-000131-L2S-000014

Rule Version

CISC-L2-000010

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable features that should not be enabled unless required for operations.

SW2(config)# no feature telnet
SW2(config)# no feature wccp
SW2(config)# no feature nxapi
SW2(config)# no feature imp

Note: Telnet must always be disabled.

Check Contents

Verify that the switch does not have any unnecessary or non-secure ports, protocols, and services enabled. For example, the following features such as telnet should never be enabled, while other features should only be enabled if required for operations.

feature telnet
feature wccp
feature nxapi
feature imp

If any unnecessary or non-secure ports, protocols, or services are enabled, this is a finding.

Vulnerability Number

V-101219

Documentable

False

Rule Version

CISC-L2-000010

Severity Override Guidance

Verify that the switch does not have any unnecessary or non-secure ports, protocols, and services enabled. For example, the following features such as telnet should never be enabled, while other features should only be enabled if required for operations.

feature telnet
feature wccp
feature nxapi
feature imp

If any unnecessary or non-secure ports, protocols, or services are enabled, this is a finding.

Check Content Reference

M

Target Key

3551

Comments