SV-220660r539671_rule
V-220660
SRG-NET-000362-L2S-000026
CISC-L2-000140
CAT II
10
Configure the switch to have IP Source Guard enabled on all user-facing or untrusted access switch ports.
SW2(config)#int range g0/0 - 9
SW2(config-if-range)#ip verify source
Review the switch configuration to verify that IP Source Guard is enabled on all user-facing or untrusted access switch ports as shown in the example below:
interface GigabitEthernet0/0
ip verify source
!
interface GigabitEthernet0/1
ip verify source
…
…
…
interface GigabitEthernet0/9
ip verify source
Note: The IP Source Guard feature depends on the entries in the DHCP snooping database or static IP-MAC-VLAN configuration commands to verify IP-to-MAC address bindings.
If the switch does not have IP Source Guard enabled on all untrusted access switch ports, this is a finding.
V-220660
False
CISC-L2-000140
Review the switch configuration to verify that IP Source Guard is enabled on all user-facing or untrusted access switch ports as shown in the example below:
interface GigabitEthernet0/0
ip verify source
!
interface GigabitEthernet0/1
ip verify source
…
…
…
interface GigabitEthernet0/9
ip verify source
Note: The IP Source Guard feature depends on the entries in the DHCP snooping database or static IP-MAC-VLAN configuration commands to verify IP-to-MAC address bindings.
If the switch does not have IP Source Guard enabled on all untrusted access switch ports, this is a finding.
M
4071