Checked | Name | Title |
---|
☐ | SV-220622r539671_rule | The Cisco switch must be configured to disable non-essential capabilities. |
☐ | SV-220623r539671_rule | The Cisco switch must uniquely identify all network-connected endpoint devices before establishing any connection. |
☐ | SV-220624r539671_rule | The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available. |
☐ | SV-220625r539671_rule | The Cisco switch must manage excess bandwidth to limit the effects of packet-flooding types of denial-of-service (DoS) attacks. |
☐ | SV-220626r539671_rule | The Cisco switch must be configured for authorized users to select a user session to capture. |
☐ | SV-220627r539671_rule | The Cisco switch must be configured for authorized users to remotely view, in real time, all content related to an established user session from a component separate from the Cisco switch. |
☐ | SV-220628r539671_rule | The Cisco switch must authenticate all endpoint devices before establishing any connection. |
☐ | SV-220629r539671_rule | The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts. |
☐ | SV-220630r539671_rule | The Cisco switch must have Bridge Protocol Data Unit (BPDU) Guard enabled on all user-facing or untrusted access switch ports. |
☐ | SV-220631r539671_rule | The Cisco switch must have Spanning Tree Protocol (STP) Loop Guard enabled. |
☐ | SV-220632r539671_rule | The Cisco switch must have Unknown Unicast Flood Blocking (UUFB) enabled. |
☐ | SV-220633r539671_rule | The Cisco switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources. |
☐ | SV-220634r539671_rule | The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports. |
☐ | SV-220635r539671_rule | The Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs. |
☐ | SV-220636r648763_rule | The Cisco switch must have Storm Control configured on all host-facing switchports. |
☐ | SV-220637r539671_rule | The Cisco switch must have IGMP or MLD Snooping configured on all VLANs. |
☐ | SV-220638r539671_rule | The Cisco switch must implement Rapid Spanning Tree Protocol (STP) where VLANs span multiple switches with redundant links. |
☐ | SV-220639r539671_rule | The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections. |
☐ | SV-220640r539671_rule | The Cisco switch must have all trunk links enabled statically. |
☐ | SV-220641r539671_rule | The Cisco switch must have all disabled switch ports assigned to an unused VLAN. |
☐ | SV-220642r539671_rule | The Cisco switch must not have the default VLAN assigned to any host-facing switch ports. |
☐ | SV-220643r539671_rule | The Cisco switch must have the default VLAN pruned from all trunk ports that do not require it. |
☐ | SV-220644r539671_rule | The Cisco switch must not use the default VLAN for management traffic. |
☐ | SV-220645r539671_rule | The Cisco switch must have all user-facing or untrusted ports configured as access switch ports. |
☐ | SV-220646r539671_rule | The Cisco switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links. |
☐ | SV-220647r539671_rule | The Cisco switch must not have any switchports assigned to the native VLAN. |