Checked | Name | Title |
---|
☐ | SV-76555r1_rule | The layer 2 switch must be configured to disable non-essential capabilities. |
☐ | SV-95193r1_rule | The layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection. |
☐ | SV-76651r1_rule | The layer 2 switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available. |
☐ | SV-76653r1_rule | The layer 2 switch must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks. |
☐ | SV-76655r2_rule | The layer 2 switch must be configured to fail securely in the event of an operational failure. |
☐ | SV-76657r1_rule | The layer 2 switch must provide the capability for authorized users to select a user session to capture. |
☐ | SV-76659r1_rule | The layer 2 switch must provide the capability for authorized users to remotely view, in real time, all content related to an established user session from a component separate from the layer 2 switch. |
☐ | SV-76661r1_rule | The layer 2 switch must authenticate all network-connected endpoint devices before establishing any connection. |
☐ | SV-76663r2_rule | The layer 2 switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts. |
☐ | SV-76665r1_rule | The layer 2 switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports. |
☐ | SV-76667r1_rule | The layer 2 switch must have STP Loop Guard enabled on all non-designated STP switch ports. |
☐ | SV-76669r1_rule | The layer 2 switch must have Unknown Unicast Flood Blocking (UUFB) enabled. |
☐ | SV-76671r2_rule | The layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources. |
☐ | SV-76673r1_rule | The layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports. |
☐ | SV-76675r1_rule | The layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs. |
☐ | SV-76683r1_rule | The layer 2 switch must implement Rapid STP where VLANs span multiple switches with redundant links. |
☐ | SV-76685r1_rule | The layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections. |
☐ | SV-76687r1_rule | The layer 2 switch must have all trunk links enabled statically. |
☐ | SV-76691r1_rule | The layer 2 switch must have all disabled switch ports assigned to an unused VLAN. |
☐ | SV-76693r1_rule | The layer 2 switch must not have the default VLAN assigned to any host-facing switch ports. |
☐ | SV-76695r1_rule | The layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it. |
☐ | SV-76697r1_rule | The layer 2 switch must not use the default VLAN for management traffic. |
☐ | SV-76699r1_rule | The layer 2 switch must have all user-facing or untrusted ports configured as access switch ports. |
☐ | SV-76701r1_rule | The layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links. |
☐ | SV-76703r2_rule | The layer 2 switch must not have any switch ports assigned to the native VLAN. |
☐ | SV-105017r1_rule | The layer 2 switch must have Storm Control configured on all host-facing switch ports. |
☐ | SV-105019r1_rule | The layer 2 switch must have IGMP or MLD Snooping configured on all VLANs |
☐ | SV-109201r1_rule | The layer 2 switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. |