CISC-L2-000240 - The Cisco switch must not use the default VLAN for management traffic.

Information

Switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with directly connected switches using Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and Port Aggregation Protocol (PAgP) - all untagged traffic. As a consequence, the default VLAN may unwisely span the entire network if not appropriately pruned. If its scope is large enough, the risk of compromise can increase significantly.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the switch for management access to use a VLAN other than the default VLAN:

SW1(config)#int vlan 22
SW1(config-if)#ip add 10.1.22.3 255.255.255.0
SW1(config-if)#no shut

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_Switch_Y24M10_STIG.zip

Item Details

Category: CONTINGENCY PLANNING

References: 800-53|CP-8, CAT|II, CCI|CCI-004931, Rule-ID|SV-220644r991852_rule, STIG-ID|CISC-L2-000240, STIG-Legacy|SV-110259, STIG-Legacy|V-101155, Vuln-ID|V-220644

Plugin: Cisco

Control ID: 8f1129d2858e7c09f60b4db8afacea465e12e8c7467c869aa656f51ddba3658b