CISC-L2-000160 - The Cisco switch must have Storm Control configured on all host-facing switchports.

Information

A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network disruption by suppressing ingress traffic when the number of packets reaches a configured threshold levels. Traffic storm control monitors ingress traffic levels on a port and drops traffic when the number of packets reaches the configured threshold level during any one-second interval.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure storm control for each host-facing interface as shown in the example below:

SW1(config)#int range e0/2 - 8
SW1(config-if-range)# storm-control unicast level 50
SW1(config-if-range)# storm-control broadcast level 40

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_NX-OS_Switch_Y24M10_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-220687r539671_rule, STIG-ID|CISC-L2-000160, STIG-Legacy|SV-110349, STIG-Legacy|V-101245, Vuln-ID|V-220687

Plugin: Cisco

Control ID: 3c4c50d3e25dbb267fc32f209546ace8b438b3ac5f452175e93f2a109036257c