Cisco ACI Layer 2 Switch Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (7) | Downloads | ||
| V1R2 | 2025-12-11 | CAT I (High): 1 | CAT II (Medium): 4 | CAT III (Low): 2 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - MAC I - Mission Critical Sensitive
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-272032 | The Cisco ACI layer 2 switch must authenticate all network-connected endpoint devices before establishing any connection. | Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed architect... | |
| V-272033 | The Cisco ACI layer 2 switch must have Unknown Unicast Flood Blocking (UUFB) set to "Hardware Proxy". | Access layer switches use the Content Addressable Memory (CAM) table to direct traffic to specific interfaces based on the VLAN number and the destina... | |
| V-272037 | The Cisco ACI layer 2 switch must enable port security. | The port security feature protects the ACI fabric from being flooded with unknown MAC addresses by limiting the number of MAC addresses learned per po... | |
| V-272045 | The Cisco ACI layer 2 switch must employ a first-hop-security (FHS) policy to protect against denial-of-service (DoS) attacks. | DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organization... | |
| V-272038 | The Cisco ACI layer 2 switch must have Storm Control configured on all host-facing switch ports. | A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network ... | |
| V-272039 | The Cisco ACI layer 2 switch must have Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping configured on all VLANs. | IGMP and MLD snooping provides a way to constrain multicast traffic at layer 2. By monitoring the IGMP or MLD membership reports sent by hosts within ... | |
| V-272029 | The Cisco ACI layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection. | Controlling LAN access via 802.1x authentication can assist in preventing a malicious user from connecting an unauthorized PC to a switch port to inje... |