The Cisco switch must have Storm Control configured on all host-facing switchports.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-220687 | CISC-L2-000160 | SV-220687r539671_rule | CCI-000366 | low |
| Description | ||||
| A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network disruption by suppressing ingress traffic when the number of packets reaches a configured threshold levels. Traffic storm control monitors ingress traffic levels on a port and drops traffic when the number of packets reaches the configured threshold level during any one-second interval. | ||||
| STIG | Date | |||
| Cisco NX OS Switch L2S Security Technical Implementation Guide | 2024-08-22 | |||
Details
Check Text (C-220687r539671_chk)
Review the switch configuration to verify that storm control is enabled on all host-facing interfaces as shown in the example below:
interface GigabitEthernet0/3
switchport access vlan 12
storm-control unicast unicast level 50.00
storm-control broadcast broadcast level 40
If storm control is not enabled at a minimum for broadcast traffic, this is a finding.
Fix Text (F-22391r539113_fix)
Configure storm control for each host-facing interface as shown in the example below:
SW1(config)#int range e0/2 – 8
SW1(config-if-range)# storm-control unicast level 50
SW1(config-if-range)# storm-control broadcast level 40