| V-273673 | | The RUCKUS ICX switch must uniquely identify all network-connected endpoint devices before establishing any connection. | Controlling LAN access via 802.1x authentication can assist in preventing a malicious user from connecting an unauthorized PC to a switch port to inje... |
| V-273672 | | The RUCKUS ICX switch must be configured to disable nonessential capabilities. | A compromised switch introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter... |
| V-273674 | | The RUCKUS ICX switch must disable the Multiple VLAN Registration Protocol (MVRP). | MVRP provides central management of VLAN domains, thus reducing administration in a switched network. When configuring a new VLAN in MVRP, the VLAN is... |
| V-273675 | | The RUCKUS ICX switch must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks. | DoS is a condition that occurs when a resource is not available for legitimate users. Packet flooding distributed denial-of-service (DDoS) attacks are... |
| V-273676 | | The RUCKUS ICX switch must authenticate all network-connected endpoint devices before establishing any connection. | Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity.
For distributed architect... |
| V-273678 | | The RUCKUS ICX switch must have Bridge Protocol Data Unit (BPDU) Guard enabled on all user-facing or untrusted access switch ports. | An example is a firewall that blocks all traffic rather than allowing all traffic when a firewall component fails (e.g., fail closed and do not forwar... |
| V-273679 | | The RUCKUS ICX switch must have Spanning Tree Protocol (STP) Loop Detect enabled on all nondesignated STP switch ports | The STP loop Detect feature provides additional protection against STP loops. An STP loop is created when an STP blocking port in a redundant topology... |
| V-273680 | | The RUCKUS ICX switch must have Unknown Unicast Flood Blocking (UUFB) enabled. | Access layer switches use the Content Addressable Memory (CAM) table to direct traffic to specific ports based on the VLAN number and the destination ... |
| V-273681 | | The RUCKUS ICX switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources. | In an enterprise network, devices under administrative control are trusted sources. These devices include the switches, routers, and servers in the ne... |
| V-273682 | | The RUCKUS ICX switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports. | IP Source Guard provides source IP address filtering on a layer 2 port to prevent a malicious host from impersonating a legitimate host by assuming th... |
| V-273683 | | The RUCKUS ICX switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs. | DAI intercepts ARP requests and verifies that each of these packets has a valid IP-to-MAC address binding before updating the local ARP cache and befo... |
| V-273686 | | The RUCKUS ICX switch must implement Rapid Spanning Tree Protocol (STP) where VLANs span multiple switches with redundant links. | STP is implemented on bridges and switches to prevent layer 2 loops when a broadcast domain spans multiple bridges and switches and when redundant lin... |
| V-273687 | | The RUCKUS ICX switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections. | In topologies where fiber optic interconnections are used, physical misconnections can occur that allow a link to appear to be up when there is a mism... |
| V-273688 | | The RUCKUS ICX switch must have all disabled switch ports assigned to an unused VLAN. | It is possible that a disabled port assigned to a user or management VLAN becomes enabled by accident or by an attacker and as a result gains access t... |
| V-273689 | | The RUCKUS ICX switch must not have the default VLAN assigned to any host-facing switch ports. | In a VLAN-based network, switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with other networking devices using Sp... |
| V-273690 | | The RUCKUS ICX switch must have the default VLAN pruned from all trunk ports that do not require it. | The default VLAN (i.e., VLAN 1) is a special VLAN used for control plane traffic such as Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP)... |
| V-273691 | | The RUCKUS ICX switch must not use the default VLAN for management traffic. | Switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with directly connected switches using Spanning-Tree Protocol (... |
| V-273692 | | The RUCKUS ICX switch must have all user-facing or untrusted ports configured as access switch ports. | Double encapsulation can be initiated by an attacker who has access to a switch port belonging to the native VLAN of the trunk port. Knowing the victi... |
| V-273693 | | The RUCKUS ICX layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links. | VLAN hopping can be initiated by an attacker who has access to a switch port belonging to the same VLAN as the native VLAN of the trunk link connectin... |
| V-273696 | | The RUCKUS ICX switch must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. | Separating critical system components and functions from other noncritical system components and functions through separate subnetworks may be necessa... |
| V-273677 | | The RUCKUS ICX switch must have Root Protect enabled on all switch ports connecting to access layer switches and hosts. | Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the switched network. Any sw... |
| V-273684 | | The RUCKUS ICX switch must have Storm Control configured on all host-facing switch ports. | A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network ... |
| V-273685 | | The RUCKUS ICX switch must have IGMP or MLD Snooping configured on all VLANs. | IGMP and MLD snooping provides a way to constrain multicast traffic at layer 2. By monitoring the IGMP or MLD membership reports sent by hosts within ... |
| V-273694 | | The RUCKUS ICX switch must not have any switch ports assigned to the native VLAN. | Double encapsulation can be initiated by an attacker who has access to a switch port belonging to the native VLAN of the trunk port. Knowing the victi... |