Free DISA STIG and SRG Library | Vaulted

V-101125

The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.

Finding ID
CISC-L2-000090
Rule ID
SV-110229r1_rule
Severity
Cat III
CCE
(None)
Group Title
SRG-NET-000362-L2S-000021
CCI
CCI-002385
Target Key
(None)
Documentable
No
Discussion

Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the switched network. Any switch can be the root bridge in a network. However, a more optimal forwarding topology places the root bridge at a specific predetermined location. With the standard STP, any bridge in the network with a lower bridge ID takes the role of the root bridge. The administrator cannot enforce the position of the root bridge but can set the root bridge priority to "0" in an effort to secure the root bridge position. The Root Guard feature provides a way to enforce the root bridge placement in the network. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a Root Guard-enabled port, Root Guard moves this port to a root-inconsistent STP state and no traffic can be forwarded across this port while it is in this state. To enforce the position of the root bridge, it is imperative that Root Guard is enabled on all ports where the root bridge should never appear.

Fix Text

Configure the switch to have Root Guard enabled on all ports connecting to access layer switches and hosts: SW1(config)#int range g0/0 - 9 SW1(config-if-range)#spanning-tree guard root

Check Content

Review the switch topology as well as the configuration to verify that Root Guard is enabled on all switch ports connecting to access layer switches and hosts. interface GigabitEthernet0/0 spanning-tree guard root ! interface GigabitEthernet0/1 spanning-tree guard root … … … interface GigabitEthernet0/9 spanning-tree guard root If the switch has not enabled Root Guard on all switch ports connecting to access layer switches and hosts, this is a finding.