Free DISA STIG and SRG Library | Vaulted

V-101145

The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.

Finding ID
CISC-L2-000190
Rule ID
SV-110249r1_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-NET-000512-L2S-000004
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

In topologies where fiber optic interconnections are used, physical misconnections can occur that allow a link to appear to be up when there is a mismatched set of transmit/receive pairs. When such a physical misconfiguration occurs, protocols such as STP can cause network instability. UDLD is a Layer 2 protocol that can detect these physical misconfigurations by verifying that traffic is flowing bidirectionally between neighbors. Ports with UDLD enabled periodically transmit packets to neighbor devices. If the packets are not echoed back within a specific time frame, the link is flagged as unidirectional and the interface is shut down.

Fix Text

Configure the switch to enable UDLD to protect against one-way connections: SW2(config)#udld enable or SW2(config)#int g0/1 SW2(config-if)#udld port

Check Content

If any of the switch ports have fiber optic interconnections with neighbors, review the switch configuration to verify that UDLD is enabled globally or on a per-interface basis as shown in the examples below: hostname SW2 … … … udld enable or interface GigabitEthernet0/1 udld port Note: An alternative implementation when UDLD is not supported by connected device is to deploy a single member Link Aggregation Group (LAG) via IEEE 802.3ad Link Aggregation Control Protocol (LACP). If the switch has fiber optic interconnections with neighbors and UDLD is not enabled, this is a finding.