STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Dell OS10 Switch Layer 2 Switch Security Technical Implementation Guide

V-269956

CAT II (Medium)

The Dell OS10 Switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports.

Rule ID

SV-269956r1052254_rule

STIG

Dell OS10 Switch Layer 2 Switch Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002385

Discussion

If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priority than the existing root bridge, it will become the new root bridge and cause a topology change, rendering the network in a suboptimal state. The STP PortFast BPDU guard enhancement allows network designers to enforce the STP domain borders and keep the active topology predictable. The devices behind the ports that have STP PortFast enabled are not able to influence the STP topology. At the reception of BPDUs, the BPDU guard operation disables the port that has PortFast configured. The BPDU guard transitions the port into err disable state and sends a log message.

Check Content

Review the Dell OS10 Switch topology as well as the switch configuration to verify that BPDU Guard is enabled on all user-facing or untrusted access switch ports.

For each user-facing or untrusted access switch port, execute the following:

    OS10# show running-configuration interface ethernet <interface number>
    Verify Root Guard is enabled: spanning-tree bpduguard enable 

If the switch has not enabled BPDU Guard on all user-facing or untrusted access switch ports, this is a finding.

Fix Text

Configure the Dell OS10 Switch to enable BPDU Guard on all user-facing or untrusted access switch ports, as shown in the example below:

OS10(config)# interface ethernet 1/1/1
OS10(conf-if-eth1/1/1)# spanning-tree bpduguard enable