STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cisco NX OS Switch L2S Security Technical Implementation Guide

V-220687

CAT III (Low)

The Cisco switch must have Storm Control configured on all host-facing switchports.

Rule ID

SV-220687r539671_rule

STIG

Cisco NX OS Switch L2S Security Technical Implementation Guide

Version

V3R3

CCIs

CCI-000366

Discussion

A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network disruption by suppressing ingress traffic when the number of packets reaches a configured threshold levels. Traffic storm control monitors ingress traffic levels on a port and drops traffic when the number of packets reaches the configured threshold level during any one-second interval.

Check Content

Review the switch configuration to verify that storm control is enabled on all host-facing interfaces as shown in the example below:

interface GigabitEthernet0/3
 switchport access vlan 12
 storm-control unicast unicast level 50.00
 storm-control broadcast broadcast level 40

If storm control is not enabled at a minimum for broadcast traffic, this is a finding.

Fix Text

Configure storm control for each host-facing interface as shown in the example below:

SW1(config)#int range e0/2 – 8
SW1(config-if-range)# storm-control unicast level 50
SW1(config-if-range)# storm-control broadcast level 40