Checklist Details for Network L2 Switch STIG Version 8, Release 19

(Checklist Revisions)

Checklist Highlights

Checklist Name:
Network L2 Switch STIG
Version 8, Release 19
Review Status:
Governmental Authority: Defense Information Systems Agency
Target Product:
Target Product CPE Name Product Category
Cisco PIX ASA cpe:/h:cisco:pix_asa (View CVEs)
  • Firewall
Juniper Router M10 cpe:/h:juniper:router_m10 (View CVEs)
  • Network Router
Juniper Router M16 cpe:/h:juniper:router_m16 (View CVEs)
  • Network Router
Juniper Router M20 cpe:/h:juniper:router_m20 (View CVEs)
  • Network Router
Juniper Router M40 cpe:/h:juniper:router_m40 (View CVEs)
  • Network Router
Juniper Router M5 cpe:/h:juniper:router_m5 (View CVEs)
  • Network Router
Foundry Networks BigIron Router cpe:/h:foundrynet:bigiron_router (View CVEs)
  • Network Router
Checklist Summary:
A core mission for the Defense Information Systems Agency (DISA) Field Security Operations (FSO) is to aid in securing Department of Defense (DoD) Networks. The processes and procedures outlined in this Security Technical Implementation Guide (STIG), when applied, will decrease the vulnerability of DoD sensitive information. Network Security is clearly still one of the biggest concerns for our DoD customers (i.e., the warfighter). The intent of the Network Infrastructure STIG is to include security considerations at the network level needed to provide an acceptable level of risk for information as it is transmitted throughout an enclave. This STIG has been developed to enhance the confidentiality, integrity, and availability of sensitive DoD Automated Information Systems (AIS). Each site network/communications infrastructure must provide secure, available, and reliable data for all customers. This document is designed to supplement the security guidance provided by DoD-specific requirements. This document will assist sites in meeting the minimum requirements, standards, controls, and options that must be in place for secure network operations.
Checklist Role:
  • Firewall
  • Network Router
Known Issues:
Not provided
Target Audience:
These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, Network Security Officers (NSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.
Target Operational Environment:
  • Managed
  • Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided
Regulatory Compliance:
DoD Directive 8500.1 and DoD Directive 8500.2
Comments or proposed revisions to this document should be sent via e-mail to DISA FSO will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Not provided
Product Support:
Not provided
Point of Contact:
Not provided
Not provided
Change History:
Version 8, Release 17 - 25 April 2014
Version 8, Release 16 - 25 October 2013
Version 8, Release 15 - 25 July 2013
Version 8, Release 14 - 26 April 2013
Version 8, Release 13 - 25 January 2013
Version 8, Release 11 - 27 July 2012
Version 8, Release 10 - 27 April 2012
Version 8, Release 9 - 24 January 2012
Version 8, Release 8 - 28 October 2011
Updated "Point of Contact" and "Comments" Sectons - 15 January 2015
Version 8, Release 18 - 26 January 2015
Version 8, Release 19 - 29 October 2015
Changed status from "Under Review" to "Final" - 04 December 2015
Foundry Networks
JTF-GNO Net Defense home page
Network Information Center (NIC)
Internet Engineering Task Force (IETF)
Electronic Industry Association/Telecommunications Industry Association (EIA/TIA)
Global Engineering Documents
Internet Assigned Numbers Authority (IANA)
NIST checklist record last modified on 12/04/2015