Switches

Checks are applied to network devices (switches). A device is checked if it has a table of MAC addresses. The device can simultaneously serve as a router and a switch. Therefore, both groups of checks are applied. In the MaxPatrol SIEM interface, this device is displayed with the router icon.

Port security not enabled (default check)

Port security is used to prevent MAC spoofing on an access interface. You must enable port security on all access interfaces.

Query result: access interfaces on which port security is not enabled.

Supported systems: Alcatel AOS, Cisco NX-OS, Huawei VRP, Juniper Junos OS.

Only standard port security configuration at the interface level is supported. Port security settings that only Juniper Junos OS has (shared settings for all interfaces (interface all) and VLAN-specific settings) are not analyzed or checked.

Port security not enabled (Cisco IOS)

Port security is used to prevent MAC spoofing on an access interface. You must enable port security on all access interfaces.

Query result: access interfaces on which port security is not enabled.

Supported systems: Cisco IOS, Cisco IOS XE.

The check for Cisco IOS is different due to DTP support. Access ports are only those interfaces that are configured in static access mode. Dynamic ports (regardless of their actual state) are not checked.

DHCP snooping disabled

DHCP snooping ensures network security by filtering untrusted DHCP messages and creating a DHCP snooping binding table. You can use DHCP snooping to differentiate between untrusted interfaces connected to end users and trusted interfaces connected to the DHCP server or another switch. You must enable DHCP snooping globally for all VLANs.

Query result: switches with DHCP snooping disabled globally.

Supported systems: Cisco IOS, Cisco IOS XE, Cisco NX-OS, Huawei VRP.

The DHCP snooping status is not checked for specific VLANs.

The website uses cookies according to the cookie policy.