Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1 ✎ 4
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-60931 Medium The Arista Multilayer Switch must not enable the IS-IS routing protocol.
Content changes 4
- V-60891 Medium fix The Arista Multilayer Switch must bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
- V-60893 Medium fix The Arista Multilayer Switch must establish boundaries for IPv6 Admin-Local, IPv6 Site-Local, IPv6 Organization-Local scope, and IPv4 Local-Scope multicast traffic.
- V-60913 Medium checkfix The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP.
- V-60919 Medium checkfix The Arista Multilayer Switch must encrypt all methods of configured authentication for the OSPF routing protocol.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000100
- Vuln IDs
-
- V-60817
- Rule IDs
-
- SV-75273r1_rule
Checks: C-61739r1_chk
Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. This requirement may be met through the use of IP access control lists. To verify IP access lists are configured, execute the "show ip access-lists summary" command, and check that the list is configured and is active on applicable interfaces. To verify the lists control the flow of information in accordance with organizational policy, enter the "show ip access-list [name]" command, and review the associated permit and deny statements. If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.
Fix: F-66503r1_fix
Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy. To use an IP access list to fulfill this function, enter the following commands, substituting organizational values for the bracketed variables. ip access-list [name] [permit/deny] [protocol] [source address] [source port] [destination address] [destination port] exit interface [type] [number] ip access-group [name] [direction]
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000110
- Vuln IDs
-
- V-60889
- Rule IDs
-
- SV-75347r1_rule
Checks: C-61837r1_chk
If IPv4 or IPv6 multicast routing is enabled, verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration via the "show running-config" command to determine if multicast routing is enabled and which interfaces are enabled for PIM, identified via the "ip pim sparse-mode" statement in the interface configuration. Alternatively, from the interface configuration mode, enter "show active all" and verify that the statement "no ip pim sparse-mode" is present, if PIM is not required for the active interface. If an interface is not required to support multicast routing and it is enabled, this is a finding.
Fix: F-66601r1_fix
Document all enabled interfaces for PIM in the network's multicast topology diagram. Disable support for PIM on interfaces that are not required to support it. Interfaces have PIM disabled by default. To disable PIM from an interface active in a multi-cast network, enter "no pim sparse-mode" in the interface configuration mode.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000120
- Vuln IDs
-
- V-60891
- Rule IDs
-
- SV-75349r1_rule
Checks: C-61839r1_chk
Review the multicast topology diagram and determine if router interfaces are enabled for IPv4 or IPv6 multicast routing. If the router is enabled for multicast routing, verify all interfaces enabled for PIM have a neighbor filter bound to the interface. The neighbor filter must only accept PIM control plane traffic from the documented PIM neighbors. To verify a neighbor filter is active, execute the "show running-config" command and find the "ip pim neighbor-filter [name]" statement in the interface configuration mode. If PIM neighbor filters are not bound to all interfaces that have PIM enabled, this is a finding.
Fix: F-66603r1_fix
Configure neighbor filters to only accept PIM control plane traffic from documented PIM neighbors. Bind neighbor filters to all PIM-enabled interfaces. To create a new neighbor filter, create an access list by entering: ip access-list [name] [ip access list permit/deny statement] exit Then apply the neighbor filter based on the accesslist to the PIM-enabled interface: int ethernet 1 ip pim neighbor-filter [name-of-ACL]
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000130
- Vuln IDs
-
- V-60893
- Rule IDs
-
- SV-75351r1_rule
Checks: C-61841r1_chk
Review the multicast topology diagram to determine if there are any documented Admin-Local (FFx4::/16), Site-Local (FFx5::/16), or Organization-Local (FFx8::/16) multicast boundaries for IPv6 traffic or any Local-Scope (239.255.0.0/16) boundaries for IPv4 traffic. Verify the appropriate boundaries are configured on the applicable multicast-enabled interfaces via an "ip multicast boundary" statement in the interface configuration. If the appropriate boundaries are not configured on applicable multicast-enabled interfaces, this is a finding.
Fix: F-66605r1_fix
Configure the appropriate boundaries to contain packets addressed within the administratively scoped zone. Defined multicast addresses are FFx4::/16, FFx5::/16, FFx8::/16, and 239.255.0.0/16. To create a PIM Boundary, create an access list by entering: ip access-list [name] [ip access list permit/deny statement] exit Then apply the boundary filter based on the accesslist to the PIM-enabled interface: int ethernet [X] ip multicast boundary [name-of-ACL]
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000140
- Vuln IDs
-
- V-60895
- Rule IDs
-
- SV-75353r1_rule
Checks: C-61843r1_chk
Verify inactive interfaces on the router are disabled by executing a "show interface status" command and confirming the line "disabled" is present on any interface where the interface is inactive. If there are any inactive interfaces enabled on the router, this is a finding.
Fix: F-66607r1_fix
Remove subinterfaces and disable any inactive ports on the router via the "shutdown" command on the interface configuration mode.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000150
- Vuln IDs
-
- V-60897
- Rule IDs
-
- SV-75355r1_rule
Checks: C-61845r1_chk
Review the configuration of each router interface connecting to an Alternate Gateway via the "show running-config" command. Verify each permit statement of the ingress filter only permits packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider. If the ingress filter permits packets with addresses other than those specified, such as destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider, this is a finding.
Fix: F-66609r1_fix
Configure the ingress filter of the perimeter router connected to an Alternate Gateway to only permit packets with destination addresses of the site's NIPRNet address space or a destination address belonging to the address block assigned by the Alternate Gateway network service provider. To configure an example of such a statement, enter: ip access-list [name] permit ip [source] [destination] exit interface [router interface] ip access-group [name] in exit
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000160
- Vuln IDs
-
- V-60899
- Rule IDs
-
- SV-75357r1_rule
Checks: C-61847r1_chk
This requirement applies only to DoDIN enclaves. Review the configuration of the router connecting to the Alternate Gateway via the "show router bgp [processID]" command. Verify there are no BGP neighbors configured to the remote AS that belongs to the Alternate Gateway service provider. If there are BGP neighbors connecting the remote AS of the Alternate Gateway service provider, this is a finding.
Fix: F-66611r1_fix
Configure a static route on the perimeter router to reach the AS of a router connecting to an Alternate Gateway Ip route [destination/mask] [forwarding interface]
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000170
- Vuln IDs
-
- V-60903
- Rule IDs
-
- SV-75361r1_rule
Checks: C-61849r1_chk
This requirement applies only to DoDIN enclaves. Review the configuration of the route connecting to the Alternate Gateway. Verify redistribution of static routes to the Alternate Gateway is not occurring by reviewing the running configuration via the "show running-config" command. In the appropriate routing protocol configuration, there must not be a "redistribute static" statement. If there is a redistribute static statement, there must be an accompanying route map to prevent redistribution of routes to the alternate gateway. If the static routes to the Alternate Gateway are being redistributed into an Exterior Gateway Protocol or Interior Gateway Protocol to a NIPRNet gateway, this is a finding.
Fix: F-66615r1_fix
Configure the router so that static routes are not redistributed to an Alternate Gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other Autonomous System. Enter "no redistribute static" into the routing process configuration to fulfill this requirement. To configure a Route Map to allow for redistribution of some static routes, refer to Chapter 18.3 of the Arista Configuration Manual.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000180
- Vuln IDs
-
- V-60905
- Rule IDs
-
- SV-75363r1_rule
Checks: C-61851r1_chk
Verify that the out-of-band management interface is an adjacency in the Interior Gateway Protocol routing domain for the management network. This requirement does not apply to in-band management networks. The out-of-band management interface will not form an adjacency with the IGP running on the switch. If the Arista MLS is acting as the gateway for the management network, and management traffic is ingressing the switch via in-band dataplane interfaces, these interfaces may be in a dedicated VRF for the management network. To verify this VRF, run a "show vrf" and confirm the interfaces handling management traffic are displayed in the resulting output. Alternatively, if VRFs are not used, the management network must use a separate routing domain that is not advertised or redistributed to the managed network. This can be verified by checking the relevant configuration statements for the routing protocol instances and ensuring no redistribute statement exists that will bridge the managed and management networks. Using the "show ip route" command will also verify this requirement by displaying the routing tables. Stipulating the VRF via the "show ip route vrf [name]" will display a separate routing table for a configured VRF, distinct from the default routing table in the default VRF, provided by the "show ip route" command with an unspecified VRF. If the router does not enforce that Interior Gateway Protocol instances configured on the out-of-band management gateway router only peer with their own routing domain, this is a finding.
Fix: F-66617r1_fix
Configure the router to enforce that Interior Gateway Protocol instances configured on the out-of-band management gateway router only peer with their own routing domain. To configure a management vrf, enter the following from the configuration mode: vrf definition [name] rd [AS#]:[local assignment] Then, from the interface configuration mode, assign the interface to the VRF: interface [type][number] vrf forwarding [vrf name] Then enable IP routing for the VRF: ip routing vrf [name] Then, from the IGP configuration mode interface, configure the routing protocols. router [protocol] [processID] vrf [name] [configuration statement] To remove offending redistribute statements, enter the command: no redistribute [connected/ospf/bgp/etc]
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000190
- Vuln IDs
-
- V-60907
- Rule IDs
-
- SV-75365r1_rule
Checks: C-61853r1_chk
Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. This can be verified via the "show run section [routing protocol]" command. The output of this command will display the active configuration for the routing protocol on the switch. Verify the routing protocol configuration does not contain a statement redistributing or advertising routes from the managed domain into the management domain, or vice versa. Using the "show ip route" command will also verify this requirement by displaying the routing tables. Stipulating the VRF via the "show ip route vrf [name]" will display a separate routing table for a configured VRF, distinct from the default routing table in the default VRF, provided by the "show ip route" command with an unspecified VRF. If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
Fix: F-66619r1_fix
Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa. This can be configured via the VRF configuration provided in SRG-NET-000019-RTR-000012.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- AMLS-L3-000200
- Vuln IDs
-
- V-60909
- Rule IDs
-
- SV-75367r1_rule
Checks: C-61855r1_chk
Review the configuration to verify the management interface is configured as passive for the Interior Gateway Protocol instance for the managed network. The configuration of the routing protocol viewable via the "show running-config" command must include the following statement: passive-interface [management] [#] or passive-interface [default] Note that not all protocols support the concept of a passive interface, such as the use of BGP for an IGP. As the function of these protocols is different, if this statement is missing from a protocol that does not support this function, this is not a finding. If the management interface is not configured as passive for the Interior Gateway Protocol instance for the managed network, this is a finding.
Fix: F-66621r1_fix
Configure the management interface as passive for the Interior Gateway Protocol instance configured for the managed network. From the router configuration interface: passive-interface management [#]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AMLS-L3-000210
- Vuln IDs
-
- V-60911
- Rule IDs
-
- SV-75369r1_rule
Checks: C-61857r1_chk
If explicit security attributes (for example, IP addresses, port numbers, protocol, Autonomous System, or interface) are not used to enforce information flow control, this is a finding. Review the configuration of any access control list on the switch to determine if explicit attributes are being utilized. The ACL must include explicit attributes such as ip addresses, port numbers, protocols, etc. Note that the Arista MLS includes a deny-by-default statement that is not displayed in the CLI. This statement exists at the end of every ACL.
Fix: F-66623r1_fix
Configure the router to enforce flow control using explicit security attributes (for example, IP addresses, port numbers, protocol, Autonomous System, or interface) on information, source, and destination objects as a basis for flow control decisions. To enforce flow control using explicit security attributes, configure access control lists as per organization-defined requirements, to include statements such as: ip access-list [Name} deny [protocol] [source address] [source port] [destination address] [destination port] [dscp filter] [ttl filter]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AMLS-L3-000220
- Vuln IDs
-
- V-60913
- Rule IDs
-
- SV-75371r2_rule
Checks: C-61859r2_chk
Review the router configuration; for every protocol that affects the routing or forwarding tables (where information is exchanged between neighbors), verify that neighbor router authentication is enabled. For BGP, this can be verified via the "show running-config" command and validating that any configured neighbor has an associated password statement. For OSPF, under the interface configuration mode, verify the following statements are configured: ip ospf authentication message-digest ip ospf message-digest-key [number] md5 [type] [key] For IS-IS, under the interface configuration mode, verify the following statements are configured: isis authentication mode md5 [level-1|level-2] isis authentication key [key-string] [level-1|level-2] Alternatively, under “show isis interface” the authentication mode on the interface must show as being set to MD5. Additionally, the global IS-IS router configuration must be set. From the output of “show isis summary” verify that the authentication mode for Level-1 and/or Level-2 as applicable, is set to MD5. If authentication is not enabled for BGP, OSPF, and IS-IS, this is a finding.
Fix: F-66625r2_fix
Configure authentication to be enabled for every protocol that affects the routing or forwarding tables. To configure BGP authentication, in the BGP configuration mode interface, when adding neighbors, include the following statement: neighbor [ip address] password [type] [password] For OSPF, under the interface configuration mode, enter the following commands: ip ospf authentication message-digest ip ospf authentication-key [type] [key] To Globally Configure IS-IS Authentication, use: router isis [instance number] authentication mode md5 [level 1 | level 2] authentication key [0|7] [key string] [level 1 | level 2] Where level 1 and level 2 variable specify the authentication to be used for each type or ISIS router, the ISIS instance number is the routing protocol instance, the variables 0 and 7 represent an encrypted or unencrypted key string, and the key string is the text for the encryption string. Global configuration authenticates ISIS LSPs, CSNPs and PSNPs. Interface configuration authenticates ISIS Hello PDUs, and is configured as such: interface [ethernet | port-channel | vlan] [X] isis authentication mode md5 isis authentication key [0|7] [text]
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- AMLS-L3-000230
- Vuln IDs
-
- V-60915
- Rule IDs
-
- SV-75373r1_rule
Checks: C-61861r1_chk
This check is only applicable to external-facing interfaces of a network edge router. Review the router configuration to verify uRPF or an egress filter to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field has been configured on all external interfaces. This is only applicable to perimeter routers. If uRPF or an egress filter to restrict the router from accepting outbound IP packets that contain an illegitimate address in the source address field has not been configured on all internal interfaces in an enclave, this is a finding. To verify that uRPF is configured, review the running-config for the interfaces required. The statement "ip-verify unicast source reachable" must be in the configuration. To verify use of an egress filter, verify an IP access list is configured that permits traffic sourced from within the organization address space and that the access list is applied to the egress interface.
Fix: F-66627r1_fix
This check is only applicable to external-facing interfaces of a network edge router. Configure the router to ensure that an egress filter or uRPF is configured to restrict the router from accepting any outbound IP packet that contains an external IP address in the source field. Configure uRPF via the "ip-verify unicast source reachable-via [any/strict]" statement from the interface configuration mode. To apply an egress filter, configure an IP access List: ip access-list [name] [ip access list permit/deny statement] exit then apply the access list to the external facing interface: int ethernet [X] ip access-group [name-of-ACL] out
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AMLS-L3-000240
- Vuln IDs
-
- V-60917
- Rule IDs
-
- SV-75375r1_rule
Checks: C-61863r1_chk
Review the router configuration to determine if services or functions not required for operation, or not related to router functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If unnecessary services and functions are enabled on the router, this is a finding.
Fix: F-66629r1_fix
Remove unneeded services and functions from the router. Removal is recommended since the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- AMLS-L3-000250
- Vuln IDs
-
- V-60919
- Rule IDs
-
- SV-75377r2_rule
Checks: C-61865r2_chk
Review the router configuration for the following configuration statement under the interface configuration for any interface participating in the OSPF topology. SHA1 must be used instead of MD5 in all cases when that option is available. ip ospf authentication message-digest ip ospf message-digest-key [number] md5 [type] [key] For IPv6 Authentication, one of the following statements must be present under the ipv6 router OSPF configuration statement, or on any interface running OSPFv3, depending on the type of encryption established. There are two methods of authentication for OSPFv3 in this scenario; the first uses authentication header (AH), and the second uses Authentication Header with Encapsulating Security Payload. OSPFv3 authentication can be configured for an interface or an area, and interface configuration will override area configuration. Users may configure a key or a passphrase. interface ethernet1 ipv6 ospf authentication ipsec spi [spi number] [md5/sha1] [passphrase/key] [0/7] [passphrase/key] OR interface ethernet1 ipv6 ospf encryption ipsec spi [spi number] esp null [md5/sha1] [passphrase/key] [0/7] [passphrase/key] In an area configuration, the following text must be included under the "ipv6 router ospf [process ID]" configuration section. ipv6 router ospf 200 area [area number] authentication ipsec spi [spi number] [md5/sha1] [passphrase/key] [0/7] [passphrase/key] OR for ESP ipv6 router ospf 200 area 0 encryption ipsec spi [spi] esp null [md5/sha1] [0/7] [key] | passphrase [0/7] [key] If either of these statements is not present, OSPF is not using encryption for authentication, and this is a finding.
Fix: F-66631r2_fix
Configure routing protocol authentication to encrypt the authentication key via the following commands under the interface configuration mode. SHA1 must be used instead of MD5 in all cases when that option is available. ip ospf authentication message-digest ip ospf message-digest-key [number] md5 [type] [key] For IPv6 global configuration, enter: ipv6 router ospf [process number] area [area number] authentication ipsec spi [spi number] [md5/sha1] [passphrase/key] [0/7] [passphrase/key] Alternatively, under the interface configuration mode, enter: ipv6 ospf authentication ipsec spi [spi number] [md5/sha1] [passphrase/key] [0/7] [passphrase/key] To use ESP encryption on AH headers, instead enter: ipv6 router ospf [process number] area [area number] encryption ipsec spi [spi number] esp null [md5/sha1] [passphrase/key] [0/7] [passphrase/key] or on an interface: ipv6 ospf encryption ipsec spi [spi number] esp null [md5/sha1] [passphrase/key] [0/7] [passphrase/key]
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- AMLS-L3-000260
- Vuln IDs
-
- V-60921
- Rule IDs
-
- SV-75379r1_rule
Checks: C-61867r1_chk
Review the router configuration. If it is not configured to use Generalized TTL Security Mechanism (GTSM) or is not configured to provide equivalent functionality as per RFC3682 for all Exterior Border Gateway Protocol peering sessions, this is a finding. The Arista MLS does not have a command to enable GTSM. Instead, any EBGP neighbor statement must include the "ebgp-multihop [hop]" configuration statement, viewable in the "router bgp [AS number]" section of the running config. For adjacent peers, this number must be 255. Additionally, the control-plane ACL must have a statement that matches against the neighbor's correct TTL to allow inbound packets to the Switch. The neighbor TTL must be 255 for an adjacent peer or the result of 255-(number of hops) for a multihop peer.
Fix: F-66633r1_fix
Configure all Exterior Border Gateway Protocol peering sessions to use Generalized TTL Security Mechanism (GTSM) or an equivalent configuration as per RFC3682. For adjacent EBGP neighbors, under the router configuration section, enter: config router bgp [AS number] neighbor [address] ebgp-multihop 255 exit ip access-list [name] permit tcp [src address/mask] [dst address/mask] eq bgp ttl eq 255 log exit control-plane ip access-group [name] [direction]
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- AMLS-L3-000270
- Vuln IDs
-
- V-60923
- Rule IDs
-
- SV-75381r1_rule
Checks: C-61869r1_chk
Review the router configuration and interview the system administrator; verify that a mechanism for traffic prioritization and bandwidth reservation exists. This arrangement must ensure that sufficient capacity is available for mission-critical traffic and enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies. To review the configuration, execute a "show qos interfaces" command to see the qos configuration for all interfaces or "show qos interfaces [type] [number] to review the configuration for a specific interface. QoS must be configured according to organizational policies. If no such scheme exists or it is not configured, this is a finding.
Fix: F-66635r1_fix
Implement a mechanism for traffic prioritization and bandwidth reservation. This mechanism must enforce the traffic priorities specified by the Combatant Commanders/Services/Agencies. Arista QoS implementations vary according to the underlying hardware platform. For a complete reference on how to configure QoS for the platform under evaluation, refer to the Arista configuration manual, Chapter 21.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- AMLS-L3-000280
- Vuln IDs
-
- V-60925
- Rule IDs
-
- SV-75383r1_rule
Checks: C-61871r1_chk
Review the router configuration to verify that Border Gateway Protocol connections are only from known neighbors in a trusted AS. Check the BGP configuration statements viewable via the "show running-config" command to validate that no dynamic BGP listen ranges are configured for EBGP peerings to external networks. This requirement to eliminate dynamic listen ranges does not apply to internal networks. If the router is configured with dynamic listen ranges for EBGP peers to external networks, this is a finding.
Fix: F-66637r1_fix
Remove any configuration statements for dynamic listen ranges to external EBGP peers. If connections must exist, use explicit neighbor statements for the peering router.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- AMLS-L3-000290
- Vuln IDs
-
- V-60927
- Rule IDs
-
- SV-75385r1_rule
Checks: C-61873r1_chk
Review the router configuration to determine if the maximum hop limit has been configured. If it has been configured, then it must be set to at least 32. If it has not been configured, the default value must be determined. The default value for the Arista MLS is 64. Review the interface configuration via the "show running-config" command for the statement ipv6 nd ra hop-limit 32 If the default value is below 32 and the maximum hop limit value has not been configured (set to at least 32), this is a finding. In any case, maximum hop limit must be at least 32.
Fix: F-66639r1_fix
Configure the router maximum hop limit value to at least 32. From the interface configuration mode, enter: ipv6 nd ra hop-limit 32
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- AMLS-L3-000300
- Vuln IDs
-
- V-60929
- Rule IDs
-
- SV-75387r1_rule
Checks: C-61875r1_chk
Review the router configuration to determine if the router only allows incoming communications from authorized sources to be routed to authorized destinations. To verify an ACL is configured to allow only incoming communications from authorized sources, execute a "show ip access-list" command and verify the pertinent permit and deny statements are in place. Validate the access list is configured on the appropriate interface via the "show ip access-list summary" command or by reviewing the interface configuration viewable in the "show running-config" command. If PBR is being used, verify the appropriate policy maps have been configured by reviewing the switch running-config via the "show running-config" command. If the router does not restrict incoming communications to allow only authorized sources and destinations, this is a finding.
Fix: F-66641r1_fix
Configure the router to only allow incoming communications from authorized sources to be routed to authorized destinations. Implement access control lists or policy-based routing as defined in the Arista Configuration Manual, chapters 18 and 22 respectively.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- AMLS-L3-000320
- Vuln IDs
-
- V-60933
- Rule IDs
-
- SV-75391r1_rule
Checks: C-61879r1_chk
Review the router configuration to determine if RIP is enabled via the "show running-config" command. RIP is disabled by default on an Arista switch and is only enabled when explicitly configured. If a configuration statement enabling RIP is in the Arista Multilayer Switch configuration, this is a finding.
Fix: F-66645r1_fix
Disable RIP via the "no router rip" command.