Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify the device is configured to limit the number of concurrent management sessions with the following commands: switch#sh run | section management ssh management ssh connection limit 5 ! If the Arista network device is not configured to limit the number of SSH concurrent sessions, this is a finding.
Configure the switch to limit SSH concurrent connections to the device with the following commands: switch#configure switch(config)#management ssh switch(config-mgmt-ssh)#connection limit 5 switch(config-mgmt-ssh)#exit switch#wr !
Verify the Arista network device is configured with access control lists to control the flow of management information. Step 1: Verify SSH has an inbound ACL applied as shown in the example below. sh run | sec management ssh ip access-group MGMT_NETWORK in Step 2: Verify the ACL permits only hosts from the management network to access the device. sh run | sec access-list MGMT_NETWORK ip access-list MGMT_NETWORK 10 permit ip 10.1.12.0/24 any 20 deny ip any any log If the Arista network device is not configured to enforce approved authorizations for controlling the flow of management information within the device based on control policies, this is a finding.
Step 1: Configure an ACL for SSH access using the following commands: switch(config)#ip access-list MGMT_NETWORK switch(config-acl-MGMT_NETWORK)#10 permit ip 10.1.12.0/24 any switch(config-acl-MGMT_NETWORK)#20 deny ip any any log switch(config-acl-MGMT_NETWORK)#exit Step 2: Apply the ACL to management ssh. switch(config)#management ssh switch(config-mgmt-ssh)#ip access-group MGMT_NETWORK in switch(config-mgmt-ssh)#exit
Verify the Arista device is configured to enforce the limit of three consecutive invalid logon attempts with the following command: switch#show running-config | section aaa aaa authentication policy lockout failure 3 duration 900 If the Arista device is not configured to enforce the limit of three consecutive invalid logon attempts, this is a finding.
Configure the account lockout policy using the following commands: switch(config)#aaa authentication policy lockout failure 3 switch(config)#duration 900 switch(config)#exit
Verify the Arista network device is configured to present a DOD-approved banner that is formatted in accordance with DTM-08-060. Verify the Arista device uses the following verbiage for applications that can accommodate banners of 1300 characters by using the following command: switch#show configuration | section banner "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If the Arista device does not display such a banner, this is a finding.
Configure the Arista network device to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device. switch(config)#banner login Enter TEXT message. <Insert banner here> Type 'EOF' on its own line to end.
Verify the Arista network device is configured to audit all administrator activity. Verify the AAA logging settings in the configuration file with the following example: switch#show running-config | section aaa aaa authentication policy on-success log aaa authentication policy on-failure log aaa accounting exec default start-stop group radius logging aaa accounting system default start-stop group radius logging aaa accounting commands all default start-stop logging group radius If the Arista network device is not configured to audit all administrator activity, this is a finding.
Configure the Arista network device to audit all administrator activity. Configure the AAA settings to capture administrator activity events. switch(config)#aaa authentication policy on-success log switch(config)#aaa authentication policy on-failure log switch(config)#aaa accounting exec default start-stop group radius logging switch(config)#aaa accounting system default start-stop group radius logging switch(config)#aaa accounting commands all default start-stop logging group radius
Verify the Arista network device has telnet and https disabled. Step 1: Determine if telnet is disabled with the following command: switch#show management telnet Telnet status for Default VRF is disabled Telnet session limit is 20 Telnet session limit per host is 20 If telnet is enabled, this is a finding. Step 2: Determine if https is disabled with the following command: switch#show management http-server SSL Profile: none FIPS Mode: No QoS DSCP: 0 LogLevel: none CSP Frame Ancestor: None TLS Protocols: 1.0 1.1 1.2 VRF Server Status Enabled Services ------------------------------------------------------- default HTTPS: port 443 http-commands If Enabled Services in the output shows http-commands, this is a finding.
Configure the Arista network device to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services. Step 1: Disable telnet with the following command: switch#config switch(config)#management telnet switch(config-mgmt-telnet)#shutdown switch(config-mgmt-telnet)#exit switch(config)#exit Step 2: Disable https with the following command: switch#config switch(config)#management api http-commands switch(config-mgmt-api-http-commands)#shutdown switch(config-mgmt-api-http-commands)#exit switch(config)#exit
Step 1: Verify on the Arista network device that an account of last resort is configured using the following command: switch#sh running-config | section username username Emergency-Admin privilege 15 role network-admin secret sha512 $6$ObuWg.Eu7DwGD8k/$EgT0uI.hLrStrmxUvJijecxDXr.Zy.imi1UrDzDP38q8Erqgkfe0IhHzIhYmR3ekW74XdAFf7I6SgzAoUFd0 Step 2: Verify the Arista network device default account has been overwritten with the local account of last resort. switch#sh running-config | section username username Emergency-Admin privilege 15 role network-admin secret sha512 $6$ObuWg.Eu7DwGD8k/$EgT0uI.hLrStrmxUvJijecxDXr.Zy.imi1UrDzDP38q8Erqgkfe0IhHzIhYmR3ekW74XdAFf7I6SgzAoUFd0 If one local account on the Arista network device does not exist for use as the account of last resort in the event the authentication server is unavailable, this is a finding. If the default admin account exists on the device, this is a finding.
Step 1: Configure the Arista network device for a username "Emergency-Admin" account of last resort using the following command: switch#configure switch(config)#username Emergency-Admin privilege 15 role network-admin secret 0 <plain-text password> Step 2: Ensure the Arista network device default account has been overwritten with the local account of last resort. switch#sh running-config | section username username Emergency-Admin privilege 15 role network-admin secret sha512 $6$ObuWg.Eu7DwGD8k/$EgT0uI.hLrStrmxUvJijecxDXr.Zy.imi1UrDzDP38q8Erqgkfe0IhHzIhYmR3ekW74XdAFf7I6SgzAoUFd0 ! Use the following command to remove the default admin account if necessary: switch(config)#no username admin Step 3: As a final step in the case all administrative accounts are locked out of the device, ensure the username and password created for the account of last resort is contained within a sealed envelope and kept in a safe or secure network location.
Review the Arista device configuration "show management security" to determine the minimum 15-character password length. switch#show run | section management security management security password minimum length 15 ! If the Arista network device does not enforce a minimum 15-character password length, this is a finding.
Configure the Arista device to enforce a minimum password 15-character length. switch#configure switch(config)#management security switch(config-mgmt-security)#password minimum length 15 switch(config-mgmt-security)#exit switch(config)# !
Determine if the Arista network device uses FIPS 140-2 approved algorithms for authentication to a cryptographic module. Step 1: Review the Arista network device configuration to verify hardware or software entropy is enabled and FIPS restrictions are used in accordance with NIST-specified validated cryptographic requirements. switch# show management security CPU Model: AMD GX-424CC SOC with Radeon(TM) R5E Graphics Security Chip: N313X Crypto Module: Arista EOS Crypto Module v2.0 Forwarding ASIC: Jericho0 Model: Jericho Blocked client protocols: None Hardware entropy generation is enabled Haveged entropy generation is disabled Jitter entropy generation is disabled ! If both hardware entropy and haveged entropy are disabled, this is a finding. Step 2: Review the Arista network device configuration to verify that FIPS restrictions are enabled for management security to use EOS Crypto Module for the RSA key pair used for SSH and the device can only use FIPS-approved algorithms. switch(config)show run | section management ssh management ssh fips restrictions ! If the FIPS restrictions line is not present, this is a finding.
Configure the Arista network device to use FIPS 140-2 approved algorithms for authentication to a cryptographic module. Step 1: Configure the Arista network device to ensure hardware or software entropy is enabled and FIPS restrictions are used in accordance with NIST-specified validated cryptographic requirements. switch(config)#management security switch(config-mgmt-security)#entropy source hardware OR (only set one or the other, not both) switch(config-mgmt-security)#entropy source haveged ! Step 2: Configure the Arista network device to ensure the old RSA key pairs are zeroized and a new FIPS-approved hostkey is generated. It is extremely important to complete this step after hardware or software entropy is configured. switch#reset ssh hostkey rsa ! *IMPORTANT part of Step 2* Review the Arista network device configuration new key has been generated. switch#show management ssh hostkey rsa public ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz8vDiTWYcGuVrv04fwPj8YYBaHU+UFFl5zrFjeYiVl/dvswsiRSophF98aLjnRdJJ0NcjovjEEUnP0Q39UCoSYQRjrUzK2nzRMMD2IKxZyNhx9+/OT60lgh4M//kwxq0vMI1nk1pUO/wRaN1B4IzDizcyP9jY28bSdz8Y5TyLgrca6Ja4v99Io+lkHG0bj6X8s+VnBsFWMrlabw1s4bUPr9PzMfUHx9gLHCVR+DFZvPHMR4sSK14F949IJgOKsXj chassisAddr=84:73:cf:6f:6c:55 Step 3: Enable FIPS restrictions for SSH and so the device can only use FIPS-approved algorithms. switch(config)management ssh switch(config-mgmt-ssh)#fips restrictions
Verify the Arista device is configured for 10-minute inactivity timeout for management sessions. switch#sh run | section management ! interface Management1 ip address 172.28.134.55/20 ! management console idle-timeout 10 ! management ssh idle-timeout 10 ! If the Arista network device is not configured to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity, this is a finding.
Configure the Arista network device to terminate the connections after 10 minutes of inactivity. Step 1: Configure the settings for the console. switch(config)#management console switch(config-mgmt-console)#idle-timeout 10 switch(config-mgmt-console)#exit switch(config)# ! Step 2: Configure the settings for SSH. switch(config)#management ssh switch(config-mgmt-ssh)#idle-timeout 10 switch(config-mgmt-console)#exit switch(config)# !
Determine if the network device enforces role-based access control policy over defined subjects and objects. This requirement may be met through use of a properly configured authentication server. Note: If not using role-based access for the network device, this check is Not Applicable. Step 2: Verify the Arista network device configured AAA servers are synchronized for all role-based authentication access control structure defined by role types and user-defined control policies over defined subjects and objects. switch(config)#show running-config | section role role network-admin 10 permit command .* ! role operator 10 permit command show running-config [all|detail] sanitized 20 deny command >|>>|extension|\||session|do|delete|copy|rmdir|mkdir|python-shell|bash|platform|scp|append|redirect|tee|more|less|who|show run.* 30 deny mode config command (no |default )?(username|role|aaa|tcpdump|schedule|event.*) 40 permit command .* ! role tester 10 permit command show running-config [all|detail] sanitized 20 deny command >|>>|extension|\||session|do|delete|copy|rmdir|mkdir|python-shell|bash|platform|scp|append|redirect|tee|more|less|who|show run.* 30 deny mode config command (no |default )(username|role|aaa|tcpdump|schedule|event.*) 40 permit command .* If role-based access control policy is not enforced over defined subjects and objects, this is a finding.
Configure the network device and its associated authentication server to enforce role-based access control policy over defined subjects and objects. switch(config)# role network-admin 10 permit command .* ! role operator 10 permit command show running-config [all|detail] sanitized 20 deny command >|>>|extension|\||session|do|delete|copy|rmdir|mkdir|python-shell|bash|platform|scp|append|redirect|tee|more|less|who|show run.* 30 deny mode config command (no |default )?(username|role|aaa|tcpdump|schedule|event.*) 40 permit command .* ! role tester 10 permit command show running-config [all|detail] sanitized 20 deny command >|>>|extension|\||session|do|delete|copy|rmdir|mkdir|python-shell|bash|platform|scp|append|redirect|tee|more|less|who|show run.* 30 deny mode config command (no |default )(username|role|aaa|tcpdump|schedule|event.*) 40 permit command .*
Determine if the network device is configured to synchronize internal information system clocks with authenticated primary and secondary time sources. Verify the Arista network device configuration with the following example: switch# show running-config | section ntp ntp authentication-key 12 sha1 7 06131C2058470A58 ntp trusted-key 12 ntp authenticate servers ntp local-interface Management1 ntp server 192.168.16.36 prefer key 12 ntp server 192.168.16.37 key 12 If the Arista network device is not configured to synchronize internal system clocks with the primary and secondary time sources, this is a finding. If the Arista network device does not authenticate Network Time Protocol sources using authentication that is cryptographically based, this is a finding.
Configure the Arista network device for at least two trusted time sources and to use cryptographic authentication with the following command example: switch#config switch(config)#ntp authentication-key 12 sha1 0 <key> switch(config)#ntp trusted-key 12 switch(config)#ntp authenticate servers switch(config)#ntp local-interface Management1 switch(config)#ntp server 192.168.16.36 prefer key 12 switch(config)#ntp server 192.168.16.37 key 12 switch(config)#exit Configure the local time zone for the device. switch#config switch(config)#clock timezone <timezone> switch(config)#exit
Review the network device configuration to verify SNMP messages are authenticated using a FIPS-validated HMAC. Verify the Arista network device is configured for the following SNMP example parameters: switch(config)#show run | section snmp snmp-server engineID local f5717f444ca880dbb200 snmp-server chassis-id ID CC-7050X3 snmp-server contact FedSE snmp-server location JITC snmp-server view snmpview system included snmp-server group testers v3 priv read snmpview snmp-server user jitc-sw testers v3 localized f8527f444ca990dcc200 auth sha 7b65225a6abf5111cd951e6cb7e105aef5bcd734 priv aes a1aedb1986642e766d4c8032d58e73b72bc3528b snmp-server host 192.168.10.31 version 3 priv jitc-sw snmp-server enable traps snmp authentication snmp-server enable traps snmp link-down snmp-server enable traps snmp link-up ! If the Arista network device is not configured to authenticate SNMP messages using a FIPS-validated HMAC, this is a finding.
Configure the network device to authenticate SNMP messages using a FIPS-validated HMAC. Configure the Arista network device following the example SNMP parameters to ensure messages are authenticated using FIPS-validated HMAC: switch(config)#snmp-server engineID local f5717f444ca880dbb200 switch(config)#snmp-server chassis-id ID CC-7050X3 switch(config)#snmp-server contact FedSE switch(config)#snmp-server location JITC switch(config)#snmp-server view snmpview system included switch(config)#snmp-server group testers v3 priv read snmpview switch(config)#snmp-server user jitc-sw testers v3 localized f8527f444ca990dcc200 auth sha 7b65225a6abf5111cd951e6cb7e105aef5bcd734 priv aes a1aedb1986642e766d4c8032d58e73b72bc3528b switch(config)#snmp-server host 192.168.10.31 version 3 priv jitc-sw switch(config)#snmp-server enable traps snmp authentication switch(config)#snmp-server enable traps snmp link-down switch(config)#snmp-server enable traps snmp link-up
Determine if the Arista network device is configured to use FIPS-validated HMAC to protect the integrity of remote maintenance sessions. NOTE: Although allowed by SP800-131Ar2 for some applications, SHA-1 is considered a compromised hashing standard and is being phased out of use by industry and government standards. Unless required for legacy use, DOD systems should not be configured to use SHA-1 for integrity of remote access sessions. Verify the HMAC settings for SSH using the following command: switch#sh run | section management ssh mac hmac-sha2-256 hmac-sha2-512 If the Arista network device does not implement replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Configure the Arista network device to use FIPS-validated HMAC to protect the integrity of remote maintenance sessions. switch(config)#management ssh switch(config-mgmt-ssh)#mac hmac-sha2-256 hmac-sha2-512 switch(config-mgmt-ssh)#exit
Validate that a FIPS validated SSH encryption algorithm is selected. NOTE: AES-CBC algorithms have been considered compromised and are no longer recommended for cryptographic algorithms. AES-CTR and AES-GCM are both superior algorithms and are recommended. sh run | section management ssh cipher aes256-ctr aes512-ctr aes128-ctr If the Arista network device is not configured to implement cryptographic mechanisms to protect the confidentiality of remote maintenance sessions using a FIPS 140-2 approved algorithm, this is a finding.
Configure the Arista network device to use FIPS-approved algorithms to protect the confidentiality of remote maintenance sessions. switch(config)#management ssh switch(config-mgmt-ssh)#cipher aes256-ctr aes512-ctr aes128-ctr
Verify the Arista network device is configured to audit all DOD auditable events. Verify the logging settings in the configuration file with the following example: switch#sh running-config | section logging logging buffered informational logging trap informational NOTE: Acceptable settings include debugging, informational, and notifications to adjust syslog server traffic impact. Setting to higher severity levels can cause necessary lower-level events to be missed. If the Arista network device is not configured to audit all DOD auditable events, this is a finding.
Configure a logging level sufficient to capture all DOD auditable events. switch(config)#logging buffered informational switch(config)#logging trap informational NOTE: Acceptable settings include debugging, informational, and notifications to adjust syslog server traffic impact. Setting to higher severity levels can cause necessary lower-level events to be missed.
Verify the Arista network device is configured to use an authentication server as primary source for authentication. Verify the Arista network device configuration for RADIUS server IP, aaa group server, and defined encryption key using the following example command: switch#show running-config |section radius radius-server host 192.168.10.101 key 7 106D1A182224E12AZ ! aaa group server radius RADIUS_1 server 192.168.10.101 ! switch#show running-config | section aaa aaa authentication login default group radius local aaa authentication login console group radius local aaa authentication dot1x default group radius aaa authentication policy on-success log aaa authentication policy on-failure log aaa authorization console aaa authorization commands all default local aaa accounting exec default start-stop group radius logging aaa accounting system default start-stop group radius logging aaa accounting commands all default start-stop logging group radius If the Arista network device is not configured to use an authentication server to authenticate users prior to granting administrative access, this is a finding.
Configure the Arista network device to use an authentication server. Step 1: Configure the Arista network device to use RADIUS server using the following commands: switch#config switch(config)#radius-server host 192.168.10.101 key 7 106D1A182224E12AZ aaa group server radius RADIUS_1 server 192.168.10.101 Step 2: Configure all network connections associated with device management to use an authentication server for login authentication. switch(config)#aaa authentication login default group radius local aaa authentication login console group radius local aaa authentication dot1x default group radius aaa authentication policy on-success log aaa authentication policy on-failure log aaa authorization console aaa authorization commands all default local aaa accounting exec default start-stop group radius logging aaa accounting system default start-stop group radius logging aaa accounting commands all default start-stop logging group radius switch(config)#exit
Verify the Arista network device is configured with an “event-handler” to complete an incremental backup of the running configuration, which can be maintained in the switch flash memory stored in /mnt/flash/startup-config_directory (filetime): switch#show run | section event-handler event-handler CFG_BACKUP trigger on-startup-config action bash buf () { filetime=$(date +%Y%m%d); cp /mnt/flash/startup-config /mnt/flash/startup-config_${filetime}; }; buf ! If the Arista network device is not configured to conduct backups of system-level data when changes occur, this is a finding.
Configure the Arista network device with an “event-handler” to complete an incremental backup of the running configuration, which can be maintained in the switch flash memory stored in /mnt/flash/startup-config_directory (filetime): switch#config switch(config)#event-handler CFG_BACKUP switch(config-handler-CFG_BACKUP)#trigger on-startup-config switch(config-handler-CFG_BACKUP)#action bash buf () { filetime=$(date +%Y%m%d); cp /mnt/flash/startup-config /mnt/flash/startup-config_${filetime}; }; buf switch(config-handler-CFG_BACKUP)#exit switch(config)#exit !
Determine if the Arista network device obtains public key certificates from an appropriate certificate policy through an approved service provider. Note: This check is Not Applicable if not using any PKI certificates. Verify the DOD PKI certificates are copied to /certificate directory on the switch as outlined in the Arista Military Deployment Guide and configured as in the section "Configuring RSA SecureID with OTP Management". switch# #dir certificate: Directory of certificate:/ -rw- 2025 Apr 30 17:34 ARISTA_ROOT_CA.crt -rw- 2110 Apr 30 17:34 ARISTA_SIGNING_CA.crt -rw- 2015 Apr 30 17:35 Arista-CCS-720XP-48Y6.pem -rw- 2020 Apr 30 17:35 DOD_JITC_Root_CA_3__0x01__DOD_JITC_Root_CA_3.cer -rw- 2125 Apr 30 17:35 CA-60.cer ! Verify the provider of the certificate is a DOD-approved certificate authority. If the Arista network device does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Configure the Arista network device to obtain its public key certificates from an appropriate certificate policy through an approved service provider. Step 1: Configure the Arista network device by following the steps outlined in the Arista Military Unique Deployment Guide to generate the DOD PKI certificate signing request [switch.csr] for submission to DOD PKI CA. Example configuration: switch#security pki certificate generate signing-request key rsa1.key Common Name for use in subject: 192.168.25.26 Two-Letter Country Code for use in subject: US State for use in subject: AZ Locality Name for use in subject: Ft Huachuca Organization Name for use in subject: CONTRACTOR,PKI,DOD Organization Unit Name for use in subject: U.S. GOVERNMENT Email address for use in subject: IP addresses (space separated) for use in subject-alternative-name: 192.168.25.26 DNS names (space separated) for use in subject-alternative-name: Email addresses (space separated) for use in subject-alternative-name: -----BEGIN CERTIFICATE REQUEST----- MIIC6DCCAdACAQAwgYAxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJBWjEUMBIGA1UE BwwLRnQgSHVhY2h1Y2ExGzAZBgNVBAoMEkNPTlRSQUNUT1IsUEtJLERvRDEYMBYG A1UECwwPVS5TLiBHT1ZFUk5NRU5UMRcwFQYDVQQDDA4xOTIuMTY4LjI0MC4yMzCC i7TGBvhm5PTbfAzBma8/hSlsBGJ0qnOteb1Zaw== <Abbreviated Output Due to Size> -----END CERTIFICATE REQUEST----- Step 2: Once the DOD PKI signed certificates are received, CA Root Certificate and Intermediate Certificates obtained from CA must be uploaded onto the Arista network device directory of /certificate: The certificate's transfer can be accomplished by SCP or USB. The detail configuration can be found in the Arista Military Unique Deployment Guide in the section "Configuring RSA SecureID with OTP Management". The following commands copy the certificates using device USB1: to directory of the certificate: switch#copy usb1:Arista-23.pem certificate: Copy completed successfully. switch#copy usb1: CA-60.crt certificate: Copy completed successfully. switch#copy usb1: DODDISASWCA_60.crt certificate: Copy completed successfully. ! The following commands verify all three certificates are correctly copied to the certificate directory: switch#directory certificate switch#dir certificate: Directory of certificate:/ -rw- 2025 Aug 11 10:52 CA-60.crt -rw- 2110 Aug 11 10:52 ARISTA_SIGNING_CA.crt -rw- 1724 Aug 9 14:35 DODDISASWCA_60.crt -rw- 1722 Aug 12 09:38 arista-b64.cer -rw- 1696 Aug 12 14:35 Arista-23.pem -rw- 1696 Aug 12 14:36 intCert.pem ! The following commands configure the SSL-profile using the PKI certificates on the switch with the RSA SecureID server and trust chain: switch(config)#management security switch(config-mgmt-security)#ssl profile RSA01 switch(config-mgmt-sec-ssl-profile-RSA01)#tls versions 1.2 switch(config-mgmt-sec-ssl-profile-RSA01)#certificate Arista-23.pem key rsa1.key switch(config-mgmt-sec-ssl-profile-RSA01)#trust certificate Arista-23.pem switch(config-mgmt-sec-ssl-profile-RSA01)#trust certificate DODDISASWCA_60.crt switch(config-mgmt-sec-ssl-profile-RSA01)#chain certificate CA-60.cer switch(config-mgmt-sec-ssl-profile-RSA01)#show active management security ssl profile RSA01 tls versions 1.2 certificate Arista-23.pem.pem key rsa1.key trust certificate certificate Arista-23.pem trust certificate CA-60.cer trust certificate DODDISASWCA_60.crt chain certificate CA-60.crt radius-server tls ssl-profile RSA01 ! Step 3: Configure the switch RadSec Proxy server and RSA SecureID server IP address and RADIUS attribute configuration for ssl-profile RSA01. switch(config)#radius-server tls ssl-profile RSA01 switch(config)#radius-server host 192.168.16.102 key 7 09595D080D0C1453 switch(config)#radius-server host 192.168.16.55 key 7 120C161606020F45 switch(config)#radius-server host 192.168.16.55 tls switch(config)#aaa group server radius RADsecProxy server 192.168.16.55 tls ! Step 4: Configure the AAA authentication and authorization parameters for SSL-profile and RadSec Proxy Server. switch(config)#no aaa root switch(config)#aaa authorization policy local default-role aristaadmin switch(config)#logging level AAA informational switch(config)#aaa group server radius RADsecProxy server 192.168.16.55 tls switch(config)#aaa group server radius TIC1 server 192.168.16.103 switch(config)#aaa authentication login default local group RADsecProxy switch(config)#aaa authentication login console local switch(config)#aaa authentication policy on-success log switch(config)#aaa authentication policy on-failure log switch(config)#aaa authorization exec default local group RADsecProxy switch(config)#aaa authorization commands all default local switch(config)#aaa accounting commands all default start-stop logging group radius switch(config)#write ! Step 5: Verify the AAA configuration to ensure all parameters from the previous step are accurate with the following command: switch(config)#show running-config | section aaa no aaa root aaa authorization policy local default-role aristaadmin logging level AAA informational aaa group server radius RADsecProxy server 192.168.16.55 tls aaa group server radius TIC1 server 192.168.16.103 aaa authentication login default local group RADsecProxy aaa authentication login console local aaa authentication policy on-success log aaa authentication policy on-failure log aaa authorization exec default local group RADsecProxy aaa authorization commands all default local aaa accounting commands all default start-stop logging group radius ! switch#show aaa methods authentication Authentication method lists for LOGIN: name=default methods=local, group RADsecProxy name=login methods=local Authentication method list for ENABLE: name=default methods=local Authentication method list for DOT1X: name=default methods= ! switch##sh radius RADIUS server : 192.168.16.45, authentication port 1812, accounting port 1813 Messages sent: 10 Messages received: 10 Requests accepted: 9 Requests rejected: 1 Requests timeout: 0 Requests retransmitted: 0 Bad responses: 0 Connection errors: 0 DNS errors: 0 CoA request received: 0 DM request received: 0 CoA ack sent: 0 DM ack sent: 0 CoA Nak sent: 0 DM Nak sent: 0 RADIUS server-group: RSA1 0: 192.168.16.45, authentication port 1812, accounting port 1813 RADIUS server-group: TIC1 0: 192.168.16.103, authentication port 1812, accounting port 1813 Last time counters were cleared: never ! trust certificate Arista-23.pem switch#(config-mgmt-sec-ssl-profile-RSA1)#Aug 24 15:56:41 switch SuperServer: %SECURITY-3-SSL_PROFILE_VALID: SSL profile 'RSA01' is valid.
Verify the Arista network device has been configured Syslog server for auditing data by using the following command: switch#show running-config | section logging logging host 192.168.16.30 514 ! If logging host is not configured to send log data to a central log server, this is a finding.
The Arista network device must be configured for Syslog server for auditing data by using the following commands: switch(config)#logging host 192.168.16.30 514
Verify the Arista device is running a certified version of EOS from the Arista.com website on the Support/Software Download section. switch#show version Arista DCS-7280SRA-48C6-F Hardware version: 21.00 Serial number: SSJ18250372 Hardware MAC address: 7483.ef6d.86f7 System MAC address: 7483.ef6d.86f7 Software image version: 4.26.4M Architecture: i686 Internal build version: 4.26.4M-25280047.4264M Internal build ID: 79589245-f1f3-49b7-8bee-cbfacac004e6 Image format version: 1.0 Uptime: 2 weeks, 0 days, 9 hours and 53 minutes Total memory: 8098984 kB Free memory: 6155528 kB If the Arista network device is not running an operating system release that is currently supported by Arista Networks, this is a finding.
Upgrade the Arista network device to an operating system that is supported by the vendor. Step 1: The Administrator would log on to www.arista.com/support/software-download website and choose EOS/Active Releases and choose appropriate version of EOS to download. Step 2: Transfer the EOS-4.x.yz.swi.sha512sum to Arista network device directory "flash:". Step 3: From the EOS CLI, type dir flash: to verify the file EOS-4.x.yz.swi.sha512sum is in the directory "flash:". switch#directory flash: EOS-4.x.yz.swi.sha512sum Step 4: Use the command verify to verify the checksum sha512sum: switch#verify flash: /sha512 flash:EOS-4.x.yz checksum should match Step 5: The file can also be verified from bash. switch#bash #bash # sha512sum /mnt/flash/EOS-4.x.yz *note the Arista network device would not run an invalid version of EOS and if the checksum does not match, contact an Arista Representative for assistance.