UCF STIG Viewer Logo

Arista MLS EOS 4.2x L2S Security Technical Implementation Guide


Overview

Date Finding Count (19)
2023-01-11 CAT I (High): 1 CAT II (Med): 15 CAT III (Low): 3
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-255968 High The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.
V-255974 Medium The Arista MLS layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.
V-255973 Medium The Arista MLS layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.
V-255971 Medium The Arista MLS layer 2 switch must have BPDU Guard enabled on all switch ports connecting to access layer switches and hosts.
V-255972 Medium The Arista MLS switch must have STP Loop Guard enabled on all nondesignated STP switch ports.
V-255977 Medium The Arista MLS layer 2 Arista MLS switch must implement Rapid STP where VLANs span multiple switches with redundant links.
V-255975 Medium The Arista MLS layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.
V-255969 Medium The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks.
V-255979 Medium The Arista MLS layer 2 switch must have all trunk links enabled statically.
V-255978 Medium The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.
V-255984 Medium The Arista MLS layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.
V-255985 Medium The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.
V-255982 Medium The Arista MLS layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it.
V-255983 Medium The Arista MLS layer 2 switch must not use the default VLAN for management traffic.
V-255980 Medium The Arista MLS layer 2 switch must have all disabled switch ports assigned to an unused VLAN.
V-255981 Medium The Arista MLS layer 2 switch must not have the default VLAN assigned to any host-facing switch ports.
V-255970 Low The Arista MLS switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.
V-255986 Low The Arista MLS layer 2 switch must not have any switch ports assigned to the native VLAN.
V-255976 Low The Arista MLS layer 2 switch must have IGMP or MLD Snooping configured on all VLANs.