UCF STIG Viewer Logo

The Arista network device must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255947 ARST-ND-000010 SV-255947r882183_rule Medium
Description
Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to denial-of-service (DoS) attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions must be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions.
STIG Date
Arista MLS EOS 4.2x NDM Security Technical Implementation Guide 2023-01-11

Details

Check Text ( C-59623r882181_chk )
Verify the device is configured to limit the number of concurrent management sessions with the following commands:

switch#sh run | section management ssh
management ssh
connection limit 5
!

If the Arista network device is not configured to limit the number of SSH concurrent sessions, this is a finding.
Fix Text (F-59566r882182_fix)
Configure the switch to limit SSH concurrent connections to the device with the following commands:

switch#configure
switch(config)#management ssh
switch(config-mgmt-ssh)#connection limit 5
switch(config-mgmt-ssh)#exit
switch#wr
!