| V-255968 | | The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection. | Controlling LAN access via 802.1x authentication can assist in preventing a malicious user from connecting an unauthorized PC to a switch port to inje... |
| V-255969 | | The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks. | Denial of service is a condition when a resource is not available for legitimate users. Packet flooding distributed DoS (DDoS) attacks are referred to... |
| V-255971 | | The Arista MLS layer 2 switch must have BPDU Guard enabled on all switch ports connecting to access layer switches and hosts. | If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priority than the existing root... |
| V-255972 | | The Arista MLS switch must have STP Loop Guard enabled on all nondesignated STP switch ports. | The Spanning Tree Protocol (STP) loop guard feature provides additional protection against STP loops. An STP loop is created when an STP blocking port... |
| V-255973 | | The Arista MLS layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources. | In an enterprise network, devices under administrative control are trusted sources. These devices include the switches, routers, and servers in the ne... |
| V-255974 | | The Arista MLS layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports. | IP Source Guard (IPSG) provides source IP address filtering on a layer 2 port to prevent a malicious host from impersonating a legitimate host by assu... |
| V-255975 | | The Arista MLS layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs. | DAI intercepts Address Resolution Protocol (ARP) requests and verifies that each of these packets has a valid IP-to-MAC address binding before updatin... |
| V-255977 | | The Arista MLS layer 2 Arista MLS switch must implement Rapid STP where VLANs span multiple switches with redundant links. | Spanning Tree Protocol (STP) is implemented on bridges and switches to prevent layer 2 loops when a broadcast domain spans multiple bridges and switch... |
| V-255979 | | The Arista MLS layer 2 switch must have all trunk links enabled statically. | When trunk negotiation is enabled via Dynamic Trunk Protocol (DTP), considerable time can be spent negotiating trunk settings (802.1q or ISL) when a n... |
| V-255980 | | The Arista MLS layer 2 switch must have all disabled switch ports assigned to an unused VLAN. | It is possible that a disabled port that is assigned to a user or management VLAN becomes enabled by accident or by an attacker and as a result gains ... |
| V-255981 | | The Arista MLS layer 2 switch must not have the default VLAN assigned to any host-facing switch ports. | In a VLAN-based network, switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with other networking devices using Sp... |
| V-255982 | | The Arista MLS layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it. | The default VLAN (i.e., VLAN 1) is a special VLAN used for control plane traffic such as Spanning-Tree Protocol (STP), Dynamic Trunking Protocol (DTP)... |
| V-255983 | | The Arista MLS layer 2 switch must not use the default VLAN for management traffic. | Switches use the default VLAN (i.e., VLAN 1) for in-band management and to communicate with directly connected switches using Spanning-Tree Protocol (... |
| V-255984 | | The Arista MLS layer 2 switch must have all user-facing or untrusted ports configured as access switch ports. | Double encapsulation can be initiated by an attacker who has access to a switch port belonging to the native VLAN of the trunk port. Knowing the victi... |
| V-255985 | | The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links. | VLAN hopping can be initiated by an attacker who has access to a switch port belonging to the same VLAN as the native VLAN of the trunk link connectin... |
| V-255970 | | The Arista MLS switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts. | Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the switched network. Any sw... |
| V-255976 | | The Arista MLS layer 2 switch must have IGMP or MLD Snooping configured on all VLANs. | IGMP and MLD snooping provides a way to constrain multicast traffic at Layer 2. By monitoring the IGMP or MLD membership reports sent by hosts within ... |
| V-255986 | | The Arista MLS layer 2 switch must not have any switch ports assigned to the native VLAN. | Double encapsulation can be initiated by an attacker who has access to a switch port belonging to the native VLAN of the trunk port. Knowing the victi... |