Skip to content

Arista MLS EOS 4.2x Router Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Arista router must be configured to have all non-essential capabilities disabled.

    <VulnDiscussion>A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via ...
    Rule Low Severity
  • SRG-NET-000168-RTR-000077

    <GroupDescription></GroupDescription>
    Group
  • The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.

    &lt;VulnDiscussion&gt;A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...
    Rule Medium Severity
  • SRG-NET-000193-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The MPLS router with RSVP-TE enabled must be configured with message pacing or refresh reduction to adjust maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.

    &lt;VulnDiscussion&gt;RSVP-TE can be used to perform constraint-based routing when building LSP tunnels within the network core that will support Q...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules