Skip to content

Arista MLS EOS 4.2x Router Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000205-RTR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Arista router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.

    &lt;VulnDiscussion&gt;Fragmented ICMP packets can be generated by hackers for DoS attacks such as Ping O' Death and Teardrop. It is imperative that...
    Rule Medium Severity
  • SRG-NET-000205-RTR-000003

    <GroupDescription></GroupDescription>
    Group
  • The Arista perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.

    &lt;VulnDiscussion&gt;Access lists are used to separate data traffic into that which it will route (permitted packets) and that which it will not r...
    Rule Medium Severity
  • SRG-NET-000205-RTR-000005

    <GroupDescription></GroupDescription>
    Group
  • The Arista perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.

    &lt;VulnDiscussion&gt;Access lists are used to separate data traffic into that which it will route (permitted packets) and that which it will not r...
    Rule Medium Severity
  • SRG-NET-000205-RTR-000006

    <GroupDescription></GroupDescription>
    Group
  • The Arista router must be configured to block any traffic that is destined to IP core infrastructure.

    &lt;VulnDiscussion&gt;IP/MPLS networks providing VPN and transit services must provide, at the least, the same level of protection against denial-o...
    Rule High Severity
  • SRG-NET-000205-RTR-000008

    <GroupDescription></GroupDescription>
    Group
  • The Arista router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.

    &lt;VulnDiscussion&gt;The uRPF feature is a defense against spoofing and denial-of-service (DoS) attacks by verifying if the source address of any ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules