Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • The Arista perimeter router must be configured to deny network traffic by default and allow network traffic by exception.

    A deny-all, permit-by-exception network communications traffic policy ensures that only connections that are essential and approved are allowed. This requirement applies to both inbound and outbou...
    Rule High Severity
  • SRG-NET-000205-RTR-000001

    Group
  • The Arista router must be configured to restrict traffic destined to itself.

    The route processor handles traffic destined to the router, the key component used to build forwarding paths that is also instrumental with all network management functions. Hence, any disruption o...
    Rule High Severity
  • SRG-NET-000205-RTR-000002

    Group
  • The Arista router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.

    Fragmented ICMP packets can be generated by hackers for DoS attacks such as Ping O' Death and Teardrop. It is imperative that all fragmented ICMP packets are dropped.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules