DISA STIG Arista MLS EOS 4.2x L2S v2r1

Audit Details

Name: DISA STIG Arista MLS EOS 4.2x L2S v2r1

Updated: 8/13/2024

Authority: DISA STIG

Plugin: Arista

Revision: 1.0

Estimated Item Count: 19

File Details

Filename: DISA_STIG_Arista_MLS_EOS_4.2x_L2S_v2r1.audit

Size: 49.3 kB

MD5: c38f40aa619375a4132ce68903c7c761
SHA256: 757f9f6b474fd9240802df8b77a44ed7c696c0cad09bab7f75629c56a5f47031

Audit Items

DescriptionCategories
ARST-L2-000020 - The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection.

IDENTIFICATION AND AUTHENTICATION

ARST-L2-000030 - The Arista MLS layer 2 switch must be configured for Storm Control to limit the effects of packet flooding types of denial-of-service (DoS) attacks.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000050 - The Arista MLS switch must have Root Guard enabled on all switch ports connecting to access layer switches and hosts.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000060 - The Arista MLS layer 2 switch must have BPDU Guard enabled on all switch ports connecting to access layer switches and hosts.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000070 - The Arista MLS switch must have STP Loop Guard enabled on all nondesignated STP switch ports.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000090 - The Arista MLS layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000100 - The Arista MLS layer 2 switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000110 - The Arista MLS layer 2 switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000130 - The Arista MLS layer 2 switch must have IGMP or MLD Snooping configured on all VLANs.

CONFIGURATION MANAGEMENT

ARST-L2-000140 - The Arista MLS layer 2 Arista MLS switch must implement Rapid STP where VLANs span multiple switches with redundant links.

CONFIGURATION MANAGEMENT

ARST-L2-000150 - The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.

CONFIGURATION MANAGEMENT

ARST-L2-000160 - The Arista MLS layer 2 switch must have all trunk links enabled statically.

CONFIGURATION MANAGEMENT

ARST-L2-000170 - The Arista MLS layer 2 switch must have all disabled switch ports assigned to an unused VLAN.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000180 - The Arista MLS layer 2 switch must not have the default VLAN assigned to any host-facing switch ports.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000190 - The Arista MLS layer 2 switch must have the default VLAN pruned from all trunk ports that do not require it.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000200 - The Arista MLS layer 2 switch must not use the default VLAN for management traffic.

CONTINGENCY PLANNING

ARST-L2-000210 - The Arista MLS layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000230 - The Arista MLS layer 2 switch must not have any switch ports assigned to the native VLAN.

SYSTEM AND COMMUNICATIONS PROTECTION