ARST-RT-000730 - The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.

Information

The primary security model for an MPLS L3VPN infrastructure is traffic separation. The service provider must guarantee the customer that traffic from one VPN does not leak into another VPN or into the core, and that core traffic must not leak into any VPN. Hence, it is imperative that each CE-facing interface can only be associated to one VRF-that alone is the fundamental framework for traffic separation.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the Arista PE router to have each VRF bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.

Configure the VRF on the CE facing interfaces.

PE11(config)#vrf instance PROD
PE11(config)#vrf instance DEVP
!
PE11(config)#ip routing vrf PROD
PE11(config)#ip routing vrf DEVP
!
PE11(config)#interface Ethernet3
PE11(config-if-Et3)#no routerport
PE11(config-if-Et3)#vrf PROD
PE11(config-if-Et3)#ip address 10.1.99.11/24
!
PE11(config)#interface Ethernet4
PE11(config-if-Et3)#no routerport
PE11(config-if-Et3)#vrf DEVP
PE11(config-if-Et3)#ip address 10.11.5.11/24

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Arista_MLS_EOS_4-2x_Y24M07_STIG.zip

Item Details

Category: CONTINGENCY PLANNING

References: 800-53|CP-8, CAT|I, CCI|CCI-004931, Rule-ID|SV-256052r991791_rule, STIG-ID|ARST-RT-000730, Vuln-ID|V-256052

Plugin: Arista

Control ID: 31fff8438cc15d7d854c2d1c45272a2f63301d9c93d010369e61ce11b21940d9