1. Home
  2. Security Hardening
  3. DISA STIG Arista MLS DCS 7000 Series NDM V1R3
  4. AMLS-NM-000350 – Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications – api https

AMLS-NM-000350 – Arista Multilayer Switches used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications – api https

Details

This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP.

Solution

Configure the network device to use secure protocols instead of their unsecured counterparts.

Configuration Example:

Disable unsecure protocols.
configure
management telnet
shutdown
exit
management api http-commands
no protocol http
protocol https
exit

Other protocols (FTP) can be denied using AAA and RBAC. For connections that require use of these maintenance protocols, creation of SSH tunnels can fulfill this security requirement. This is summarized here and available at length in the Common Criteria guidance document.

Configuration Example:

management ssh
tunnel NEW
local port 514
ssh-server syslogServer user authuser port 22
remote host localhost port 514
no shutdown

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Maintenance.This control applies to the following type of system Arista.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles