Details
Without re-authentication, users may access resources or perform tasks for which they do not have authorization.
In addition to the re-authentication requirements associated with session locks, organizations may require re-authentication of individuals and/or devices in other situations, including (but not limited to) the following circumstances:
(i) When authenticators change;
(ii) When roles change;
(iii) When security categories of information systems change;
(iv) When the execution of privileged functions occurs;
(v) After a fixed period of time; or
(vi) Periodically.
Within the DoD, the minimum circumstances requiring re-authentication are privilege escalation and role changes.
This requirement only applies to components where this is specific to the function of the device or has the concept of user authentication (e.g., VPN or ALG capability). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).
Solution
Configure 802.1X on the switch, using the following mandatory parameters for all applicable interfaces. Replace the bracketed variable with the applicable value.
config
interface Ethernet[X]
switchport access vlan [Y]
dot1x pae authenticator
dot1x reauthentication
dot1x port-control auto
dot1x host-mode single-host
dot1x timeout quiet-period [value]
dot1x timeout reauth-period 3600
dot1x max-reauth-req [value]
For the global configuration, include the following command statements from the global configuration mode interface:
logging level DOT1X informational
aaa authentication dot1x default group radius
dot1x system-auth-control
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Arista.
References
- 800-53|IA-11
- CAT|II
- CCI|CCI-002039
- Group-ID|V-60829
- Rule-ID|SV-75285r1_rule
- STIG-ID|AMLS-L2-000150
- Vuln-ID|V-60829