U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Arista Multilayer Switch (MLS) DCS-7000 Series Y24M07 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Arista Multilayer Switch (MLS) DCS-7050T cpe:/h:cisco:content_services_switch (View CVEs)

Checklist Highlights

Checklist Name:
Arista Multilayer Switch (MLS) DCS-7000 Series
Checklist ID:
672
Version:
Y24M07
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/22/2016

Checklist Summary:

The Arista Multilayer Switch (MLS) DCS-7000 Series Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to Arista MLS DCS-7000 Series devices. The Arista MLS DCS-7000 Series STIG is a package of three (3) STIGs for configuring Arista MLS DCS-7000 Series devices according to the configuration and purpose of the device. The following are the three STIGs included as part of the Arista MLS DCS-7000 Series STIG package: ? Arista MLS DCS-7000 Series Network Device Management (NDM) STIG ? Arista MLS DCS-7000 Series Layer 2 Switch (L2S) STIG ? Arista MLS DCS-7000 Series Router (RTR) STIG

Checklist Role:

  • Ethernet LAN Switch

Known Issues:

Not Provided

Target Audience:

Not Provided

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not Provided

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01 requires that “all IT that receives, processes, stores, displays, or transmits DoD information will be […] configured […] consistent with applicable DoD cybersecurity policies, standards, and architectures” and tasks that Defense Information Systems Agency (DISA) “develops and maintains control correlation identifiers (CCIs), security requirements guides (SRGs), security technical implementation guides (STIGs), and mobile code risk categories and usage guides that implement and are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures, with the support of the NSA/CSS, using input from stakeholders, and using automation whenever possible.” This document is provided under the authority of DoDI 8500.01. Although the use of the principles and guidelines in these SRGs/STIGs provides an environment that contributes to the security requirements of DoD systems, applicable NIST SP 800-53 cybersecurity controls need to be applied to all systems and architectures based on the Committee on National Security Systems (CNSS) Instruction (CNSSI) 1253.

Comments/Warnings/Miscellaneous:

Not Provided

Disclaimer:

Not Provided

Product Support:

It should be noted that FSO Support for the STIGs, Checklists, and Tools is only available to DOD Customers.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not Provided

Licensing:

Not Provided

Change History:

moved to FINAL - 6/7/2016
corrected authority 5/18/2017
Updated URL to reflect change to the DISA website - http --> https
Correct Checklist Authority - 10/29/18
corrected authority - 11/01/18
Corrected Authority - 11/02/18
Corrected Authority - 11/06/18
updated to  Ver 1, Rel 3 - 1/22/19
Updated to FINAL - 2/19/19
Updated URLs - 6/5/19
updated URLs - 11/1/19
updated URLs - 8/3/2020
Updated Version, Resources, SHA and Status - 08/08/2024

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 08/08/2024