STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide

V-217492

CAT II (Medium)

The Arista Multilayer Switch must be configured so inactive router interfaces are disabled.

Rule ID

SV-217492r382735_rule

STIG

Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-001414

Discussion

An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. Unauthorized personnel with access to the communication facility could gain access to a router by connecting to a configured interface that is not in use.

Check Content

Verify inactive interfaces on the router are disabled by executing a "show interface status" command and confirming the line "disabled" is present on any interface where the interface is inactive.

If there are any inactive interfaces enabled on the router, this is a finding.

Fix Text

Remove subinterfaces and disable any inactive ports on the router via the "shutdown" command on the interface configuration mode.