Hardware Guides
These hardware guides are for the Pluribus Networks Freedom Series set of switches. You can find Dell EMC hardware guides here and Edgecore hardware guides here.
Quick Start Guide | |
---|---|
F9460-T Quick Start Guide | . |
F9432-C Quick Start Guide | . |
F9480-V Quick Start Guide | . |
F9460-X Quick Start Guide | . |
F9372-X Quick Start Guide | . |
F9532L-C Quick Start Guide | . |
F9572L-V Quick Start Guide | . |
F9664-C Quick Start Guide | . |
Transceiver Compatibility Information
These compatibility reference guides indicate which transceivers have been tested and qualified with the respective hardware platforms that run Netvisor ONE OS: Freedom Series, Edgecore and Dell EMC Open Networking Switches.
Reference Guide | HTML | |
---|---|---|
Transceiver Compatibility Matrix for Freedom and Edgecore Switches | . | . |
Transceiver Compatibility Matrix for Dell Switches | . | . |
Pluribus Networks Technical Documentation
This page contains online documentation for Pluribus Networks products now: Arista NetVisor OS, Arista NetVisor UNUM, and Insight Analytics™ releases. To access documentation for earlier software versions or products not listed, log in to the Customer Portal.
Arista NetVisor UNUM Documentation | Version 6.3.3 > |
---|---|
Arista NetVisor OS Documentation | Version 7.0.2 > Version 6.1.1 > Version 5.2.1 > |
Hardware Guides | Hardware Guides > |
Transceiver Compatibility Information | Transceiver Compatibility Information > |
Arista NetVisor UNUM Management Platform and Insight Analytics Technical Documentation
Arista NetVisor UNUM is an agile, multi-functional web management portal that enhances the intrinsic automation of the Unified Cloud Fabric architecture. It combines an elastic big data database and intelligent analytics engine with an intuitive and consistent user interface that allows seamless navigation across fully integrated management and analysis modules.
Arista NetVisor UNUM 6.3.3 Software
Reference Material | HTML | |
---|---|---|
NetVisor UNUM 6.3.3 Setup and User Guide Step-by-step details on installing NetVisor UNUM and configuring Insight Analytics. |
. | – |
NetVisor UNUM 6.3.3 Appliance User Guides The User Guides provide comprehensive information about installing your NetVisor UNUM appliances. |
||
NetVisor UNUM High Capacity User Guide | . | . |
NetVisor UNUM Medium Capacity User Guide | . | . |
NetVisor UNUM 6.3.3 Release Notes |
Arista NetVisor OS Technical Documentation
Arista NetVisor OS 7.0.2 Software is downloaded to your open networking switch and then enabled with license keys. The documents below will help you install and operate the NetVisor OS.
Arista NetVisor OS 7.0.2 Software
Reference Material | HTML | |
---|---|---|
NetVisor OS 7.0.2 Installation and Software Setup Guide Step-by-step details for installing Netvisor OS on an open networking switch and preparing the device for configuration, provisioning and production use. |
. | . |
NetVisor OS Installation and Software Setup Guide for Dell Z9432F-ON Platforms | – | . |
Configuration Guide 7.0.2 provides information about configuring NetVisor OS, including ports, VLANs, vRouters and vFlows. |
. | . |
Command Reference 7.0.2 The Command Reference provides an encyclopedia of all commands, A-Z, in the NetVisor OS CLI. |
. | . |
NetVisor OS Log Messages Guide 7.0.2 The NetVisor OS Log Messages Guide provides information about all messages, systems, events and audits, with severity levels, in PDF and HTML format. |
. | . |
NetVisor OS Troubleshooting Guide 7.0.2 Provides simple steps to perform troubleshooting for NetVisor OS. |
. | – |
NetVisor OS OpenStack ML2 Plugin Deployment Guide 7.0.2 The OpenStack ML2 Plugin Deployment Guide explains how to install the NetVisor OS ML2 plugin into an OpenStack environment and use it to configure layer 2 networks in the Unified Cloud Fabric. |
. | . |
NetVisor OS Virtual Netvisor Deployment Guide 7.0.2 Provides simple steps to deploying Netvisor OS virtual configuration on a network. |
. | . |
Complete NetVisor OS RESTful API Guide 7.0.2 Provides a complete listing of all RESTful APIs in NetVisor OS software. |
. | . |
NetVisor OS Release Notes 7.0.2 |
Netvisor ONE 6.1.1 Software
Reference Material | HTML | |
---|---|---|
Getting Started Guide 6.1.1 Step-by-step details for installing Netvisor ONE on an open networking switch and preparing the device for configuration, provisioning and production use. |
. | . |
Configuration Guide 6.1.1 The Configuration Guide provides information about configuring Netvisor ONE, including ports, VLANs, vRouters and vFlows. |
. | . |
Command Reference 6.1.1 The Command References provide an encyclopedia of all commands, A-Z, in the Netvisor ONE CLI |
. | . |
Netvisor ONE Log Messages Guide 6.1.1 The Netvisor ONE Log Messages Guide provides information about all messages, systems, events and audits, with severity levels, in PDF and HTML format. |
. | . |
Troubleshooting Guide 6.1.1 Provides simple steps to perform troubleshooting for Netvisor ONE OS. |
. | – |
Pluribus OpenStack ML2 Plugin Deployment Guide 6.1.1 The OpenStack ML2 Plugin Deployment Guide explains how to install the Pluribus ML2 plugin into an OpenStack environment and use it to configure layer 2 networks in the Adaptive Cloud Fabric. |
. | . |
Virtual Netvisor Deployment Guide 6.1.1 Provides simple steps to deploying Netvisor ONE virtual configuration on a network. |
. | . |
Complete RESTful API Guide 6.1.1 Provides a complete listing of all RESTful APIs in Netvisor ONE software. |
. | . |
Netvisor ONE Release Notes 6.1.1 |
Netvisor ONE 5.2.1 Software
Reference Material | HTML | |
---|---|---|
Getting Started Guide 5.2.1 Step-by-step details for installing Netvisor ONE on an open networking switch and preparing the device for configuration, provisioning and production use. |
. | . |
Configuration Guide 5.2.1 The Configuration Guide provides information about configuring Netvisor ONE, including ports, VLANs, vRouters and vFlows. |
. | . |
Command Reference 5.2.1 (A-O) The Command References provide an encyclopedia of all commands, A-O in the Netvisor ONE CLI. |
. | . |
Command Reference 5.2.1 (P-Z) The Command References provide an encyclopedia of all commands, P-Z in the Netvisor ONE CLI. |
. | . |
Netvisor ONE Log Messages Guide 5.2.1 The Netvisor ONE Log Messages Guide provides information about all messages, systems, events and audits, with severity levels, in PDF and HTML format. |
. | . |
Troubleshooting and Data Collection Guide 5.2.1 Provides simple steps to perform troubleshooting for Netvisor ONE OS. |
– | . |
Pluribus OpenStack ML2 Plugin Deployment Guide 5.2.1 The OpenStack ML2 Plugin Deployment Guide explains how to install the Pluribus ML2 plugin into an OpenStack environment and use it to configure layer 2 networks in the Adaptive Cloud Fabric. |
. | . |
Virtual Netvisor Deployment Guide 5.2.1 Provides simple steps to deploying Netvisor ONE virtual configuration on a network. |
. | . |
Complete RESTful API Guide 5.2.1 Provides a complete listing of all RESTful APIs in Netvisor ONE software. |
. | . |
Netvisor ONE Release Notes 5.2.1 |
The following material provides practical advice to assist in the safe and smooth installation of Arista 7800 Series devices. It should be followed in parallel with the 7800 Quick Start Guide and Safety and Compliance Guide.
It is strongly recommended that all material is reviewed and that all instructions are closely followed to avoid unnecessary damage which will impact installation schedules and system availability.
Offline Installation Training Materials
Using the PDF viewer toolbar, click the "Save / Download" icon to download PDF training materials. For videos, right-click inside the player and choose "Save Video As / Download Video As" from the menu or you can download the full . 7800 Installation training materials.
- .78-0101-02 7800 Series Installation - Recommended Tools and Equipment
- .78-0102-02 7800 Series Unpacking and Rack Mounting 7804_7808 Systems
- .78-0103-00 7800 Series Unpacking and Rack Mounting 7812
- .78-0104-00 7800 Series Unpacking and Rack Mounting 7816
- .78-0105-00 7800 Series Unpacking and Rack Mounting 7816L
- .78-0106-00 Reseating 7800 Fabric Modules
- .78-0107-01 7816 De-palletizing and Transporting by Forklift
Portions of Arista Networks software are covered by open-source licenses including the GNU General Public License . Please find below the list of source files:
- Wi-Fi WM 18.0.0
- .Wi-Fi AP 18.0.0 176 Source
- .Wi-Fi AP 18.0.0 176 Licenses
- .Wi-Fi WM 18.0.0 176 Source
- Wi-Fi WM 17.1.0
- .Wi-Fi AP 17.1.0 57 Source
- .Wi-Fi AP 17.1.0 57 Licenses
- .Wi-Fi WM 17.1.0 57 Source
- Wi-Fi WM 17.0.0
- .Wi-Fi AP 17.0.0 236 Source
- .Wi-Fi AP 17.0.0 236 Licenses
- .Wi-Fi WM 17.0.0 236 Source
- Wi-Fi WM 16.1.0
- .Wi-Fi AP 16.1.0 51 Source
- .Wi-Fi AP 16.1.0 51 Licenses
- .Wi-Fi WM 16.1.0 51 Source
- Wi-Fi WM 16.0.0
- .Wi-Fi AP 16.0.0 214 Source
- .Wi-Fi AP 16.0.0 214 Licenses
- .Wi-Fi WM 16.0.0 214 Source
- Wi-Fi WM 15.0.1
- .Wi-Fi AP 15.0.1 22 Source
- .Wi-Fi AP 15.0.1 22 Licenses
- .Wi-Fi WM 15.0.1 22 Source
- Wi-Fi WM 15.0.0
- .Wi-Fi AP 15.0.0 114 Source
- .Wi-Fi AP 15.0.0 114 Licenses
- .Wi-Fi WM 15.0.0 114 Source
- Wi-Fi WM 14.0.0
- .Wi-Fi WM 14.0.0 35 Source
- Wi-Fi WM 13.0.2
- .Wi-Fi AP 13.0.2 28 Source
- .Wi-Fi AP 13.0.2 28 Licenses
- Wi-Fi WM 13.0.1
- .Wi-Fi AP 13.0.1 83 Source
- .Wi-Fi AP 13.0.1 83 Licenses
- .Wi-Fi WM 13.0.1 83 Source
- Wi-Fi WM 13.0.0
- .Wi-Fi AP 13.0.0 67 Source
- .Wi-Fi AP 13.0.0 67 Licenses
- .Wi-Fi WM 13.0.0 67 Source
- Wi-Fi WM 12.0.1
- .Wi-Fi AP 12.0.1 48 Source
- .Wi-Fi AP 12.0.1 48 Licenses
- .Wi-Fi WM 12.0.1 48 Source
- Wi-Fi WM 12.0.0
- .Wi-Fi AP 12.0.0 162 Source
- .Wi-Fi AP 12.0.0 162 Licenses
- .Wi-Fi WM 12.0.0 162 Source
PURPOSE
The purpose of this Anti-Counterfeit Policy (this “Policy”) is to define actions to be taken by Arista Networks (“Arista”) for the avoidance of the introduction of counterfeit materials into the supply chain for its finished products. This Policy also addresses measures that are taken to avoid the sale of counterfeit Arista products into the marketplace.
SCOPE
This Policy covers items acquired by Arista either directly or through its contract manufacturers. It applies to the parts and components that comprise Arista’s end-products.
STATEMENT OF POLICY
Arista will not knowingly, and shall take all reasonable steps to ensure that it will not, procure, use, or supply any counterfeit item or material. Arista shall implement certain procedures as detailed below to manage the risk of counterfeit material in the supply chain. All Arista staff shall follow this Policy and associated anti-counterfeit management plans and promote awareness of the issues concerning counterfeit material in Arista’s supply chain.
ARRANGEMENTS FOR MANAGEMENT OF RISK
Arista shall mitigate the risk of acquiring counterfeit material by undertaking the following steps:
Approved Supplier List - Arista provides its contract manufacturers with a list of preferred suppliers that it has prescreened for quality and security purposes (the “Approved Supplier List”) and requires its contract manufactured to purchase all parts and components from vendors on this list.
Assessment – of likelihood and criticality of encountering counterfeit materiel in the supply chain for a particular product, part, or application; taking into account the criticality of the material in relation to performance and safety and the geo-political region from which it is sourced.
Avoidance – through application of Arista’s supplier selection process and Approved Supplier List, Arista will only acquire products and services from known, reputable and traceable sources. The business policy is to purchase directly from the original manufacturer whenever possible and to flow down the requirement to manage counterfeit material where risk is identified.
Certification – by requiring our contract manufacturers to certify on a regular basis that all purchases of parts, components and testing equipment is only from vendors on Arista’s Approved Supplier List.
Detection – by inspection of goods and materials, any new or potentially risk-bearing suppliers will have their supplied goods inspected. In addition, all goods inwards staff and technicians will be required to be vigilant for counterfeit material using their experience, training and awareness.
Elimination – any instances of counterfeit material will result in quarantine of the items and reporting of detected instances to the customer, industry, and the appropriate authorities. Counterfeit material will not be returned to the supplier. Instances of counterfeit material detection shall be communicated to the intellectual property right holder as known, the supplier, the customer if in receipt, relevant organizations, relevant authorities, including the Trading Standards Office if the occurrence is in the UK.
Testing - by requiring Arista’s contract manufacturers to test and verify suspected counterfeit material on a case-by-case basis commensurate with risk and criticality in relation to safety and performance and report all instances of counterfeit materials to Arista.
ROLES & RESPONSIBILITIES
This Policy will be maintained by Arista’s Vice President of Manufacturing or such other person as Arista’s Chief Executive Officer may designate from time to time (“VPM”). The VPM shall ensure that the Policy is available, communicated, understood, and implemented by relevant staff members. The VPM has the responsibility and authority to ensure that the necessary measures required to manage the risk of counterfeit material in the supply chain are implemented and maintained by the company.
Any Arista Employee that becomes suspicious or aware of counterfeit parts or materials in the supply chain should report any concerns to the VPM and to Arista’s vendor quality alias (이 이메일 주소가 스팸봇으로부터 보호됩니다. 확인하려면 자바스크립트 활성화가 필요합니다.). Reports are tracked through Arista’s Line Alert Process (DOC-00553-01).
Arista’s contract manufacturers must test and verify suspected counterfeit material on a case-by-case basis commensurate with risk and criticality in relation to safety and performance. All instances of counterfeit materials must be reported to Arista.
COMPETENCE, TRAINING, AWARENESS & COMMUNICATION
All staff that are involved in the procurement, design or manufacturing process shall receive Anti Counterfeit Training that include this Policy and its implications for Arista. The training shall be compulsory and records of training shall be maintained. This Policy shall be available to all staff through publication on the Arista Intranet. This Policy shall be made available to third parties on request and published on the Company website (https://www.arista.com/en/support/product-documentation/policies)
ARISTA BRAND PROTECTION
Arista takes measures to avoid the misrepresentation of its material by others. These measures include, among other things:
- Arista applies unique serial numbers on all manufactured products.
- Arista utilizes unique trusted platform module (TPM) chips to deter counterfeiting of select hardware products.
- Arista actively enforces its registered trademarks against manufacturers and suppliers of counterfeit materials.
- Arista controls production, packaging, and documentation to avoid misrepresentation of its products in the supply chain.
- Arista controls the production processes to prevent the misappropriation of material or unauthorized production overruns
- Arista’s channel agreements strictly prohibit the sale or distribution of counterfeit Arista products by our partners.
APPENDIX A: Standards Referenced In This Policy
- Defense Standard 05-135 Avoidance of Counterfeit Materiel
Introduction
Arista modular platforms such as the 750, 7300, 7500 and 7800 families support mixed generations of line cards, fabric cards, supervisors and power supplies (referred to in this document as “modules”). A-Care is applied to the entire chassis, rather than specific modules within the chassis. This can lead to inadequate support coverage and deployed devices that contain components that are End of Support.
This document explains how to update A-Care coverage through the lifecycle of a modular platform that includes mixed generations of modules.
A-Care Entitlement Policy for Modular Products
The level of support for a modular platform is defined by the generation of the switch fabric or switch card and therefore A-Care coverage must be updated to reflect the correct switch fabric or switch card as part of the next renewal. Line cards, supervisor modules and power supplies are not considered when choosing the correct level of A-Care for a modular system.
For example, a 7500 series product with E series switch fabrics requires A-Care coverage for E series systems while the same 7500 series product with R3 series switch fabrics requires A-Care coverage for R3 systems.
If, in month 30 of a 36 month A-Care term, a 7500E is updated with R3 series switch fabric cards and therefore becomes an R3 series system, the existing A-Care coverage will remain valid until the A-Care renewal date but future A-Care coverage must be changed to the R3 coverage level instead of E series A-Care plans.
Documenting Component Upgrades to Ensure RMA Support
Although A-Care coverage may continue, when changes are made to the installed base, up to date records must be provided to Arista TAC to ensure continuity of RMA coverage in the correct geographical locations for the newly upgraded systems.
End of Sale Components Are Not Supported
In a modular platform, it is possible that a system could contain both supported and End of Support components (for example a mixture of line cards from different generations). The purchased A-Care contract will provide coverage for all components except those that are End of Support.
v1.1 Updated January, 2021
This Policy Covers:
- MOS (Metamako Operating System)
- Supported 7130 Applications:
- SwitchApp
- MetaWatch
- MetaMux
- MultiAccess
- MetaProtect
- ExchangeApp
- JTAG App
Policy:
Arista Networks' MOS and 7130 Apps Software Release Policy and Life Cycle guidelines help customers and partners facilitate MOS migration and plan multi-year infrastructure deployment. Arista will support designated LTS (Long term support) MOS and 7130 application software releases for up to 24 months from the date of the first posting of the initial minor release. (See below for definition of minor release)
To assist customers in selecting the right software releases for their environments, Arista follows a strict policy as to when new features are introduced into versions of MOS and applications. The versioning scheme identifies if a particular release is integrating new feature functionality, or a maintenance release on the previously released version.
The version numbers are defined by X.Y.Z[{alpha|beta}A]. X is the major release number, Y is the minor release number, Z is the patch release number. The alpha/beta tag identifies development releases which should not be deployed to production environments.
New minor releases -- i.e. where Z is 0 -- contain new functionality. New patch releases -- i.e. where Z is non-zero -- are maintenance releases.
Examples:
- mos-0.26.0 -- A new minor release. Contains new functionality compared with previous versions.
- mos-0.26.1 -- A new patch release. Only contains conservative bug fixes, compared with 0.26.0.
- mos-0.27.0beta1 -- A new development release. Do not use this in production environments.
Bug fixes are introduced using patch releases -- i.e. an upgrade to the latest patch release for the minor release number will be required to receive new bugfixes for that train.
Development releases (alpha/beta) carry no support commitment, though feedback is always welcomed.
Arista applications use the same versioning scheme as MOS. For example:
- metamux-3.5.6
Certain minor releases may be designated as "LTS" (Long Term Support). These will be supported with patch releases for 24 months following initial release of the .0 image. The LTS status of releases will be indicated in the release's description on the 7130 software downloads site. Releases other than LTS releases have no specific support timeline.
TAC support will be available on all versions of MOS and apps for 30 months following release.
If you need assistance with MOS or 7130 application software migration options, please contact your Arista sales representative or contact us at 이 이메일 주소가 스팸봇으로부터 보호됩니다. 확인하려면 자바스크립트 활성화가 필요합니다.
Overview
An organization's communications infrastructure and the tools that support that infrastructure are critical to the business' ability to function. That same importance also makes the infrastructure a high value target for malicious actors seeking to gain entry deeper into the organization or to exfiltrate sensitive intellectual property.
Arista Networks sees its role in security as a continuous process that begins at manufacturing and continues throughout the lifecycle of the product as vulnerabilities are detected, mitigated, and remediated.
The following document is intended to cover Arista's vulnerability management process. This process is broken down into four primary components: design choices for vulnerability avoidance, vulnerability detection, vulnerability communication, and security assessment testing.
Product security must also be complemented through best practice configuration during the installation and operation of the infrastructure. Arista provides regularly updated hardening guides and security recommendations through living documents available via EOS Central.
Design Choices
-
Safe Choices in Design and Runtime
-
Arista's product family encompasses a variety of software products including EOS, DANZ Monitoring Fabric (DMF), CloudVision (CV) and CloudVision Wi-Fi (CV Wi-Fi), each of which is designed with safe execution in mind. As a result, many types of common programming issues are caught during development or not able to occur due to the frameworks and policies in use.
The following list provides some examples of fundamental design choices that form part of Arista's software design process:
- Safe language choices ensure mitigation against common flaws such as buffer overflows, protection against access of uninitialised data and other memory management issues.
- Use of highly audited libraries where necessary (e.g. common security protocols).
- Prevention of resource leakage using safe memory operations, bounds checking, reference counting and Valgrind analysis.
- Pipelined execution models organised around single threaded functions to avoid race conditions and deadlocks.
- Strong input sanitization for internal and external APIs to prevent malformed data injection.
- Memory-safe virtual machines and Containerized execution to provide process separation and abstraction from the underlying OS.
- Principle of least privilege to limit the permissions given to processes and users, avoiding malicious escalation.
-
Both the design of new Arista features and maintenance of existing features are done with security as a goal.
-
Engineers are provided training on secure coding practices and how to implement them in their code. By having a series of guidelines and examples engineers can create features that are designed to be secure from the start and can recognize previously written insecure designs.
-
The usage of security critical open source libraries is limited to a few well understood libraries. This serves to limit the surface of attack as well as make analyzing the usage of said libraries in the codebase easier.
-
Awareness and review of common attack vectors and the associated mitigations is an important part of security at Arista. The PSIRT team makes sure to stay aware of common patterns in insecure code and how to detect them. Information on rising trends is integrated into the training as well as company wide announcements. By making sure to keep a dialogue open within the company on security, engineers on all teams are able to keep secure coding principles in mind when writing code.
-
-
Vulnerability Detection
This section describes examples of the tools, processes and testing procedures Arista undertakes to ensure awareness of emerging vulnerabilities:
-
Vulnerability Detection
-
CVE Scanner is an Arista automated process that searches for publicly disclosed vulnerabilities in the open source packages used in EOS(™), CloudVision(™) Portal, Danz Monitoring Fabric(™) and CloudVision(™) Wireless. It works by automatically downloading the database of known issues from the National Vulnerability Database and then cross-checking the version for each vulnerability against the versions of shipped code in all releases that have not yet reached end-of-life. Upon identifying a match for a vulnerability, a new bug is automatically filed and an engineer will investigate the potential problem. This automated process provides Arista with the ability to quickly uncover potential security vulnerabilities disclosed in the public domain.
-
Arista also keeps open lines of communication with its third-party vendors that provide software and hardware solutions to Arista products. In the event that a security issue is found with the 3rd party vendors product they are encouraged to reach out to Arista's PSIRT team and discuss the issue. Arista will treat these issues in the same manner as any other security issue discovered.
-
Arista PSIRT engineers conduct ongoing, detailed, security reviews of the Arista written code base to check for potential vulnerabilities and issues. Special attention is paid to areas of code believed to be at higher risk, such as those that parse user input or handle external packets.
-
Any potential security issue identified is reviewed for severity and potential impact. As part of this internal issues are scored using CVSSv3 scoring. If the usage of a publicly disclosed piece of vulnerable software differs significantly from the original reported usage, Arista may re-report the score with regards to how vulnerable Arista products are.
-
-
Security Assessment Testing
- Arista performs regular internal security assessment testing on our software products. These internal tests are done for every major software release (multiple releases per year). Examples of internal security test cases are included below.
- The findings of these tests are reviewed to find ways in which to improve or harden our software.
-
Example test cases include, but are not limited to:
- External host fingerprinting for display of compromising information.
- Automated vulnerability scanning for checking installed software against known CVEs.
- Validation of automated scanning results by an Arista engineer who specializes in security.
- Attempt Proof-of-Concept exploitation against running host, for vulnerabilities with documented ability to do so.
- Internal host configuration review including the boot loader, kernel (hardware drivers, modules, patches, etc), ipv4 and ipv6 stack and other services running on the host.
- Use of open-source tools such as nmap and gcov to ensure thorough coverage and understanding of the code deployed.
- Testing to standards defined by the DoD DISA STIG configuration and best practices. Arista uses the DoD DISA standards as our baseline for secure computing since they provide a high level for initial entry and cover threats one would expect to find in a datacenter.
Vulnerability Avoidance/Mitigation
While many vulnerabilities are mitigated by implementing best practices, Arista also provides rapid response via advice and hotfixes as detailed below:
-
Publication of Best Practises
- Review of product software architecture and design documentation, with a focus on external attack vectors, to identify design flaws from a security perspective.
- Regular review of best practices for securing and hardening Arista products to ensure the security of the network. Best practices maintained in the Arista's Hardening Guides, which are living documents stored here: Hardening and Security
-
Vulnerability Mitigation on Running Systems
-
In the event of a vulnerability that affects Arista products, Arista is oftentimes able to provide a hotfix to mitigate the issue. This is an extension that can be installed on a running system and will fix the problem with a minimum of downtime. While not all fixes are available as a hotfix, here is an example of how this hotfix scenario could look:
- The SSH Server is found to be vulnerable to a publicly disclosed CVE.
- Arista creates a hotfix to resolve the problem.
- The hotfix is installed on a switch, the SSH server goes down for approximately 1 second while it is restarted. No other services on the switch are affected.
- The fix is in place and can persist across reboots of the switch until a newer image with the fix integrated can be loaded.
-
Vulnerability Communication
New vulnerabilities are made available as soon as possible via well known mechanisms:
-
If the issue impacts Arista products, an appropriate solution or set of solutions to the problem will be provided. The solutions can include a recommended configuration change, software patch, new software image, or other procedures that are appropriate to mitigate or fix the vulnerability.
-
Details of the security vulnerability and associated solutions are then documented publicly via a security advisory on the Arista website which can be accessed pro-actively as an RSS feed
-
Customers deploying CloudVision benefit from automated alerting via the Compliance Dashboard. CloudVision is able to warn customers of both bugs and security vulnerabilities to help ensure the environment is kept secure.
-
Arista Networks follows best practices when it comes to making CVEs findable as well. All security issues have CVEs assigned by MITRE so that issues can be efficiently tracked across security scanners, advisories, and all other forms of security issue management procedures.
Summary
Arista goes to great lengths to ensure the ongoing security of its products and rapid mitigation of emerging threats, following industry best practices and leveraging close relationships with suppliers.
The effectiveness of these robust processes is demonstrated by extremely limited exposure to common security issues as well as rapid and usually impact-free solutions for remediation.
Arista customers following our recommended hardening steps can be confident that they have deployed the industry's leading secure networking solutions.
Subcategories
Field Notices
Field Notices
This page aggregates the Arista hardware and software product field notices. For further information on Arista’s hardware and software support policies, please see product documentation.
Security Advisories
Security Advisories
Arista Networks is committed to maintaining the highest standards of security across our product portfolio. Leveraging extensive testing and monitoring of vulnerabilities to isolate and neutralize threats early, Arista's Product Security Incident Response Team (PSIRT) provides global coverage for public reporting of possible security vulnerabilities across the product portfolio.
The PSIRT team monitors industry-wide vulnerability reporting as well as providing a single point of contact for customers and interested third parties to investigate and identify potential threats. The PSIRT team also works to communicate these issues back to the user community in a timely manner.
Arista's approach to vulnerability management and links to best practice guidelines can be found here.
For technical assistance with workarounds and hotfix installations recommended in security advisories, please contact the Arista Support team at 이 이메일 주소가 스팸봇으로부터 보호됩니다. 확인하려면 자바스크립트 활성화가 필요합니다..
Report security vulnerabilities found in Arista products to the PSIRT team via 이 이메일 주소가 스팸봇으로부터 보호됩니다. 확인하려면 자바스크립트 활성화가 필요합니다.. It is recommended to use Arista's PGP key for secure and private communication directly with the PSIRT team.
Arista PSIRT is happy to work with researchers on discovered vulnerabilities in Arista products, the assignment of CVEs, and timelines for responsible disclosure. If a researcher discovers a new vulnerability they will be acknowledged in the advisory related to the vulnerability. Arista PSIRT is interested in receiving reports on issues affecting features in both Arista code as well as Open Source Software used in Arista products. Security issues found in Open Source Software which do not affect Arista products are out of the scope of Arista and should be referred to the appropriate CNA found here.
PSIRT Advisories
The following advisories and referenced materials are provided on an "as is" basis for use at your own risk. Arista Networks reserves the right to change or update the advisories without notice at any time.
End of Sale
End of Sale
This page aggregates hardware end of sale notices. Arista offers a five year end of sales lifecycle for most products. Selected products and legacy systems have a three year lifecycle. For further information on Arista’s hardware support policies see the Three Year End of Life Policy or Five Year End of Life Policy. Detailed product policy information may be found here.
The Product Lifecycle Tool can be used to find detailed information about Arista products.
End of Software Support
End of Software Support
This page aggregates end of software support notices. Detailed information on the lifecycle of each software component may be found here.
The Product Lifecycle Tool can be used to find detailed information about Arista products.