- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2615 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2494 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2504 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2508 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2502 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2569 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 7月 18, 2025
- 2457 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2507 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2527 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Ziqian XU
- Posted on 10月 21, 2021
- Updated on 10月 21, 2021
- 13753 Views
Support for AES GCM has been added as a method for storing symmetric secrets in EOS. This applies to secrets that must be
- Written by Himanshu Singh
- Posted on 4月 25, 2025
- Updated on 9月 11, 2025
- 4087 Views
Automatic certificate management provides support for retrieving signed x509v3 certificates from a server under the Enrollment over Secure Transport (EST) protocol, described in RFC 7030. The feature provides only EST client capabilities.
- Written by Leandro Penz
- Posted on 8月 21, 2020
- Updated on 8月 21, 2020
- 11389 Views
Dynamic CLI Access VLAN is a command that sets the effective access VLAN in a port without changing the running
- Written by Jeevan Kamisetty
- Posted on 8月 23, 2022
- Updated on 11月 30, 2023
- 14809 Views
NDR switch sensor aka “monitor security awake” feature provides deep network analysis by doing deep packet inspection of some or all packets of traffic that's forwarded by the switch.
- Written by Can Sun
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 4354 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Baptiste Covolato
- Posted on 4月 1, 2026
- Updated on 4月 1, 2026
- 178 Views
Systems with support for Arista secure boot protect against tampering of the BIOS firmware & Aboot by write-protecting the BIOS SPI flash before EOS is loaded (refer to the “Security model” section in the secure boot TOI for details). While effective at protecting against unauthorized changes made from EOS, such a mechanism has limitations. For example, it is ineffective at protecting against physical reprogramming of the contents of the BIOS SPI flash, tampering through privileged serial console access, undiscovered security vulnerabilities in BIOS upgrade mechanism, etc.
- Written by Aman Aman-Ul-Haq
- Posted on 3月 9, 2021
- Updated on 11月 4, 2025
- 16490 Views
The Segment security feature provides the convenience of applying policies on segments rather than interfaces or subnets. Hosts/networks are classified into segments based on prefixes. Grouping prefixes into segments allows for definition of policies that govern flow of traffic between segments. Policies define inter-segment or intra-segment communication rules, e.g. segment A can communicate with segment B but hosts in segment B can not communicate with each other.
- Written by Pedro Coutinho
- Posted on 8月 25, 2016
- Updated on 6月 11, 2019
- 13989 Views
This feature involves the use of packet’s Time to Live (TTL) (IPv4) or Hop Limit (IPv6) attributes to protect
- Written by Pedro Coutinho
- Posted on 6月 10, 2019
- Updated on 6月 11, 2019
- 13330 Views
This feature involves the use of packet’s Time to Live (TTL) (IPv4) or Hop Limit (IPv6) attributes to protect
- Written by Can Sun
- Posted on 8月 12, 2025
- Updated on 1月 20, 2026
- 2301 Views
Measured boot is a tamper-detection mechanism that records a system's boot process. It calculates cryptographic hashes of system components and configurations, which are then securely stored in the Platform Configuration Registers (PCRs) of a Trusted Platform Module (TPM) chip. This process creates a secure "hash chain" of the boot sequence. After the system starts, the TPM Quote operation, along with the PCR extension records, can be used to verify the PCR values, confirming that the system components are unchanged and the software is trusted.
- Written by Can Sun
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 4331 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, and the event is associated with a revision number to help the user identify changes to the event.
- Written by Thejesh Panchappa
- Posted on 12月 30, 2021
- Updated on 12月 30, 2021
- 12207 Views
Macro Segmentation Service with Layer 3 firewall (MSS FW) provides a mechanism to offload policy enforcement on TORs
- Written by Arup Raton Roy
- Posted on 9月 7, 2021
- Updated on 9月 21, 2021
- 12005 Views
Macro Segmentation Service with Layer 3 firewall (MSS FW) enforces all security policies bi directionally by
- Written by Ben May
- Posted on 2月 1, 2024
- Updated on 2月 1, 2024
- 7395 Views
This can be done with multiple groups today, as long as we have enough unique group entries in hardware. In the absence of this configuration ( default behavior ), bridged traffic will be assigned to the default VRF and policies of default VRF will be applied to bridged traffic. With this feature, bridged traffic is never subject to MSS-G configuration.
- Written by Can Sun
- Posted on 3月 2, 2026
- Updated on 3月 2, 2026
- 365 Views
Measured boot is a tamper-detection mechanism that records a system's boot process. It calculates cryptographic hashes of system components and configurations, which are then securely stored in the Platform Configuration Registers (PCRs) of a Trusted Platform Module (TPM) chip.
- Written by Radek Szymanski
- Posted on 10月 10, 2025
- Updated on 10月 10, 2025
- 1765 Views
EOS 4.35.0F introduces support for Network Time Security (NTS), as defined in RFC8915. NTS provides modern cryptographic security for the client-server mode of the Network Time Protocol (NTP). It separates key establishment from time synchronization by using a TLS-based NTS Key Establishment (NTS-KE) protocol to negotiate symmetric keys and encrypted cookies. These cookies are included in subsequent NTP packets to enable stateless authentication by the server. NTS ensures that time synchronization data is received from a legitimate source and has not been modified in transit.
- Written by Coy Humphrey
- Posted on 9月 15, 2020
- Updated on 6月 7, 2024
- 17143 Views
This TOI describes a set of enhancements made to the existing Port Security: Protect Mode (PortSec-Protect) feature. Please see the existing TOI for this feature here:Port Security: Protect Mode
- Written by Baptiste Covolato
- Posted on 6月 17, 2019
- Updated on 6月 27, 2025
- 14156 Views
Secure boot is a security feature available in Aboot (Arista bootloader) that verifies the cryptographic signature of the EOS SWI (software image) before it is booted. Aboot embeds certificates that allow it to recognize and validate official EOS releases from Arista. If the signature verification is successful, the secure boot check passes and Aboot proceeds to boot the SWI. If the signature verification fails, the boot is aborted.
- Written by Robert Hrusecky
- Posted on 9月 12, 2024
- Updated on 9月 12, 2024
- 5228 Views
Prior to 4.32.2F, the “reset system storage secure” CLI command can be used to perform a best-effort storage device wipe of all sensitive data. However, this command has the limitation that it wipes EOS from the storage device, leaving the system “stuck” in Aboot. The “reset system storage secure rollback” command provides the same secure erase functionality, but additionally allows the user to preserve a subset of files on the main flash device by copying them into RAM during the secure erase procedure. The set of files that are preserved is configurable. After a successful wipe, the system will return to EOS after the erase is complete if the EOS SWI image and adequate configuration files are preserved (such as boot-config and startup-config).
- Written by Eudean Sun
- Posted on 4月 30, 2025
- Updated on 4月 30, 2025
- 3024 Views
The Linux audit system provides the ability to record security events on the switch. Audit rules must be configured and enabled at the CLI. Audit rules can be configured in different groups to assist with organization and maintenance.
- Written by Michelle Wang
- Posted on 6月 8, 2020
- Updated on 7月 21, 2023
- 12386 Views
EOS provides a way to extend its capabilities through the installation of extensions. An extension is a pre packaged
- Written by Ronan Mac Fhlannchadha
- Posted on 10月 14, 2024
- Updated on 11月 11, 2024
- 4640 Views
This supports checking that the value of a given x509 certificate OID matches a user-provided value during the TLS handshake in OpenConfig. If the value does not match, no connection will be established.
- Written by Wenyi Cheng
- Posted on 4月 19, 2021
- Updated on 7月 19, 2023
- 13941 Views
This feature adds TLS support to the existing syslog logging mechanism. With the new added CLI commands, the user can
- Written by Baptiste Covolato
- Posted on 1月 13, 2026
- Updated on 1月 13, 2026
- 938 Views
Secure boot is a security feature available in Aboot (Arista bootloader) that verifies the cryptographic signature of the EOS SWI (software image) before it is booted. Aboot embeds certificates that allow it to recognize and validate official EOS releases from Arista. If the signature verification is successful, the secure boot check passes and Aboot proceeds to boot the SWI. If the signature verification fails, the boot is aborted.
- Written by Yuyang Chen
- Posted on 6月 15, 2021
- Updated on 6月 21, 2021
- 13563 Views
Port wide port security: Port security with address limit on the port configured by the existing shutdown mode port
- Written by Vivek Kumar
- Posted on 3月 2, 2026
- Updated on 3月 2, 2026
- 346 Views
The ZTX Session Table Archive feature provides local storage of historical session data on the appliance's SSD, enabling local forensic analysis and troubleshooting. This capability is essential for investigating security incidents, meeting compliance requirements, and analyzing traffic patterns that occurred hours or days in the past.
