2025-02-05 11:32:35 +01:00
|
|
|
---
|
|
|
|
anta.tests.aaa:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyAcctConsoleMethods:
|
|
|
|
# Verifies the AAA accounting console method lists for different accounting types (system, exec, commands, dot1x).
|
2025-02-05 11:32:35 +01:00
|
|
|
methods:
|
|
|
|
- local
|
|
|
|
- none
|
|
|
|
- logging
|
|
|
|
types:
|
2025-02-05 11:55:22 +01:00
|
|
|
- system
|
|
|
|
- exec
|
|
|
|
- commands
|
2025-02-05 11:32:35 +01:00
|
|
|
- dot1x
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyAcctDefaultMethods:
|
|
|
|
# Verifies the AAA accounting default method lists for different accounting types (system, exec, commands, dot1x).
|
2025-02-05 11:32:35 +01:00
|
|
|
methods:
|
|
|
|
- local
|
|
|
|
- none
|
|
|
|
- logging
|
|
|
|
types:
|
2025-02-05 11:55:22 +01:00
|
|
|
- system
|
2025-02-05 11:32:35 +01:00
|
|
|
- exec
|
2025-02-05 11:55:22 +01:00
|
|
|
- commands
|
|
|
|
- dot1x
|
|
|
|
- VerifyAuthenMethods:
|
|
|
|
# Verifies the AAA authentication method lists for different authentication types (login, enable, dot1x).
|
2025-02-05 11:32:35 +01:00
|
|
|
methods:
|
|
|
|
- local
|
|
|
|
- none
|
|
|
|
- logging
|
|
|
|
types:
|
2025-02-05 11:55:22 +01:00
|
|
|
- login
|
|
|
|
- enable
|
2025-02-05 11:32:35 +01:00
|
|
|
- dot1x
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyAuthzMethods:
|
|
|
|
# Verifies the AAA authorization method lists for different authorization types (commands, exec).
|
2025-02-05 11:32:35 +01:00
|
|
|
methods:
|
|
|
|
- local
|
|
|
|
- none
|
|
|
|
- logging
|
|
|
|
types:
|
|
|
|
- commands
|
2025-02-05 11:55:22 +01:00
|
|
|
- exec
|
|
|
|
- VerifyTacacsServerGroups:
|
|
|
|
# Verifies if the provided TACACS server group(s) are configured.
|
|
|
|
groups:
|
|
|
|
- TACACS-GROUP1
|
|
|
|
- TACACS-GROUP2
|
|
|
|
- VerifyTacacsServers:
|
|
|
|
# Verifies TACACS servers are configured for a specified VRF.
|
|
|
|
servers:
|
|
|
|
- 10.10.10.21
|
|
|
|
- 10.10.10.22
|
|
|
|
vrf: MGMT
|
|
|
|
- VerifyTacacsSourceIntf:
|
|
|
|
# Verifies TACACS source-interface for a specified VRF.
|
|
|
|
intf: Management0
|
|
|
|
vrf: MGMT
|
2025-02-05 11:39:50 +01:00
|
|
|
anta.tests.avt:
|
|
|
|
- VerifyAVTPathHealth:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the status of all AVT paths for all VRFs.
|
|
|
|
- VerifyAVTRole:
|
|
|
|
# Verifies the AVT role of a device.
|
|
|
|
role: edge
|
2025-02-05 11:39:50 +01:00
|
|
|
- VerifyAVTSpecificPath:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the Adaptive Virtual Topology (AVT) path.
|
2025-02-05 11:39:50 +01:00
|
|
|
avt_paths:
|
|
|
|
- avt_name: CONTROL-PLANE-PROFILE
|
|
|
|
vrf: default
|
|
|
|
destination: 10.101.255.2
|
|
|
|
next_hop: 10.101.255.1
|
|
|
|
path_type: direct
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.bfd:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBFDPeersHealth:
|
|
|
|
# Verifies the health of IPv4 BFD peers across all VRFs.
|
|
|
|
down_threshold: 2
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyBFDPeersIntervals:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the timers of IPv4 BFD peer sessions.
|
2025-02-05 11:32:35 +01:00
|
|
|
bfd_peers:
|
|
|
|
- peer_address: 192.0.255.8
|
|
|
|
vrf: default
|
|
|
|
tx_interval: 1200
|
|
|
|
rx_interval: 1200
|
|
|
|
multiplier: 3
|
|
|
|
- peer_address: 192.0.255.7
|
|
|
|
vrf: default
|
|
|
|
tx_interval: 1200
|
|
|
|
rx_interval: 1200
|
|
|
|
multiplier: 3
|
2025-03-17 07:33:51 +01:00
|
|
|
detection_time: 3600
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifyBFDPeersRegProtocols:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the registered routing protocol of IPv4 BFD peer sessions.
|
2025-02-05 11:54:55 +01:00
|
|
|
bfd_peers:
|
2025-02-05 11:55:22 +01:00
|
|
|
- peer_address: 192.0.255.7
|
2025-02-05 11:54:55 +01:00
|
|
|
vrf: default
|
|
|
|
protocols:
|
|
|
|
- bgp
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBFDSpecificPeers:
|
|
|
|
# Verifies the state of IPv4 BFD peer sessions.
|
|
|
|
bfd_peers:
|
|
|
|
- peer_address: 192.0.255.8
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 192.0.255.7
|
|
|
|
vrf: default
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.configuration:
|
|
|
|
- VerifyRunningConfigDiffs:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there is no difference between the running-config and the startup-config.
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifyRunningConfigLines:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Search the Running-Config for the given RegEx patterns.
|
2025-02-05 11:54:55 +01:00
|
|
|
regex_patterns:
|
|
|
|
- "^enable password.*$"
|
|
|
|
- "bla bla"
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyZeroTouch:
|
|
|
|
# Verifies ZeroTouch is disabled.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.connectivity:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyLLDPNeighbors:
|
|
|
|
# Verifies the connection status of the specified LLDP (Link Layer Discovery Protocol) neighbors.
|
|
|
|
neighbors:
|
|
|
|
- port: Ethernet1
|
|
|
|
neighbor_device: DC1-SPINE1
|
|
|
|
neighbor_port: Ethernet1
|
|
|
|
- port: Ethernet2
|
|
|
|
neighbor_device: DC1-SPINE2
|
|
|
|
neighbor_port: Ethernet1
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyReachability:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Test network reachability to one or many destination IP(s).
|
2025-02-05 11:32:35 +01:00
|
|
|
hosts:
|
2025-02-05 11:55:22 +01:00
|
|
|
- source: Management0
|
2025-02-05 11:32:35 +01:00
|
|
|
destination: 1.1.1.1
|
|
|
|
vrf: MGMT
|
2025-02-05 11:54:55 +01:00
|
|
|
df_bit: True
|
|
|
|
size: 100
|
2025-03-17 07:33:51 +01:00
|
|
|
reachable: true
|
2025-02-05 11:55:22 +01:00
|
|
|
- source: Management0
|
2025-02-05 11:32:35 +01:00
|
|
|
destination: 8.8.8.8
|
|
|
|
vrf: MGMT
|
2025-02-05 11:54:55 +01:00
|
|
|
df_bit: True
|
|
|
|
size: 100
|
2025-03-17 07:33:51 +01:00
|
|
|
- source: fd12:3456:789a:1::1
|
|
|
|
destination: fd12:3456:789a:1::2
|
|
|
|
vrf: default
|
|
|
|
df_bit: True
|
|
|
|
size: 100
|
|
|
|
reachable: false
|
2025-02-05 11:55:22 +01:00
|
|
|
anta.tests.cvx:
|
|
|
|
- VerifyActiveCVXConnections:
|
|
|
|
# Verifies the number of active CVX Connections.
|
|
|
|
connections_count: 100
|
|
|
|
- VerifyCVXClusterStatus:
|
|
|
|
# Verifies the CVX Server Cluster status.
|
|
|
|
role: Master
|
|
|
|
peer_status:
|
|
|
|
- peer_name : cvx-red-2
|
|
|
|
registration_state: Registration complete
|
|
|
|
- peer_name: cvx-red-3
|
|
|
|
registration_state: Registration error
|
|
|
|
- VerifyManagementCVX:
|
|
|
|
# Verifies the management CVX global status.
|
|
|
|
enabled: true
|
|
|
|
- VerifyMcsClientMounts:
|
|
|
|
# Verify if all MCS client mounts are in mountStateMountComplete.
|
|
|
|
- VerifyMcsServerMounts:
|
|
|
|
# Verify if all MCS server mounts are in a MountComplete state.
|
|
|
|
connections_count: 100
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.field_notices:
|
|
|
|
- VerifyFieldNotice44Resolution:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that the device is using the correct Aboot version per FN0044.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyFieldNotice72Resolution:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if the device is exposed to FN0072, and if the issue has been mitigated.
|
2025-02-05 11:54:55 +01:00
|
|
|
anta.tests.flow_tracking:
|
|
|
|
- VerifyHardwareFlowTrackerStatus:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the hardware flow tracking state.
|
2025-02-05 11:54:55 +01:00
|
|
|
trackers:
|
|
|
|
- name: FLOW-TRACKER
|
|
|
|
record_export:
|
2025-02-05 11:55:22 +01:00
|
|
|
on_inactive_timeout: 70000
|
|
|
|
on_interval: 300000
|
2025-02-05 11:54:55 +01:00
|
|
|
exporters:
|
|
|
|
- name: CV-TELEMETRY
|
2025-02-05 11:55:22 +01:00
|
|
|
local_interface: Loopback0
|
|
|
|
template_interval: 3600000
|
2025-02-05 11:39:09 +01:00
|
|
|
anta.tests.greent:
|
|
|
|
- VerifyGreenT:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if a GreenT policy other than the default is created.
|
2025-02-05 11:39:09 +01:00
|
|
|
- VerifyGreenTCounters:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if the GreenT counters are incremented.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.hardware:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyAdverseDrops:
|
|
|
|
# Verifies there are no adverse drops on DCS-7280 and DCS-7500 family switches.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyEnvironmentCooling:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the status of power supply fans and all fan trays.
|
2025-02-05 11:32:35 +01:00
|
|
|
states:
|
|
|
|
- ok
|
|
|
|
- VerifyEnvironmentPower:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the power supplies status.
|
2025-02-05 11:32:35 +01:00
|
|
|
states:
|
|
|
|
- ok
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyEnvironmentSystemCooling:
|
|
|
|
# Verifies the device's system cooling status.
|
|
|
|
- VerifyTemperature:
|
|
|
|
# Verifies if the device temperature is within acceptable limits.
|
|
|
|
- VerifyTransceiversManufacturers:
|
|
|
|
# Verifies if all the transceivers come from approved manufacturers.
|
|
|
|
manufacturers:
|
|
|
|
- Not Present
|
|
|
|
- Arista Networks
|
|
|
|
- Arastra, Inc.
|
|
|
|
- VerifyTransceiversTemperature:
|
|
|
|
# Verifies if all the transceivers are operating at an acceptable temperature.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.interfaces:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyIPProxyARP:
|
|
|
|
# Verifies if Proxy ARP is enabled.
|
|
|
|
interfaces:
|
|
|
|
- Ethernet1
|
|
|
|
- Ethernet2
|
|
|
|
- VerifyIllegalLACP:
|
|
|
|
# Verifies there are no illegal LACP packets in all port channels.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyInterfaceDiscards:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that the interfaces packet discard counters are equal to zero.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyInterfaceErrDisabled:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there are no interfaces in the errdisabled state.
|
|
|
|
- VerifyInterfaceErrors:
|
|
|
|
# Verifies that the interfaces error counters are equal to zero.
|
|
|
|
- VerifyInterfaceIPv4:
|
|
|
|
# Verifies the interface IPv4 addresses.
|
|
|
|
interfaces:
|
|
|
|
- name: Ethernet2
|
|
|
|
primary_ip: 172.30.11.1/31
|
|
|
|
secondary_ips:
|
|
|
|
- 10.10.10.1/31
|
|
|
|
- 10.10.10.10/31
|
|
|
|
- VerifyInterfaceUtilization:
|
|
|
|
# Verifies that the utilization of interfaces is below a certain threshold.
|
|
|
|
threshold: 70.0
|
|
|
|
- VerifyInterfacesSpeed:
|
|
|
|
# Verifies the speed, lanes, auto-negotiation status, and mode as full duplex for interfaces.
|
|
|
|
interfaces:
|
|
|
|
- name: Ethernet2
|
|
|
|
auto: False
|
|
|
|
speed: 10
|
|
|
|
- name: Eth3
|
|
|
|
auto: True
|
|
|
|
speed: 100
|
|
|
|
lanes: 1
|
|
|
|
- name: Eth2
|
|
|
|
auto: False
|
|
|
|
speed: 2.5
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyInterfacesStatus:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the operational states of specified interfaces to ensure they match expected configurations.
|
2025-02-05 11:32:35 +01:00
|
|
|
interfaces:
|
2025-02-05 11:39:09 +01:00
|
|
|
- name: Ethernet1
|
|
|
|
status: up
|
|
|
|
- name: Port-Channel100
|
|
|
|
status: down
|
2025-02-05 11:32:35 +01:00
|
|
|
line_protocol_status: lowerLayerDown
|
2025-02-05 11:39:09 +01:00
|
|
|
- name: Ethernet49/1
|
|
|
|
status: adminDown
|
2025-02-05 11:32:35 +01:00
|
|
|
line_protocol_status: notPresent
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyIpVirtualRouterMac:
|
|
|
|
# Verifies the IP virtual router MAC address.
|
|
|
|
mac_address: 00:1c:73:00:dc:01
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyL2MTU:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the global L2 MTU of all L2 interfaces.
|
2025-02-05 11:32:35 +01:00
|
|
|
mtu: 1500
|
|
|
|
ignored_interfaces:
|
|
|
|
- Management1
|
|
|
|
- Vxlan1
|
|
|
|
specific_mtu:
|
|
|
|
- Ethernet1/1: 1500
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyL3MTU:
|
|
|
|
# Verifies the global L3 MTU of all L3 interfaces.
|
|
|
|
mtu: 1500
|
|
|
|
ignored_interfaces:
|
|
|
|
- Vxlan1
|
|
|
|
specific_mtu:
|
|
|
|
- Ethernet1: 2500
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifyLACPInterfacesStatus:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the Link Aggregation Control Protocol (LACP) status of the interface.
|
2025-02-05 11:54:55 +01:00
|
|
|
interfaces:
|
2025-02-05 11:55:22 +01:00
|
|
|
- name: Ethernet1
|
|
|
|
portchannel: Port-Channel100
|
|
|
|
- VerifyLoopbackCount:
|
|
|
|
# Verifies the number of loopback interfaces and their status.
|
|
|
|
number: 3
|
|
|
|
- VerifyPortChannels:
|
|
|
|
# Verifies there are no inactive ports in all port channels.
|
|
|
|
- VerifySVI:
|
|
|
|
# Verifies the status of all SVIs.
|
|
|
|
- VerifyStormControlDrops:
|
|
|
|
# Verifies there are no interface storm-control drop counters.
|
2025-02-05 11:39:09 +01:00
|
|
|
anta.tests.lanz:
|
|
|
|
- VerifyLANZ:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if LANZ is enabled.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.logging:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyLoggingAccounting:
|
|
|
|
# Verifies if AAA accounting logs are generated.
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyLoggingEntries:
|
|
|
|
# Verifies that the expected log string is present in the last specified log messages.
|
|
|
|
logging_entries:
|
|
|
|
- regex_match: ".ACCOUNTING-5-EXEC: cvpadmin ssh."
|
|
|
|
last_number_messages: 30
|
|
|
|
severity_level: alerts
|
|
|
|
- regex_match: ".SPANTREE-6-INTERFACE_ADD:."
|
|
|
|
last_number_messages: 10
|
|
|
|
severity_level: critical
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyLoggingErrors:
|
|
|
|
# Verifies there are no syslog messages with a severity of ERRORS or higher.
|
|
|
|
- VerifyLoggingHostname:
|
|
|
|
# Verifies if logs are generated with the device FQDN.
|
2025-03-17 07:33:51 +01:00
|
|
|
severity_level: informational
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyLoggingHosts:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies logging hosts (syslog servers) for a specified VRF.
|
2025-02-05 11:32:35 +01:00
|
|
|
hosts:
|
|
|
|
- 1.1.1.1
|
|
|
|
- 2.2.2.2
|
|
|
|
vrf: default
|
|
|
|
- VerifyLoggingLogsGeneration:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if logs are generated.
|
2025-03-17 07:33:51 +01:00
|
|
|
severity_level: informational
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyLoggingPersistent:
|
|
|
|
# Verifies if logging persistent is enabled and logs are saved in flash.
|
|
|
|
- VerifyLoggingSourceIntf:
|
|
|
|
# Verifies logging source-interface for a specified VRF.
|
|
|
|
interface: Management0
|
|
|
|
vrf: default
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyLoggingTimestamp:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if logs are generated with the appropriate timestamp.
|
2025-03-17 07:33:51 +01:00
|
|
|
severity_level: informational
|
|
|
|
- VerifySyslogLogging:
|
|
|
|
# Verifies if syslog logging is enabled.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.mlag:
|
|
|
|
- VerifyMlagConfigSanity:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there are no MLAG config-sanity inconsistencies.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyMlagDualPrimary:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the MLAG dual-primary detection parameters.
|
2025-02-05 11:32:35 +01:00
|
|
|
detection_delay: 200
|
|
|
|
errdisabled: True
|
|
|
|
recovery_delay: 60
|
|
|
|
recovery_delay_non_mlag: 0
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyMlagInterfaces:
|
|
|
|
# Verifies there are no inactive or active-partial MLAG ports.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyMlagPrimaryPriority:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the configuration of the MLAG primary priority.
|
2025-02-05 11:32:35 +01:00
|
|
|
primary_priority: 3276
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyMlagReloadDelay:
|
|
|
|
# Verifies the reload-delay parameters of the MLAG configuration.
|
|
|
|
reload_delay: 300
|
|
|
|
reload_delay_non_mlag: 330
|
|
|
|
- VerifyMlagStatus:
|
|
|
|
# Verifies the health status of the MLAG configuration.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.multicast:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyIGMPSnoopingGlobal:
|
|
|
|
# Verifies the IGMP snooping global status.
|
|
|
|
enabled: True
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyIGMPSnoopingVlans:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the IGMP snooping status for the provided VLANs.
|
2025-02-05 11:32:35 +01:00
|
|
|
vlans:
|
|
|
|
10: False
|
|
|
|
12: False
|
2025-02-05 11:39:50 +01:00
|
|
|
anta.tests.path_selection:
|
|
|
|
- VerifyPathsHealth:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the path and telemetry state of all paths under router path-selection.
|
2025-02-05 11:39:50 +01:00
|
|
|
- VerifySpecificPath:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the DPS path and telemetry state of an IPv4 peer.
|
2025-02-05 11:39:50 +01:00
|
|
|
paths:
|
|
|
|
- peer: 10.255.0.1
|
|
|
|
path_group: internet
|
|
|
|
source_address: 100.64.3.2
|
|
|
|
destination_address: 100.64.1.2
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.profiles:
|
|
|
|
- VerifyTcamProfile:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the device TCAM profile.
|
2025-02-05 11:32:35 +01:00
|
|
|
profile: vxlan-routing
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyUnifiedForwardingTableMode:
|
|
|
|
# Verifies the device is using the expected UFT mode.
|
|
|
|
mode: 3
|
2025-02-05 11:39:09 +01:00
|
|
|
anta.tests.ptp:
|
|
|
|
- VerifyPtpGMStatus:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that the device is locked to a valid PTP Grandmaster.
|
2025-02-05 11:39:09 +01:00
|
|
|
gmid: 0xec:46:70:ff:fe:00:ff:a9
|
|
|
|
- VerifyPtpLockStatus:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that the device was locked to the upstream PTP GM in the last minute.
|
|
|
|
- VerifyPtpModeStatus:
|
|
|
|
# Verifies that the device is configured as a PTP Boundary Clock.
|
2025-02-05 11:39:09 +01:00
|
|
|
- VerifyPtpOffset:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that the PTP timing offset is within +/- 1000ns from the master clock.
|
2025-02-05 11:39:09 +01:00
|
|
|
- VerifyPtpPortModeStatus:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the PTP interfaces state.
|
|
|
|
anta.tests.routing.bgp:
|
|
|
|
- VerifyBGPAdvCommunities:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies that advertised communities are standard, extended and large for BGP IPv4 peer(s).
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.17
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 172.30.11.21
|
|
|
|
vrf: default
|
|
|
|
- VerifyBGPExchangedRoutes:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the advertised and received routes of BGP IPv4 peer(s).
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.255.5
|
|
|
|
vrf: default
|
|
|
|
advertised_routes:
|
|
|
|
- 192.0.254.5/32
|
|
|
|
received_routes:
|
|
|
|
- 192.0.255.4/32
|
|
|
|
- peer_address: 172.30.255.1
|
|
|
|
vrf: default
|
|
|
|
advertised_routes:
|
|
|
|
- 192.0.255.1/32
|
|
|
|
- 192.0.254.5/32
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyBGPNlriAcceptance:
|
|
|
|
# Verifies that all received NLRI are accepted for all AFI/SAFI configured for BGP IPv4 peer(s).
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 10.100.0.128
|
|
|
|
vrf: default
|
|
|
|
capabilities:
|
|
|
|
- ipv4Unicast
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBGPPeerASNCap:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the four octet ASN capability of BGP IPv4 peer(s).
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
- VerifyBGPPeerCount:
|
|
|
|
# Verifies the count of BGP peers for given address families.
|
|
|
|
address_families:
|
|
|
|
- afi: "evpn"
|
|
|
|
num_peers: 2
|
|
|
|
- afi: "ipv4"
|
|
|
|
safi: "unicast"
|
|
|
|
vrf: "PROD"
|
|
|
|
num_peers: 2
|
|
|
|
- afi: "ipv4"
|
|
|
|
safi: "unicast"
|
|
|
|
vrf: "default"
|
|
|
|
num_peers: 3
|
|
|
|
- afi: "ipv4"
|
|
|
|
safi: "multicast"
|
|
|
|
vrf: "DEV"
|
|
|
|
num_peers: 3
|
|
|
|
- VerifyBGPPeerDropStats:
|
|
|
|
# Verifies BGP NLRI drop statistics for the provided BGP IPv4 peer(s).
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
drop_stats:
|
|
|
|
- inDropAsloop
|
|
|
|
- prefixEvpnDroppedUnsupportedRouteType
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyBGPPeerGroup:
|
|
|
|
# Verifies BGP peer group of BGP IPv4 peer(s).
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
peer_group: IPv4-UNDERLAY-PEERS
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBGPPeerMD5Auth:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the MD5 authentication and state of IPv4 BGP peer(s) in a specified VRF.
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 172.30.11.5
|
|
|
|
vrf: default
|
|
|
|
- VerifyBGPPeerMPCaps:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the multiprotocol capabilities of BGP IPv4 peer(s).
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
strict: False
|
|
|
|
capabilities:
|
2025-03-17 07:33:51 +01:00
|
|
|
- ipv4 labeled-Unicast
|
|
|
|
- ipv4MplsVpn
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBGPPeerRouteLimit:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies maximum routes and warning limit for BGP IPv4 peer(s).
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
maximum_routes: 12000
|
|
|
|
warning_limit: 10000
|
|
|
|
- VerifyBGPPeerRouteRefreshCap:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the route refresh capabilities of IPv4 BGP peer(s) in a specified VRF.
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyBGPPeerSession:
|
|
|
|
# Verifies the session state of BGP IPv4 peer(s).
|
|
|
|
minimum_established_time: 10000
|
|
|
|
check_tcp_queues: false
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 10.1.0.1
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 10.1.0.2
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 10.1.255.2
|
|
|
|
vrf: DEV
|
|
|
|
- peer_address: 10.1.255.4
|
|
|
|
vrf: DEV
|
|
|
|
- VerifyBGPPeerSessionRibd:
|
|
|
|
# Verifies the session state of BGP IPv4 peer(s).
|
|
|
|
minimum_established_time: 10000
|
|
|
|
check_tcp_queues: false
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 10.1.0.1
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 10.1.0.2
|
|
|
|
vrf: default
|
|
|
|
- peer_address: 10.1.255.2
|
|
|
|
vrf: DEV
|
|
|
|
- peer_address: 10.1.255.4
|
|
|
|
vrf: DEV
|
|
|
|
- VerifyBGPPeerTtlMultiHops:
|
|
|
|
# Verifies BGP TTL and max-ttl-hops count for BGP IPv4 peer(s).
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
ttl: 3
|
|
|
|
max_ttl_hops: 3
|
|
|
|
- peer_address: 172.30.11.2
|
|
|
|
vrf: test
|
|
|
|
ttl: 30
|
|
|
|
max_ttl_hops: 30
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBGPPeerUpdateErrors:
|
|
|
|
# Verifies BGP update error counters for the provided BGP IPv4 peer(s).
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
update_errors:
|
|
|
|
- inUpdErrWithdraw
|
|
|
|
- VerifyBGPPeersHealth:
|
|
|
|
# Verifies the health of BGP peers for given address families.
|
2025-03-17 07:33:51 +01:00
|
|
|
minimum_established_time: 10000
|
2025-02-05 11:55:22 +01:00
|
|
|
address_families:
|
|
|
|
- afi: "evpn"
|
|
|
|
- afi: "ipv4"
|
|
|
|
safi: "unicast"
|
|
|
|
vrf: "default"
|
|
|
|
- afi: "ipv6"
|
|
|
|
safi: "unicast"
|
|
|
|
vrf: "DEV"
|
|
|
|
check_tcp_queues: false
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyBGPPeersHealthRibd:
|
|
|
|
# Verifies the health of all the BGP IPv4 peer(s).
|
|
|
|
check_tcp_queues: True
|
|
|
|
- VerifyBGPRedistribution:
|
|
|
|
# Verifies BGP redistribution.
|
|
|
|
vrfs:
|
|
|
|
- vrf: default
|
|
|
|
address_families:
|
|
|
|
- afi_safi: ipv4multicast
|
|
|
|
redistributed_routes:
|
|
|
|
- proto: Connected
|
|
|
|
include_leaked: True
|
|
|
|
route_map: RM-CONN-2-BGP
|
|
|
|
- proto: IS-IS
|
|
|
|
include_leaked: True
|
|
|
|
route_map: RM-CONN-2-BGP
|
|
|
|
- afi_safi: IPv6 Unicast
|
|
|
|
redistributed_routes:
|
|
|
|
- proto: User # Converted to EOS SDK
|
|
|
|
route_map: RM-CONN-2-BGP
|
|
|
|
- proto: Static
|
|
|
|
include_leaked: True
|
|
|
|
route_map: RM-CONN-2-BGP
|
|
|
|
- VerifyBGPRouteECMP:
|
|
|
|
# Verifies BGP IPv4 route ECMP paths.
|
|
|
|
route_entries:
|
|
|
|
- prefix: 10.100.0.128/31
|
|
|
|
vrf: default
|
|
|
|
ecmp_count: 2
|
|
|
|
- VerifyBGPRoutePaths:
|
|
|
|
# Verifies BGP IPv4 route paths.
|
|
|
|
route_entries:
|
|
|
|
- prefix: 10.100.0.128/31
|
|
|
|
vrf: default
|
|
|
|
paths:
|
|
|
|
- nexthop: 10.100.0.10
|
|
|
|
origin: Igp
|
|
|
|
- nexthop: 10.100.4.5
|
|
|
|
origin: Incomplete
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyBGPSpecificPeers:
|
|
|
|
# Verifies the health of specific BGP peer(s) for given address families.
|
2025-03-17 07:33:51 +01:00
|
|
|
minimum_established_time: 10000
|
2025-02-05 11:55:22 +01:00
|
|
|
address_families:
|
|
|
|
- afi: "evpn"
|
|
|
|
peers:
|
|
|
|
- 10.1.0.1
|
|
|
|
- 10.1.0.2
|
|
|
|
- afi: "ipv4"
|
|
|
|
safi: "unicast"
|
|
|
|
peers:
|
|
|
|
- 10.1.254.1
|
|
|
|
- 10.1.255.0
|
|
|
|
- 10.1.255.2
|
|
|
|
- 10.1.255.4
|
|
|
|
- VerifyBGPTimers:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the timers of BGP IPv4 peer(s).
|
2025-02-05 11:55:22 +01:00
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
hold_time: 180
|
|
|
|
keep_alive_time: 60
|
|
|
|
- peer_address: 172.30.11.5
|
|
|
|
vrf: default
|
|
|
|
hold_time: 180
|
|
|
|
keep_alive_time: 60
|
|
|
|
- VerifyBgpRouteMaps:
|
|
|
|
# Verifies BGP inbound and outbound route-maps of BGP IPv4 peer(s).
|
|
|
|
bgp_peers:
|
|
|
|
- peer_address: 172.30.11.1
|
|
|
|
vrf: default
|
|
|
|
inbound_route_map: RM-MLAG-PEER-IN
|
|
|
|
outbound_route_map: RM-MLAG-PEER-OUT
|
|
|
|
- VerifyEVPNType2Route:
|
|
|
|
# Verifies the EVPN Type-2 routes for a given IPv4 or MAC address and VNI.
|
|
|
|
vxlan_endpoints:
|
|
|
|
- address: 192.168.20.102
|
|
|
|
vni: 10020
|
|
|
|
- address: aac1.ab5d.b41e
|
|
|
|
vni: 10010
|
|
|
|
anta.tests.routing.generic:
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyIPv4RouteNextHops:
|
|
|
|
# Verifies the next-hops of the IPv4 prefixes.
|
|
|
|
route_entries:
|
|
|
|
- prefix: 10.10.0.1/32
|
|
|
|
vrf: default
|
|
|
|
strict: false
|
|
|
|
nexthops:
|
|
|
|
- 10.100.0.8
|
|
|
|
- 10.100.0.10
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyIPv4RouteType:
|
|
|
|
# Verifies the route-type of the IPv4 prefixes.
|
|
|
|
routes_entries:
|
|
|
|
- prefix: 10.10.0.1/32
|
|
|
|
vrf: default
|
|
|
|
route_type: eBGP
|
|
|
|
- prefix: 10.100.0.12/31
|
|
|
|
vrf: default
|
|
|
|
route_type: connected
|
|
|
|
- prefix: 10.100.1.5/32
|
|
|
|
vrf: default
|
|
|
|
route_type: iBGP
|
|
|
|
- VerifyRoutingProtocolModel:
|
|
|
|
# Verifies the configured routing protocol model.
|
|
|
|
model: multi-agent
|
|
|
|
- VerifyRoutingTableEntry:
|
|
|
|
# Verifies that the provided routes are present in the routing table of a specified VRF.
|
2025-02-05 11:32:35 +01:00
|
|
|
vrf: default
|
2025-02-05 11:55:22 +01:00
|
|
|
routes:
|
|
|
|
- 10.1.0.1
|
|
|
|
- 10.1.0.2
|
|
|
|
- VerifyRoutingTableSize:
|
|
|
|
# Verifies the size of the IP routing table of the default VRF.
|
|
|
|
minimum: 2
|
|
|
|
maximum: 20
|
|
|
|
anta.tests.routing.isis:
|
|
|
|
- VerifyISISInterfaceMode:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies IS-IS interfaces are running in the correct mode.
|
2025-02-05 11:55:22 +01:00
|
|
|
interfaces:
|
|
|
|
- name: Loopback0
|
|
|
|
mode: passive
|
|
|
|
- name: Ethernet2
|
|
|
|
mode: passive
|
|
|
|
level: 2
|
|
|
|
- name: Ethernet1
|
|
|
|
mode: point-to-point
|
2025-03-17 07:33:51 +01:00
|
|
|
vrf: PROD
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyISISNeighborCount:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the number of IS-IS neighbors per interface and level.
|
2025-02-05 11:55:22 +01:00
|
|
|
interfaces:
|
|
|
|
- name: Ethernet1
|
|
|
|
level: 1
|
|
|
|
count: 2
|
|
|
|
- name: Ethernet2
|
|
|
|
level: 2
|
|
|
|
count: 1
|
|
|
|
- name: Ethernet3
|
|
|
|
count: 2
|
|
|
|
- VerifyISISNeighborState:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the health of IS-IS neighbors.
|
|
|
|
check_all_vrfs: true
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyISISSegmentRoutingAdjacencySegments:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies IS-IS segment routing adjacency segments.
|
2025-02-05 11:55:22 +01:00
|
|
|
instances:
|
|
|
|
- name: CORE-ISIS
|
|
|
|
vrf: default
|
|
|
|
segments:
|
|
|
|
- interface: Ethernet2
|
|
|
|
address: 10.0.1.3
|
|
|
|
sid_origin: dynamic
|
|
|
|
- VerifyISISSegmentRoutingDataplane:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies IS-IS segment routing data-plane configuration.
|
2025-02-05 11:55:22 +01:00
|
|
|
instances:
|
|
|
|
- name: CORE-ISIS
|
|
|
|
vrf: default
|
|
|
|
dataplane: MPLS
|
|
|
|
- VerifyISISSegmentRoutingTunnels:
|
|
|
|
# Verify ISIS-SR tunnels computed by device.
|
|
|
|
entries:
|
|
|
|
# Check only endpoint
|
|
|
|
- endpoint: 1.0.0.122/32
|
|
|
|
# Check endpoint and via TI-LFA
|
|
|
|
- endpoint: 1.0.0.13/32
|
|
|
|
vias:
|
|
|
|
- type: tunnel
|
|
|
|
tunnel_id: ti-lfa
|
|
|
|
# Check endpoint and via IP routers
|
|
|
|
- endpoint: 1.0.0.14/32
|
|
|
|
vias:
|
|
|
|
- type: ip
|
|
|
|
nexthop: 1.1.1.1
|
|
|
|
anta.tests.routing.ospf:
|
|
|
|
- VerifyOSPFMaxLSA:
|
|
|
|
# Verifies all OSPF instances did not cross the maximum LSA threshold.
|
|
|
|
- VerifyOSPFNeighborCount:
|
|
|
|
# Verifies the number of OSPF neighbors in FULL state is the one we expect.
|
2025-02-05 11:32:35 +01:00
|
|
|
number: 3
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyOSPFNeighborState:
|
|
|
|
# Verifies all OSPF neighbors are in FULL state.
|
|
|
|
anta.tests.security:
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyAPIHttpStatus:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if eAPI HTTP server is disabled globally.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyAPIHttpsSSL:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if the eAPI has a valid SSL profile.
|
2025-02-05 11:32:35 +01:00
|
|
|
profile: default
|
|
|
|
- VerifyAPIIPv4Acl:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if eAPI has the right number IPv4 ACL(s) configured for a specified VRF.
|
2025-02-05 11:32:35 +01:00
|
|
|
number: 3
|
|
|
|
vrf: default
|
|
|
|
- VerifyAPIIPv6Acl:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if eAPI has the right number IPv6 ACL(s) configured for a specified VRF.
|
2025-02-05 11:32:35 +01:00
|
|
|
number: 3
|
|
|
|
vrf: default
|
|
|
|
- VerifyAPISSLCertificate:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the eAPI SSL certificate expiry, common subject name, encryption algorithm and key size.
|
2025-02-05 11:32:35 +01:00
|
|
|
certificates:
|
|
|
|
- certificate_name: ARISTA_SIGNING_CA.crt
|
|
|
|
expiry_threshold: 30
|
|
|
|
common_name: AristaIT-ICA ECDSA Issuing Cert Authority
|
|
|
|
encryption_algorithm: ECDSA
|
|
|
|
key_size: 256
|
|
|
|
- certificate_name: ARISTA_ROOT_CA.crt
|
|
|
|
expiry_threshold: 30
|
|
|
|
common_name: Arista Networks Internal IT Root Cert Authority
|
|
|
|
encryption_algorithm: RSA
|
|
|
|
key_size: 4096
|
|
|
|
- VerifyBannerLogin:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the login banner of a device.
|
|
|
|
login_banner: |
|
|
|
|
# Copyright (c) 2023-2024 Arista Networks, Inc.
|
|
|
|
# Use of this source code is governed by the Apache License 2.0
|
|
|
|
# that can be found in the LICENSE file.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyBannerMotd:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the motd banner of a device.
|
|
|
|
motd_banner: |
|
|
|
|
# Copyright (c) 2023-2024 Arista Networks, Inc.
|
|
|
|
# Use of this source code is governed by the Apache License 2.0
|
|
|
|
# that can be found in the LICENSE file.
|
|
|
|
- VerifyHardwareEntropy:
|
|
|
|
# Verifies hardware entropy generation is enabled on device.
|
|
|
|
- VerifyIPSecConnHealth:
|
|
|
|
# Verifies all IPv4 security connections.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyIPv4ACL:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the configuration of IPv4 ACLs.
|
2025-02-05 11:32:35 +01:00
|
|
|
ipv4_access_lists:
|
|
|
|
- name: default-control-plane-acl
|
|
|
|
entries:
|
|
|
|
- sequence: 10
|
|
|
|
action: permit icmp any any
|
|
|
|
- sequence: 20
|
|
|
|
action: permit ip any any tracked
|
|
|
|
- sequence: 30
|
|
|
|
action: permit udp any any eq bfd ttl eq 255
|
|
|
|
- name: LabTest
|
|
|
|
entries:
|
|
|
|
- sequence: 10
|
|
|
|
action: permit icmp any any
|
|
|
|
- sequence: 20
|
|
|
|
action: permit tcp any any range 5900 5910
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifySSHIPv4Acl:
|
|
|
|
# Verifies if the SSHD agent has IPv4 ACL(s) configured.
|
|
|
|
number: 3
|
|
|
|
vrf: default
|
|
|
|
- VerifySSHIPv6Acl:
|
|
|
|
# Verifies if the SSHD agent has IPv6 ACL(s) configured.
|
|
|
|
number: 3
|
|
|
|
vrf: default
|
|
|
|
- VerifySSHStatus:
|
|
|
|
# Verifies if the SSHD agent is disabled in the default VRF.
|
2025-02-05 11:39:09 +01:00
|
|
|
- VerifySpecificIPSecConn:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the IPv4 security connections.
|
2025-02-05 11:39:09 +01:00
|
|
|
ip_security_connections:
|
|
|
|
- peer: 10.255.0.1
|
|
|
|
- peer: 10.255.0.2
|
|
|
|
vrf: default
|
|
|
|
connections:
|
|
|
|
- source_address: 100.64.3.2
|
|
|
|
destination_address: 100.64.2.2
|
|
|
|
- source_address: 172.18.3.2
|
|
|
|
destination_address: 172.18.2.2
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyTelnetStatus:
|
|
|
|
# Verifies if Telnet is disabled in the default VRF.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.services:
|
|
|
|
- VerifyDNSLookup:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the DNS name to IP address resolution.
|
2025-02-05 11:32:35 +01:00
|
|
|
domain_names:
|
|
|
|
- arista.com
|
|
|
|
- www.google.com
|
|
|
|
- arista.ca
|
|
|
|
- VerifyDNSServers:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if the DNS (Domain Name Service) servers are correctly configured.
|
2025-02-05 11:32:35 +01:00
|
|
|
dns_servers:
|
|
|
|
- server_address: 10.14.0.1
|
|
|
|
vrf: default
|
|
|
|
priority: 1
|
|
|
|
- server_address: 10.14.0.11
|
|
|
|
vrf: MGMT
|
|
|
|
priority: 0
|
|
|
|
- VerifyErrdisableRecovery:
|
2025-03-17 07:33:51 +01:00
|
|
|
# Verifies the error disable recovery functionality.
|
2025-02-05 11:32:35 +01:00
|
|
|
reasons:
|
|
|
|
- reason: acl
|
|
|
|
interval: 30
|
2025-03-17 07:33:51 +01:00
|
|
|
status: Enabled
|
2025-02-05 11:32:35 +01:00
|
|
|
- reason: bpduguard
|
|
|
|
interval: 30
|
2025-03-17 07:33:51 +01:00
|
|
|
status: Enabled
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyHostname:
|
|
|
|
# Verifies the hostname of a device.
|
|
|
|
hostname: s1-spine1
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.snmp:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifySnmpContact:
|
|
|
|
# Verifies the SNMP contact of a device.
|
|
|
|
contact: Jon@example.com
|
|
|
|
- VerifySnmpErrorCounters:
|
|
|
|
# Verifies the SNMP error counters.
|
|
|
|
error_counters:
|
|
|
|
- inVersionErrs
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifySnmpGroup:
|
|
|
|
# Verifies the SNMP group configurations for specified version(s).
|
|
|
|
snmp_groups:
|
|
|
|
- group_name: Group1
|
|
|
|
version: v1
|
|
|
|
read_view: group_read_1
|
|
|
|
write_view: group_write_1
|
|
|
|
notify_view: group_notify_1
|
|
|
|
- group_name: Group2
|
|
|
|
version: v3
|
|
|
|
read_view: group_read_2
|
|
|
|
write_view: group_write_2
|
|
|
|
notify_view: group_notify_2
|
|
|
|
authentication: priv
|
|
|
|
- VerifySnmpHostLogging:
|
|
|
|
# Verifies SNMP logging configurations.
|
|
|
|
hosts:
|
|
|
|
- hostname: 192.168.1.100
|
|
|
|
vrf: default
|
|
|
|
- hostname: 192.168.1.103
|
|
|
|
vrf: MGMT
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifySnmpIPv4Acl:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if the SNMP agent has IPv4 ACL(s) configured.
|
2025-02-05 11:32:35 +01:00
|
|
|
number: 3
|
|
|
|
vrf: default
|
|
|
|
- VerifySnmpIPv6Acl:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if the SNMP agent has IPv6 ACL(s) configured.
|
2025-02-05 11:32:35 +01:00
|
|
|
number: 3
|
|
|
|
vrf: default
|
|
|
|
- VerifySnmpLocation:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the SNMP location of a device.
|
2025-02-05 11:32:35 +01:00
|
|
|
location: New York
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifySnmpNotificationHost:
|
|
|
|
# Verifies the SNMP notification host(s) (SNMP manager) configurations.
|
|
|
|
notification_hosts:
|
|
|
|
- hostname: spine
|
|
|
|
vrf: default
|
|
|
|
notification_type: trap
|
|
|
|
version: v1
|
|
|
|
udp_port: 162
|
|
|
|
community_string: public
|
|
|
|
- hostname: 192.168.1.100
|
|
|
|
vrf: default
|
|
|
|
notification_type: trap
|
|
|
|
version: v3
|
|
|
|
udp_port: 162
|
|
|
|
user: public
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifySnmpPDUCounters:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the SNMP PDU counters.
|
2025-02-05 11:54:55 +01:00
|
|
|
pdus:
|
|
|
|
- outTrapPdus
|
2025-02-05 11:55:22 +01:00
|
|
|
- inGetNextPdus
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifySnmpSourceInterface:
|
|
|
|
# Verifies SNMP source interfaces.
|
|
|
|
interfaces:
|
|
|
|
- interface: Ethernet1
|
|
|
|
vrf: default
|
|
|
|
- interface: Management0
|
|
|
|
vrf: MGMT
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifySnmpStatus:
|
|
|
|
# Verifies if the SNMP agent is enabled.
|
|
|
|
vrf: default
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifySnmpUser:
|
|
|
|
# Verifies the SNMP user configurations.
|
|
|
|
snmp_users:
|
|
|
|
- username: test
|
|
|
|
group_name: test_group
|
|
|
|
version: v3
|
|
|
|
auth_type: MD5
|
|
|
|
priv_type: AES-128
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.software:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyEOSExtensions:
|
|
|
|
# Verifies that all EOS extensions installed on the device are enabled for boot persistence.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyEOSVersion:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the EOS version of the device.
|
2025-02-05 11:32:35 +01:00
|
|
|
versions:
|
|
|
|
- 4.25.4M
|
|
|
|
- 4.26.1F
|
|
|
|
- VerifyTerminAttrVersion:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the TerminAttr version of the device.
|
2025-02-05 11:32:35 +01:00
|
|
|
versions:
|
|
|
|
- v1.13.6
|
|
|
|
- v1.8.0
|
|
|
|
anta.tests.stp:
|
|
|
|
- VerifySTPBlockedPorts:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there is no STP blocked ports.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifySTPCounters:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there is no errors in STP BPDU packets.
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifySTPDisabledVlans:
|
|
|
|
# Verifies the STP disabled VLAN(s).
|
|
|
|
vlans:
|
|
|
|
- 6
|
|
|
|
- 4094
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifySTPForwardingPorts:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that all interfaces are forwarding for a provided list of VLAN(s).
|
|
|
|
vlans:
|
|
|
|
- 10
|
|
|
|
- 20
|
|
|
|
- VerifySTPMode:
|
|
|
|
# Verifies the configured STP mode for a provided list of VLAN(s).
|
|
|
|
mode: rapidPvst
|
2025-02-05 11:32:35 +01:00
|
|
|
vlans:
|
|
|
|
- 10
|
|
|
|
- 20
|
|
|
|
- VerifySTPRootPriority:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the STP root priority for a provided list of VLAN or MST instance ID(s).
|
2025-02-05 11:32:35 +01:00
|
|
|
priority: 32768
|
|
|
|
instances:
|
|
|
|
- 10
|
|
|
|
- 20
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifyStpTopologyChanges:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the number of changes across all interfaces in the Spanning Tree Protocol (STP) topology is below a threshold.
|
2025-02-05 11:54:55 +01:00
|
|
|
threshold: 10
|
2025-02-05 11:39:09 +01:00
|
|
|
anta.tests.stun:
|
|
|
|
- VerifyStunClient:
|
2025-02-05 11:55:22 +01:00
|
|
|
# (Deprecated) Verifies the translation for a source address on a STUN client.
|
|
|
|
stun_clients:
|
|
|
|
- source_address: 172.18.3.2
|
|
|
|
public_address: 172.18.3.21
|
|
|
|
source_port: 4500
|
|
|
|
public_port: 6006
|
|
|
|
- VerifyStunClientTranslation:
|
|
|
|
# Verifies the translation for a source address on a STUN client.
|
2025-02-05 11:39:09 +01:00
|
|
|
stun_clients:
|
|
|
|
- source_address: 172.18.3.2
|
|
|
|
public_address: 172.18.3.21
|
|
|
|
source_port: 4500
|
|
|
|
public_port: 6006
|
|
|
|
- source_address: 100.64.3.2
|
|
|
|
public_address: 100.64.3.21
|
|
|
|
source_port: 4500
|
|
|
|
public_port: 6006
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifyStunServer:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the STUN server status is enabled and running.
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.system:
|
|
|
|
- VerifyAgentLogs:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there are no agent crash reports.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyCPUUtilization:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies whether the CPU utilization is below 75%.
|
|
|
|
- VerifyCoredump:
|
|
|
|
# Verifies there are no core dump files.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyFileSystemUtilization:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies that no partition is utilizing more than 75% of its disk space.
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyMaintenance:
|
|
|
|
# Verifies that the device is not currently under or entering maintenance.
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyMemoryUtilization:
|
|
|
|
# Verifies whether the memory utilization is below 75%.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyNTP:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies if NTP is synchronised.
|
2025-02-05 11:54:55 +01:00
|
|
|
- VerifyNTPAssociations:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the Network Time Protocol (NTP) associations.
|
2025-02-05 11:54:55 +01:00
|
|
|
ntp_servers:
|
|
|
|
- server_address: 1.1.1.1
|
|
|
|
preferred: True
|
|
|
|
stratum: 1
|
|
|
|
- server_address: 2.2.2.2
|
2025-02-05 11:55:22 +01:00
|
|
|
stratum: 2
|
2025-02-05 11:54:55 +01:00
|
|
|
- server_address: 3.3.3.3
|
2025-02-05 11:55:22 +01:00
|
|
|
stratum: 2
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyNTPAssociations:
|
|
|
|
ntp_pool:
|
|
|
|
server_addresses: [1.1.1.1, 2.2.2.2]
|
|
|
|
preferred_stratum_range: [1,3]
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyReloadCause:
|
|
|
|
# Verifies the last reload cause of the device.
|
|
|
|
- VerifyUptime:
|
|
|
|
# Verifies the device uptime.
|
|
|
|
minimum: 86400
|
2025-02-05 11:32:35 +01:00
|
|
|
anta.tests.vlan:
|
2025-03-17 07:33:51 +01:00
|
|
|
- VerifyDynamicVlanSource:
|
|
|
|
# Verifies dynamic VLAN allocation for specified VLAN sources.
|
|
|
|
sources:
|
|
|
|
- evpn
|
|
|
|
- mlagsync
|
|
|
|
strict: False
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyVlanInternalPolicy:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the VLAN internal allocation policy and the range of VLANs.
|
2025-02-05 11:32:35 +01:00
|
|
|
policy: ascending
|
|
|
|
start_vlan_id: 1006
|
|
|
|
end_vlan_id: 4094
|
|
|
|
anta.tests.vxlan:
|
2025-02-05 11:55:22 +01:00
|
|
|
- VerifyVxlan1ConnSettings:
|
|
|
|
# Verifies the interface vxlan1 source interface and UDP port.
|
|
|
|
source_interface: Loopback1
|
|
|
|
udp_port: 4789
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyVxlan1Interface:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the Vxlan1 interface status.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyVxlanConfigSanity:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies there are no VXLAN config-sanity inconsistencies.
|
2025-02-05 11:32:35 +01:00
|
|
|
- VerifyVxlanVniBinding:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the VNI-VLAN bindings of the Vxlan1 interface.
|
2025-02-05 11:32:35 +01:00
|
|
|
bindings:
|
|
|
|
10010: 10
|
|
|
|
10020: 20
|
|
|
|
- VerifyVxlanVtep:
|
2025-02-05 11:55:22 +01:00
|
|
|
# Verifies the VTEP peers of the Vxlan1 interface.
|
2025-02-05 11:32:35 +01:00
|
|
|
vteps:
|
|
|
|
- 10.1.1.5
|
|
|
|
- 10.1.1.6
|