Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22547 | GEN007820 | SV-38929r1_rule | ECSC-1 | Medium |
Description |
---|
IP tunneling mechanisms can be used to bypass network filtering. |
STIG | Date |
---|---|
AIX 5.3 Security Technical Implementation Guide | 2012-05-25 |
Check Text ( C-37914r1_chk ) |
---|
Determine if any IP tunnels are configured on the system. Check for IP tunnels. # lstun -a # ifconfig -a | grep -e gre -e gif -e cti -e sit If any tunnels are listed, this is a finding. |
Fix Text (F-33171r1_fix) |
---|
Remove the configuration for any IP tunnels from the system. Remove tunnels listed with the lstun command. #rmtun -t Remove the tunneled IP interfaces. #ifconfig #rmdev -Rdl |