UCF STIG Viewer Logo

The system must not have IP tunnels configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22547 GEN007820 SV-38929r1_rule ECSC-1 Medium
Description
IP tunneling mechanisms can be used to bypass network filtering.
STIG Date
AIX 5.3 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2014-10-03

Details

Check Text ( C-37914r1_chk )
Determine if any IP tunnels are configured on the system.
Check for IP tunnels.
# lstun -a
# ifconfig -a | grep -e gre -e gif -e cti -e sit
If any tunnels are listed, this is a finding.
Fix Text (F-33171r1_fix)
Remove the configuration for any IP tunnels from the system.

Remove tunnels listed with the lstun command.
#rmtun -t -d

Remove the tunneled IP interfaces.
#ifconfig detach
#rmdev -Rdl