Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22547 | GEN007820 | SV-38929r1_rule | ECSC-1 | Medium |
Description |
---|
IP tunneling mechanisms can be used to bypass network filtering. |
STIG | Date |
---|---|
Draft AIX Security Technical Implementation Guide | 2011-08-17 |
Check Text ( C-37914r1_chk ) |
---|
Determine if any IP tunnels are configured on the system. Check for IP tunnels. #lstun –a #ifconfig –a | grep –e gre –e gif -e cti -e sit If any tunnels are listed, this is a finding. |
Fix Text (F-33171r1_fix) |
---|
Remove the configuration for any IP tunnels from the system. Remove tunnels listed with the lstun command. #rmtun –t Remove the tunneled IP interfaces. #ifconfig #rmdev –Rdl |