UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system's local firewall must implement a deny-all, allow-by-exception policy.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22583 GEN008540 SV-38985r1_rule ECSC-1 Medium
Description
A local firewall protects the system from exposing unnecessary or undocumented network services to the local enclave. If a system within the enclave is compromised, firewall protection on an individual system continues to protect it from attack.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-37938r1_chk )
Determine if the system's local firewall implements a deny-all, allow-by-exception policy.

View the firewall (filter rules) with smit or lsfilt commands.

# smitty ipsec4

# lsfilt

If there is not a deny-all, allow-by-exception policy, this is a finding.
Fix Text (F-33194r1_fix)
Configure the system's local firewall to implement a deny-all,
allow-by-exception policy.

Firewall rules can be added and activated with SMIT ipsec4 or genfilt command.

#smitty ipsec4