UCF STIG Viewer Logo

The system must not have IP tunnels configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22547 GEN007820 SV-26928r1_rule ECSC-1 Medium
Description
IP tunneling mechanisms can be used to bypass network filtering.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2017-01-27

Details

Check Text ( None )
None
Fix Text (F-24172r1_fix)
Edit the /etc/rc.config.d/netconf* files and remove the tunnel configurations.