Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22547 | GEN007820 | SV-63413r1_rule | ECSC-1 | Medium |
Description |
---|
IP tunneling mechanisms can be used to bypass network filtering. |
STIG | Date |
---|---|
Oracle Linux 5 Security Technical Implementation Guide | 2015-03-26 |
Check Text ( C-52119r1_chk ) |
---|
Check for any IP tunnels. # ip tun list # ip -6 tun list If any tunnels are listed, this is a finding. |
Fix Text (F-54017r1_fix) |
---|
Remove the tunnels. # ip tun del Edit system startup scripts to prevent tunnel creation on startup. |