UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must prevent public IPv4 access into an organizations internal networks, except as appropriately mediated by managed interfaces employing boundary protection devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-50979 OL6-00-000117 SV-65185r2_rule Medium
Description
The "iptables" service provides the system's host-based firewalling capability for IPv4 and ICMP.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2019-03-20

Details

Check Text ( C-53427r2_chk )
If the system is a cross-domain system, this is not applicable.

Run the following command to determine the current status of the "iptables" service:

# service iptables status

If the service is not running, it should return the following:

iptables: Firewall is not running.

If the service is not running, this is a finding.
Fix Text (F-55785r1_fix)
The "iptables" service can be enabled with the following commands:

# chkconfig iptables on
# service iptables start