UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not be running any routing protocol daemons, unless the system is a router.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22665 GEN005590 SV-37926r1_rule ECSC-1 Medium
Description
Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unnecessarily transmitted across the network.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2016-06-01

Details

Check Text ( C-37168r3_chk )
Check for any running routing protocol daemons. If the system is a VM host and acts as a router solely for the benefits of its client systems, then this rule is not applicable.

# chkconfig --list |grep :on|egrep '(ospf|route|bgp|zebra|quagga)'
If any routing protocol daemons are listed, this is a finding.
Fix Text (F-32420r1_fix)
Disable any routing protocol daemons.