UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IP forwarding for IPv4 must not be enabled, unless the system is a router.


Overview

Finding ID Version Rule ID IA Controls Severity
V-220109 GEN005600 SV-220109r603266_rule Medium
Description
If the system is configured for IP forwarding and is not a designated router, it could be used to bypass network security by providing a path for communication not filtered by network devices.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-21818r490144_chk )
Determine if the system is configured for IPv4 forwarding.
# svcs | grep svc:/network/ipv4-forwarding
If the service is enabled, this is a finding.
Fix Text (F-21817r490145_fix)
Disable IPv4 forwarding on the system.
# svcadm disable svc:/network/ipv4-forwarding