UCF STIG Viewer Logo

The system must not have IP tunnels configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22547 GEN007820 SV-26927r1_rule ECSC-1 Medium
Description
IP tunneling mechanisms can be used to bypass network filtering.
STIG Date
Solaris 9 X86 Security Technical Implementation Guide 2013-07-02

Details

Check Text ( C-27877r1_chk )
Check for any IP tunnels.
# ifconfig -a | grep 'ip.*tun'
If any results are returned, this is a finding.
Fix Text (F-24171r1_fix)
Disable the tunnels.
# ifconfig down
Remove the startup configuration for the tunnels.
# rm /etc/hostname.