UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must use an appropriate reverse-path filter for IPv6 network traffic, if the system uses IPv6.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22552 GEN007900 SV-46104r1_rule ECSC-1 Medium
Description
Reverse-path filtering provides protection against spoofed source addresses by causing the system to discard packets with source addresses for which the system has no route or if the route does not point towards the interface on which the packet arrived. Depending on the role of the system, reverse-path filtering may cause legitimate traffic to be discarded and, therefore, should be used with a more permissive mode or filter, or not at all. Whenever possible, reverse-path filtering should be used.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2015-05-27

Details

Check Text ( C-43362r2_chk )
Reverse Path filtering for IPv6 is not implemented in SLES.
Fix Text (F-40350r1_fix)
If the system uses IPv6 use an appropriate reverse-path filter for IPV6 network traffic.