UCF STIG Viewer Logo

A system used for routing must not run other network services or applications.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4398 GEN005580 SV-46112r1_rule Medium
Description
Installing extraneous software on a system designated as a dedicated router poses a security threat to the system and the network. Should an attacker gain access to the router through the unauthorized software, the entire network is susceptible to malicious activity.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-43369r1_chk )
If the system is a VM host and acts as a router solely for the benefit of its client systems, then this rule is not applicable.
Ask the SA if the system is a designated router. If it is not, this is not applicable.

Check the system for non-routing network services.

Procedure:
# netstat -a | grep -i listen
# ps -ef

If non-routing services, including Web servers, file servers, DNS servers, or applications servers, but excluding management services such as SSH and SNMP, are running on the system, this is a finding.
Fix Text (F-39453r1_fix)
Ensure only authorized software is loaded on a designated router. Authorized software will be limited to the most current version of routing protocols and SSH for system administration purposes.