UCF STIG Viewer Logo

The system must not have IP tunnels configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22547 GEN007820 SV-26222r1_rule ECSC-1 Medium
Description
IP tunneling mechanisms can be used to bypass network filtering.
STIG Date
VMware ESX 3 Server 2016-05-13

Details

Check Text ( C-29303r1_chk )
Determine if any IP tunnels are configured on the system. If any are found, this is a finding.
Fix Text (F-26335r1_fix)
Remove the configuration for any IP tunnels from the system.