3.4.2.6 Ensure nftables established connections are configured

Information

Configure the firewall rules for new outbound and established connections

If rules are not in place for established connections, all packets will be dropped by the default policy preventing network usage.

Solution

If NFTables utility is in use on your system:

Configure nftables in accordance with site policy. The following commands will implement a policy to allow all established connections:

# systemctl is-enabled nftables.service | grep -q 'enabled' && nft add rule inet filter input ip protocol tcp ct state established accept
# systemctl is-enabled nftables.service | grep -q 'enabled' && nft add rule inet filter input ip protocol udp ct state established accept
# systemctl is-enabled nftables.service | grep -q 'enabled' && nft add rule inet filter input ip protocol icmp ct state established accept

See Also

https://workbench.cisecurity.org/benchmarks/12705

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CA-9, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.4

Plugin: Unix

Control ID: 5b243b2ef8028d207bf203a8e70eece2a4f7cb38a19665625d43a4925bdb0cfe