3.7 Ensure IP tunnels are not configured.

Information

The operating system must not have unauthorized IP tunnels configured.

Rationale:

IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the the Authorizing Official of the organization.

Solution

Remove all unapproved tunnels from the system, or document them with the Authorizing Official.
To remove them edit the /etc/ipsec.conf and /etc/ipsec.d/*.conf files removing any lines indicating a conn parameter is configured.
Example: vim /etc/ipsec.conf

Remove and lines with a 'conn' parameter set.

Notes:

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72317

Rule ID: SV-86941r2_rule

STIG ID: RHEL-07-040820

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(7)

Plugin: Unix

Control ID: 1e8890313ba079c504805028af9f5d79f089f578753ed0e0a4728182e67b2b5e