Information
Attackers could use bogus ICMP redirect messages to maliciously alter the system routing tables and get them to send packets to incorrect networks and allow your system packets to be captured.
Solution
Set the following parameters in the /etc/sysctl.conf file - net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.default.accept_redirects = 0 Run the following commands to set the active kernel parameters - # sysctl -w net.ipv4.conf.all.accept_redirects=0
# sysctl -w net.ipv4.conf.default.accept_redirects=0
# sysctl -w net.ipv4.route.flush=1