3.5.4 Ensure IP tunnels are not configured

Information

The operating system must not have unauthorized IP tunnels configured.

Rationale:

IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the the Authorizing Official of the organization.

Solution

Remove all unapproved tunnels from the system, or document them with the Authorizing Official.
To remove them edit the /etc/ipsec.conf and /etc/ipsec.d/*.conf files removing any lines indicating a conn parameter is configured.
Example: vim /etc/ipsec.conf

Remove and lines with a 'conn' parameter set.

See Also

https://workbench.cisecurity.org/files/3636

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CCI|CCI-000366, CSCv7|9.4, Rule-ID|SV-204629r603261_rule, STIG-ID|RHEL-07-040820

Plugin: Unix

Control ID: 2a6c715cbc2c03ade56c326e7edb2ea8d6afa66e61bd3b0cb790b0512e460003