3.5.3.3.1 Ensure ip6tables default deny firewall policy - 'Chain FORWARD'

Information

A default deny all policy on connections ensures that any unconfigured network usage will be rejected.

Note:

Changing firewall settings while connected over network can result in being locked out of the system

Remediation will only affect the active system firewall, be sure to configure the default policy in your firewall management to apply on boot as well

Rationale:

With a default accept policy the firewall will accept any packet that is not configured to be denied. It is easier to white list acceptable usage than to black list unacceptable usage.

Solution

Run the following commands to implement a default DROP policy:

# ip6tables -P INPUT DROP
# ip6tables -P OUTPUT DROP
# ip6tables -P FORWARD DROP

See Also

https://workbench.cisecurity.org/files/3219

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CSCv7|9.4

Plugin: Unix

Control ID: 69460e8dc5c66309a71f6055bb601d98283a8ae44844bf7157afae7b62063ad2