RHEL-06-000320 - The systems local firewall must implement a deny-all, allow-by-exception policy for forwarded packets.

Information

In 'iptables' the default policy is applied only after all the applicable rules in the table are examined for a match. Setting the default policy to 'DROP' implements proper design for a firewall, i.e., any packets which are not explicitly permitted should not be accepted.

Solution

To set the default policy to DROP (instead of ACCEPT) for the built-in FORWARD chain which processes packets that will be forwarded from one interface to another, add or correct the following line in '/etc/sysconfig/iptables':

:FORWARD DROP [0:0]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-218060r603264_rule, STIG-ID|RHEL-06-000320, STIG-Legacy|SV-50487, STIG-Legacy|V-38686, Vuln-ID|V-218060

Plugin: Unix

Control ID: a20fc7c9feaa7801f0e41fb599593d14fd61b6a995dcea153de35b8e888e2868