RHEL-07-040820 - The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.

Information

IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).

Solution

Remove all unapproved tunnels from the system, or document them with the ISSO.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_7_V3R5_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(7), CAT|II, CCI|CCI-000366, Rule-ID|SV-204629r603261_rule, STIG-ID|RHEL-07-040820, STIG-Legacy|SV-86941, STIG-Legacy|V-72317, Vuln-ID|V-204629

Plugin: Unix

Control ID: 54e65aa4c577d026a3ecd4e8b3a7c5c308f92888e70342897f342150bbcdb672