Skip to content

The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.

An XCCDF Rule

Description

IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).

ID
SV-204629r603261_rule
Version
RHEL-07-040820
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Remove all unapproved tunnels from the system, or document them with the ISSO.