The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
An XCCDF Rule
Description
IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).
- ID
- SV-204629r603261_rule
- Version
- RHEL-07-040820
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Remove all unapproved tunnels from the system, or document them with the ISSO.