Skip to content

The Oracle Linux operating system must not have unauthorized IP tunnels configured.

An XCCDF Rule

Description

IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).

ID
SV-221893r991589_rule
Version
OL07-00-040820
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Remove all unapproved tunnels from the system, or document them with the ISSO.