Skip to content

RHEL 9 must not have unauthorized IP tunnels configured.

An XCCDF Rule

Description

IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the information system security officer (ISSO).

ID
SV-257950r1045006_rule
Version
RHEL-09-252045
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Remove all unapproved tunnels from the system, or document them with the ISSO.