Skip to content

The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.

An XCCDF Rule

Description

Manipulation of IP addresses can allow untrusted systems to appear as trusted hosts, bypassing firewall and other security mechanism and resulting in system penetration.

ID
SV-216400r959010_rule
Version
SOL-11.1-050470
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Determine the name of the zone that you are currently securing.

# zonename

If the command output is "global", then only the "phys" and "SR-IOV" interfaces assigned to the global zone require configuration. If using a non-Global zone, then all "phys" and "SR-IOV" interfaces assigned to the zone require configuration.