The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.
An XCCDF Rule
Description
Manipulation of IP addresses can allow untrusted systems to appear as trusted hosts, bypassing firewall and other security mechanism and resulting in system penetration.
- ID
- SV-216400r959010_rule
- Version
- SOL-11.1-050470
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Determine the name of the zone that you are currently securing.
# zonename
If the command output is "global", then only the "phys" and "SR-IOV" interfaces assigned to the global zone require configuration. If using a non-Global zone, then all "phys" and "SR-IOV" interfaces assigned to the zone require configuration.