STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The systems local firewall must implement a deny-all, allow-by-exception policy for forwarded packets.

DISA Rule

SV-219579r603263_rule

Vulnerability Number

V-219579

Group Title

SRG-OS-000480

Rule Version

OL6-00-000320

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To set the default policy to DROP (instead of ACCEPT) for the built-in FORWARD chain which processes packets that will be forwarded from one interface to another, add or correct the following line in "/etc/sysconfig/iptables":

:FORWARD DROP [0:0]

Check Contents

Run the following command to ensure the default "FORWARD" policy is "DROP":

grep ":FORWARD" /etc/sysconfig/iptables

The output must be the following:

# grep ":FORWARD" /etc/sysconfig/iptables
:FORWARD DROP [0:0]

If it is not, this is a finding.

Vulnerability Number

V-219579

Documentable

False

Rule Version

OL6-00-000320

Severity Override Guidance

Run the following command to ensure the default "FORWARD" policy is "DROP":

grep ":FORWARD" /etc/sysconfig/iptables

The output must be the following:

# grep ":FORWARD" /etc/sysconfig/iptables
:FORWARD DROP [0:0]

If it is not, this is a finding.

Check Content Reference

M

Target Key

2928

Comments