STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The systems local IPv6 firewall must implement a deny-all, allow-by-exception policy for inbound packets.

DISA Rule

SV-219588r603263_rule

Vulnerability Number

V-219588

Group Title

SRG-OS-000480

Rule Version

OL6-00-000523

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To set the default policy to DROP (instead of ACCEPT) for the built-in INPUT chain which processes incoming packets, add or correct the following line in "/etc/sysconfig/ip6tables":

:INPUT DROP [0:0]

Restart the IPv6 firewall:

# service ip6tables restart

Check Contents

If IPv6 is disabled, this is not applicable.

Inspect the file "/etc/sysconfig/ip6tables" to determine the default policy for the INPUT chain. It should be set to DROP:

# grep ":INPUT" /etc/sysconfig/ip6tables

If the default policy for the INPUT chain is not set to DROP, this is a finding.

Vulnerability Number

V-219588

Documentable

False

Rule Version

OL6-00-000523

Severity Override Guidance

If IPv6 is disabled, this is not applicable.

Inspect the file "/etc/sysconfig/ip6tables" to determine the default policy for the INPUT chain. It should be set to DROP:

# grep ":INPUT" /etc/sysconfig/ip6tables

If the default policy for the INPUT chain is not set to DROP, this is a finding.

Check Content Reference

M

Target Key

2928

Comments