Check: RHEL-06-000120
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000120
(in versions v2 r2 through v1 r18)
Title
The systems local IPv4 firewall must implement a deny-all, allow-by-exception policy for inbound packets. (Cat II impact)
Discussion
In "iptables" the default policy is applied only after all the applicable rules in the table are examined for a match. Setting the default policy to "DROP" implements proper design for a firewall, i.e., any packets which are not explicitly permitted should not be accepted.
Check Content
Run the following command to ensure the default "INPUT" policy is "DROP": # iptables -nvL | grep -i input Chain INPUT (policy DROP 0 packets, 0 bytes) If the default policy for the INPUT chain is not set to DROP, this is a finding.
Fix Text
To set the default policy to DROP (instead of ACCEPT) for the built-in INPUT chain which processes incoming packets, add or correct the following line in "/etc/sysconfig/iptables": :INPUT DROP [0:0]
Additional Identifiers
Rule ID: SV-217933r603264_rule
Vulnerability ID: V-217933
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000066 |
The organization enforces requirements for remote connections to the information system. |
CCI-000366 |
The organization implements the security configuration settings. |
CCI-001109 |
The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception). |
CCI-002314 |
The information system controls remote access methods. |