Information
Any ports that have been opened on non-loopback addresses need firewall rules to govern traffic.
Without a firewall rule configured for open ports default firewall policy will drop all packets to these ports.
Note:
- Changing firewall settings while connected over network can result in being locked out of the system.
- The remediation command opens up the port to traffic from all sources. Consult iptables documentation and set any restrictions in compliance with site policy.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
For each port identified in the audit which does not have a firewall rule establish a proper rule for accepting inbound connections:
# iptables -A INPUT -p <protocol> --dport <port> -m state --state NEW -j ACCEPT
Item Details
Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT
References: 800-53|AC-17(1), 800-53|CM-7, 800-53|CM-7b., CAT|II, CCI|CCI-000382, CCI|CCI-002314, CSCv7|9.2, CSCv7|9.4, Rule-ID|SV-204577r603261_rule, STIG-ID|RHEL-07-040100, Vuln-ID|V-204577
Control ID: d0adfa6aa7227266117f401f8119d594f94e8986d3b2b34589f59df836b6d062