4.1.3 Ensure network interface zone is configured

Information

firewalld zones represent a concept to manage incoming traffic more transparently. The zones are connected to networking interfaces or assigned a range of source addresses. You manage firewall rules for each zone independently, which enables you to define complex firewall settings and apply them to the traffic

Assigning a network interface to a firewalld zone is crucial for applying specific, tailored security policies based on the trust level of the network (e.g., public, home, work). This practice controls traffic flow by determining which rules, services, and ports are allowed or blocked, preventing uncontrolled access.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Run the following command to add the network interface(s) to a firewalld zone:

# firewall-cmd --permanent --zone={ZONE_NAME} --add-interface={INTERFACE}

Example:

# firewall-cmd --zone=public --add-interface=eth0 --permanent

Note: The zone assignment in the example is the zone public . Interfaces should be assigned to the appropriate zone following local site policy.

See Also

https://workbench.cisecurity.org/benchmarks/25279

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CA-9, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.4

Plugin: Unix

Control ID: 14a6e1f15049f2f100485ced8f3747fd8fda0f47ec65bde930b03640b5572e61