AIX7-00-003143 - AIX must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.

Information

Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It also permits outbound connections that may facilitate exfiltration of DoD data.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

From the command prompt, run the following commands to create and activate 'ipsec_v4' and 'ipsec_v6' devices:
# mkdev -l ipsec -t 4
# mkdev -l ipsec -t 6

From the command prompt, run the following commands to change the 'all traffic' rules to block all packages:
# chfilt -a D -v 4 -n 0
# chfilt -a D -v 6 -n 0

Assume that the local host has IP address 10.10.10.10 and the remote host has IP address 11.11.11.11, run the following command to generate a user-defined filter rule that allow all IPv4 traffic between these 2 hosts:
# genfilt -w B -v 4 -s 10.10.10.10 -p 0 -P 0 -o any -O any -m 255.255.255.255 -M 255.255.255.255 -i all -g Y -d 11.11.11.11 -c all -a P

From the command prompt, run the following command to activate all the filter rules in the rule database:
# mkfilt -u

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R9_STIG.zip

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT

References: 800-53|CA-3(5), 800-53|CM-6b., CAT|II, CCI|CCI-000366, CCI|CCI-002080, Rule-ID|SV-219057r853494_rule, STIG-ID|AIX7-00-003143, STIG-Legacy|SV-101869, STIG-Legacy|V-91771, Vuln-ID|V-219057

Plugin: Unix

Control ID: 9a32d7fc9223d3a7e55c79d603c04e48d1f4c7634ebf3a7ec7b43d5b0efd339b