OL6-00-000096 - The system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.

Information

Enabling reverse path filtering drops packets with source addresses that should not have been able to be received on the interface they were received on. It should not be used on systems which are routers for complicated networks, but is helpful for end hosts and routers serving small networks.

Solution

To set the runtime status of the 'net.ipv4.conf.all.rp_filter' kernel parameter, run the following command:

# sysctl -w net.ipv4.conf.all.rp_filter=1

If this is not the system's default value, add the following line to '/etc/sysctl.conf':

net.ipv4.conf.all.rp_filter = 1

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-208863r793648_rule, STIG-ID|OL6-00-000096, STIG-Legacy|SV-64891, STIG-Legacy|V-50685, Vuln-ID|V-208863

Plugin: Unix

Control ID: 88a8c1532c809bc628975d74f465f649561bb4a68bdd67d1b7698d98ea251fd6