The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.

STIG ID: SLES-12-030430  |  SRG: SRG-OS-000480-GPOS-00227 |  Severity: medium |  CCI: CCI-000366 |  Vulnerability Id: V-217296

Vulnerability Discussion

Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unnecessarily transmitted across the network.

Check

Verify the SUSE operating system is not performing IPv4packet forwarding, unless the system is a router.

Check to see if IPv4 forwarding is enabled using the following command:

> sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 0

If the network parameter "ipv4.ip_forward" is not equal to "0" or nothing is returned, this is a finding.

Fix

Configure the SUSE operating system to not performing IPv4 packet forwarding by running the following command as an administrator:

> sudo sysctl -w net.ipv4.ip_forward=0

If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf":

> sudo sh -c 'echo "net.ipv4.ip_forward=0" >> /etc/sysctl.d/99-stig.conf'

> sudo sysctl --system