STIG ID: SLES-15-040382 | SRG: SRG-OS-000480-GPOS-00227 | Severity: medium | CCI: | Vulnerability Id: V-235026
Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unnecessarily transmitted across the network.
Configure the SUSE operating system to not performing IPv6 packet forwarding by default by running the following command as an administrator:
> sudo sysctl -w net.ipv6.conf.default.forwarding=0
If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf":
> sudo sh -c 'echo "net.ipv6.conf.default.forwarding=0" >> /etc/sysctl.d/99-stig.conf'
> sudo sysctl --system
Verify the SUSE operating system is not performing IPv6 packet forwarding by default, unless the system is a router.
Check to see if IPv6 forwarding is disabled by default using the following command:
> sudo sysctl net.ipv6.conf.default.forwarding
net.ipv6.conf.default.forwarding = 0
If the network parameter "ipv6.conf.default.forwarding" is not equal to "0" or nothing is returned, this is a finding.