SV-230525r627750_rule
V-230525
SRG-OS-000420-GPOS-00186
RHEL-08-040150
CAT II
10
Install "nftables" packages onto the host with the following commands:
$ sudo yum install nftables.x86_64 1:0.9.0-14.el8
Configure the "nftables" service to automatically start after reboot with the following command:
$ sudo systemctl enable nftables.service
Configure "nftables" to be the default "firewallbackend" for "firewalld" by adding or editing the following line in "etc/firewalld/firewalld.conf":
FirewallBackend=nftables
Establish rate-limiting rules based on organization-defined types of DoS attacks on impacted network interfaces.
Verify "nftables" is configured to allow rate limits on any connection to the system with the following commands:
Check that the "nftables.service" is active and running:
$ sudo systemctl status nftables.service
nftables.service - Netfilter Tables
Loaded: loaded (/usr/lib/systemd/system/nftables.service; enabled; vendor preset: disabled)
Active: active (running)
Verify "firewalld" has "nftables" set as the default backend:
$ sudo grep -i firewallbackend /etc/firewalld/firewalld.conf
# FirewallBackend
FirewallBackend=nftables
If the "nftables" is not active, running and set as the "firewallbackend" default, this is a finding.
V-230525
False
RHEL-08-040150
Verify "nftables" is configured to allow rate limits on any connection to the system with the following commands:
Check that the "nftables.service" is active and running:
$ sudo systemctl status nftables.service
nftables.service - Netfilter Tables
Loaded: loaded (/usr/lib/systemd/system/nftables.service; enabled; vendor preset: disabled)
Active: active (running)
Verify "firewalld" has "nftables" set as the default backend:
$ sudo grep -i firewallbackend /etc/firewalld/firewalld.conf
# FirewallBackend
FirewallBackend=nftables
If the "nftables" is not active, running and set as the "firewallbackend" default, this is a finding.
M
2921