STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215355

CAT II (Medium)

The AIX DHCP client must be disabled.

Rule ID

SV-215355r958478_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366CCI-000381

Discussion

The dhcpcd daemon receives address and configuration information from the DHCP server. DHCP relies on trusting the local network. If the local network is not trusted, then it should not be used. To prevent remote attacks this daemon should not be enabled unless there is no alternative. Satisfies: SRG-OS-000095-GPOS-00049, SRG-OS-000480-GPOS-00227

Check Content

If the DHCP client is needed by the system and is documented, this is Not Applicable. 

Determine if the DHCP client is running: 

# ps -ef |grep dhcpcd 

If "dhcpcd" is running, this is a finding.

Verify that DHCP is disabled on startup:

# grep "^start[[:blank:]]/usr/sbin/dhcpcd" /etc/rc.tcpip

If there is any output from the command, this is a finding.

Fix Text

Disable the system's DHCP client. 

In "/etc/rc.tcpip", comment out the "dhcpcd" entry by running command:

# chrctcp -d dhcpcd

Reboot the system to ensure the DHCP client has been disabled fully. 

Configure a static IP for the system, if network connectivity is required.