STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 10 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 X86 Security Technical Implementation Guide

V-216143

CAT II (Medium)

The system must disable network routing unless required.

Rule ID

SV-216143r959010_rule

STIG

Solaris 11 X86 Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000366

Discussion

The network routing daemon, in.routed, manages network routing tables. If enabled, it periodically supplies copies of the system's routing tables to any directly connected hosts and networks and picks up routes supplied to it from other networks and hosts. Routing Internet Protocol (RIP) is a legacy protocol with a number of security weaknesses, including a lack of authentication, zoning, pruning, etc.

Check Content

Determine if routing is disabled. 

# routeadm -p | egrep "routing |forwarding" | grep enabled

If the command output includes "persistent=enabled" or "current=enabled", this is a finding.

Fix Text

The Network Management profile is required.

Disable routing for IPv4 and IPv6.

# pfexec routeadm -d ipv4-forwarding -d ipv4-routing
# pfexec routeadm -d ipv6-forwarding -d ipv6-routing

To apply these changes to the running system, use the command:

# pfexec routeadm -u