IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).
Check
Verify the system does not have unauthorized IP tunnels configured.
Check to see if "libreswan" is installed with the following command:
# yum list installed libreswan libreswan.x86-64 3.20-5.el7_4
If "libreswan" is installed, check to see if the "IPsec" service is active with the following command:
# systemctl status ipsec ipsec.service - Internet Key Exchange (IKE) Protocol Daemon for IPsec Loaded: loaded (/usr/lib/systemd/system/ipsec.service; disabled) Active: inactive (dead)
If the "IPsec" service is active, check to see if any tunnels are configured in "/etc/ipsec.conf" and "/etc/ipsec.d/" with the following commands: