Other Articles

Servers – Ensure Loopback Traffic is Configured

Support > Fixing Checks > Server

06 March, 2026

This check ensures that loopback traffic is properly configured on the server.

Loopback traffic is essential for internal communication between system processes. Improper configuration may allow spoofed traffic, leading to potential security risks.

Check Details

  • Resource: Server
  • Check: Ensure loopback traffic is configured
  • Risk: Allowing external traffic to use loopback addresses may result in spoofing attacks and compromise system integrity.

Remediation Steps

  1. Open a terminal session with root or sudo privileges.
  2. Apply the following firewall rules to configure loopback traffic:

    iptables -A INPUT -i lo -j ACCEPT
    iptables -A OUTPUT -o lo -j ACCEPT
    iptables -A INPUT -s 127.0.0.0/8 -j DROP
    
  3. Verify the rules are applied correctly:

    iptables -L INPUT -v -n
    iptables -L OUTPUT -v -n
    
  4. Ensure:

    • Loopback interface (lo) traffic is allowed
    • Outgoing loopback traffic is allowed
    • Incoming traffic from 127.0.0.0/8 on non-loopback interfaces is dropped
  5. Persist firewall rules to ensure they remain after reboot (depends on your system setup).
  6. Re-run verification commands to confirm compliance.

Additional Information

Warning: Modifying firewall rules over a remote connection may result in losing access to the system if not configured properly.

Note: The loopback interface is used for internal communication within the system. These rules ensure secure handling of loopback traffic while preventing spoofing from external interfaces.