ICMP Access
By default, you can send ICMP packets to any interface using either IPv4 or IPv6, with these exceptions:
-
The threat defense does not respond to ICMP echo requests directed to a broadcast address.
-
The threat defense only responds to ICMP traffic sent to the interface that traffic comes in on; you cannot send ICMP traffic through an interface to a far interface.
To protect the device from attacks, you can use ICMP rules to limit ICMP access to interfaces to particular hosts, networks, or ICMP types. ICMP rules function like access rules, where the rules are ordered, and the first rule that matches a packet defines the action.
If you configure any ICMP rule for an interface, an implicit deny ICMP rule is added to the end of the ICMP rule list, changing the default behavior. Thus, if you want to simply deny a few message types, you must include a permit any rule at the end of the ICMP rule list to allow the remaining message types.
We recommend that you always grant permission for the ICMP unreachable message type (type 3). Denying ICMP unreachable messages disables ICMP path MTU discovery, which can halt IPsec and PPTP traffic. Additionally ICMP packets in IPv6 are used in the IPv6 neighbor discovery process.
Before you begin
Ensure that the objects needed in the rules already exist. Select or groups that define the desired hosts or networks, and port objects that define the ICMP message types you want to control.
to configure objects. You need network objectsProcedure
Step 1 | Choose threat defense policy. and create or edit the |
Step 2 | Select ICMP Access. |
Step 3 | Configure ICMP rules. |
Step 4 | (Optional.) Set rate limits on ICMPv4 Unreachable messages.
|
Step 5 | Click Save. You can now go to and deploy the policy to assigned devices. The changes are not active until you deploy them. |