Security Policy to Allow/Deny a Certain ICMP Type

Security Policy to Allow/Deny a Certain ICMP Type

51237
Created On 09/25/18 17:27 PM - Last Modified 04/20/20 22:37 PM


Resolution

Overview

There are cases where only a specific  Internet Control Message Protocol (ICMP) type should be allowed, instead of allowing all ICMP types. ICMP is used as a network diagnostic tool, and is classified into two main categories based upon its functionality:

  • Error-Reporting Messages (Type 3,4,5,11,12) - The error reporting messages reports problems that a router or a destination host may encounter when it tries to process an IP packet.
  • Query Messages (Type 0,8,13,14) - The query messages, which occur in pairs, help a host or a network manager get specific information from a router or another host.

The error reporting messages are good for admins, because they can diagnose the network based upon this information. However, with the help of query messages, there is a good chance that even a hacker can obtain potential information from the network. There must be a mechanism to allow ICMP types that are useful, and to deny the ones that cause harm. At the application layer, identification is based on the Application ICMP and not based upon the codes, however, the Palo Alto Networks firewall has a mechanism to allow or deny specific ICMP types.

Resolution

For example, to allow only ICMP echo requests but deny the rest of ICMP traffic, create a custom app for the ICMP traffic based on the ICMP packet type (8). For this kind of custom application, it is not necessary to create an application override policy as in the case of tcp/udp traffic.

To block specific ICMP type messages, create a custom application for each type:

  1. Go to Objects > Applications > Add and create a custom name (for this scenario, Block Type 13 Messages was used) and specify a category:
    1.JPG
  2. Go to Advanced, click ICMP Type, and specify the required types separated by commas:
    2.JPG
  3. Save the application and name it a deny policy (shown in example), placed on the top of Policies from any-to-any zone so all the traffic denies this application:
    3.JPG4.JPG
    To block ICMP Type 8:
    Screen Shot 2013-03-14 at 5.35.02 PM.png
    The custom application can then be applied in a security policy.
    Screen Shot 2013-03-14 at 5.36.45 PM.png

owner: ymiyashita



Attachments
Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFZCA0&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Attachments
Choose Language