[c-nsp] ICMP Filtering on firewall
Joel M Snyder
Joel.Snyder at Opus1.COM
Tue Sep 11 06:58:29 EDT 2007
> We are filtering and rate limiting icmp traffic on our border router
to let
> in&out:
>
> Echo
> Echo-reply
> Unreachable
> Time-exceeded
>
> What about icmp to our firewall's interfaces?
>
> Shouldn't I allow the firewall to respond to or send those icmp
messages as
> well?
>
> What would be the best current practices regarding ICMP traffic ti
> firewalls' interfaces?
In general, no one should be talking TO your firewall (although if you
are doing NAT with the external interface of the firewall, this is a
whole different story) but you. Paranoid types like their firewalls to
operate in stealth mode; these are the guys who don't debug problems
very much.
Rational security folks will allow PING (icmp echo/reply) and Traceroute
(TTL exceeded) error responses.
However, it really is the firewall's job to decide what packets it's
going to send back; that's part of the firewall policy. If you are
"protecting" your firewall with your border router, it's a sign that you
may have configured your firewall incorrectly in the first place. Or,
if you don't trust your firewall to handle its external interface, you
really need to find a firewall you can trust.
Generally, the 'best practice' is to do a first cleaning pass on the
border router for things like spoofed IPs and "noisy" attacks (Slammer
is the most obvious), but otherwise let the firewall's policy determine
what it can/should/will receive and send from the Internet. Some folks
also protect the control plane (i.e., block 22/23/80/443) on the
external address of the firewall, but this shouldn't be strictly
necessary if the firewall is properly configured.
jms
--
Joel M Snyder, 1404 East Lind Road, Tucson, AZ, 85719
Senior Partner, Opus One Phone: +1 520 324 0494
jms at Opus1.COM http://www.opus1.com/jms
More information about the cisco-nsp
mailing list