10-24-2023 02:18 AM
Dear Expert
i have cisco FTD 2120, and on my firewall Tenable scan found "Firewall UDP Packet Source Port 53 Ruleset Bypass"
But when i check on connection event from outside to inside, and inside to outside, UDP Port 53 and 1025 already blocked,
but on tenable scan still found ICMP request still given to unknown internet IP, can you please advice me, what is policy i need to set for this vulnerabilities
Regards
Yusran
Solved! Go to Solution.
10-26-2023 08:21 AM
To block ICMP use a platform policy setting in FMC. Platform Policy > ICMP Access > Add block for new port object ICMP-Any on your outside interface. Save and deploy.
For FDM-managed devices, use a flexconfig object.
10-24-2023 06:53 AM
Is your ACP rule using application (DNS) or port+protocol (udp/53)?
If it is using DNS application, several packets will be allowed through to allow the firewall to determine the actual application in use. that can sometimes result in false positives from scanning engines like Tenable Nessus.
10-25-2023 06:36 PM
Hello Marvin
Many thanks for your replay, on my ACP im not using DNS or Port (UDP/53) as specified,
can you help me, how to make ICMP request block from unknown ip internet on my cisco firewall
10-26-2023 08:21 AM
To block ICMP use a platform policy setting in FMC. Platform Policy > ICMP Access > Add block for new port object ICMP-Any on your outside interface. Save and deploy.
For FDM-managed devices, use a flexconfig object.
10-26-2023 06:32 PM
Dear Marvin
thanks for your help, i got it
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide