04-08-2003 11:03 AM - edited 02-20-2020 10:40 PM
Does anyone knows what would happen if a forged ICMP echo reply packet coming from the Internet to a inside host hit the outside interface of the Pix?.
The inside host is static translated on the pix. And an ACL which permits ICMP echo-reply, time-exceeded, source-quench and unreachble to the inside host is configured.
What the Pix will do?
Regards,
Carlos Roque
04-08-2003 04:52 PM
The PIX doesn't do stateful inspection of ICMP packets as far as I'm aware, so if an echo-reply came in, even without an echo having first gone out, I would say the packet will be allowed in to the internal host.
04-22-2003 10:43 AM
Ok, you are right the pix does not perform stateful inspection on ICMP packets, but since there was not connection originated from the inside interface it should block the ICMP reply packet once it hits the outside interface.
Regrads,
Carlos Roque
04-23-2003 04:36 AM
For the icmp packets to cross the PIX it needs a translation rule and an access list rule to permit it. In your example, the translation rule is there with the static and you have specified the acl to allow the echo-reply in. My money would be on that the packet would be allowed in.
Hope it helps.
Steve
04-24-2003 08:45 AM
Right,
But how come the Pix will allow this if there was not an ICMP echo connection originated from the internal host ?.
If you are correct, then the Pix is not performing its job in securing the inside segment. I am pretty sure Checkpoint Firewall-1 will not allow this to go trough it.
Anyone could hijack resources located either on a DMZ or inside LAN.
Regards,
Carlos Roque
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide