Hi,
We have been getting attack 2 times a day.
Under the tourch I see
protocol src-address dest-address Tx Rx
icmp 0.0.0.0 one of the interface address 0 512K rate
We are running 2.8.3
After going through 2.9 manual I configered following to stop icmp attack in the forward and input chain. It seems it is not making any difference.
Last night I put the following rules, (rule 0 to 5 were after rule 15). Inspite of putting such rule I did not see any difference. I still saw the attack today.
What am I missing? How can I prevent this?
Thanks,
Tushar
Forward Chain
0 src-address=/8 action=drop
1 dst-address=/8 action=drop
2 src-address=127.0.0.0/8 action=drop
3 dst-address=127.0.0.0/8 action=drop
4 src-address=224.0.0.0/3 action=drop
5 dst-address=224.0.0.0/3 action=drop
6 X protocol=icmp action=drop
7 X protocol=icmp action=drop
8 ;;; drop invalid connections
protocol=icmp icmp-options=0:0 action=accept
9 ;;; allow established connections
protocol=icmp icmp-options=3:0 action=accept
10 ;;; allow already established connections
protocol=icmp icmp-options=3:1 action=accept
11 ;;; allow source quench
protocol=icmp icmp-options=4:0 action=accept
12 ;;; allow echo request
protocol=icmp icmp-options=8:0 action=accept
13 ;;; allow time exceed
protocol=icmp icmp-options=11:0 action=accept
14 ;;; allow parameter bad
protocol=icmp icmp-options=12:0 action=accept
15 ;;; deny all other types
protocol=icmp action=drop
input
0 X dst-address=10.1.253.33/32 protocol=icmp action=drop
1 X protocol=icmp action=drop
2 ;;; drop invalid connctions
protocol=icmp icmp-options=0:0 action=accept
3 ;;; allow established connections
protocol=icmp icmp-options=3:0 action=accept
4 ;;; allow already establish connections
protocol=icmp icmp-options=3:1 action=accept
5 ;;; allow source quench
protocol=icmp icmp-options=4:0 action=accept
6 ;;; allow echo request
protocol=icmp icmp-options=8:0 action=accept
7 ;;; allow time exceed
protocol=icmp icmp-options=11:0 action=accept
8 ;;; allow parameter bad
protocol=icmp icmp-options=12:0 action=accept
9 ;;; deny all other types
protocol=icmp action=drop