Drop it in firewall.
You should never drop all ICMP or you will silently break things like PMTU discovery. Be more specific with which ICMP types you drop.Drop it in firewall.
How to write firewall rules, I have write it but not work from outside to my router ip
rule is : add chain=forward, protocol=icmp, action = drop
Doesn't Work!Block ICMP packets and allow router to show as a hop on traceroutes;
/ip firewall filter add action=drop chain=forward disabled=yes icmp-options=8:0 protocol=icmp
Of course,Doesn't Work!Block ICMP packets and allow router to show as a hop on traceroutes;
/ip firewall filter add action=drop chain=forward disabled=yes icmp-options=8:0 protocol=icmp
disabled=yes
I did see that LoL. but still not working!Of course,Doesn't Work!Block ICMP packets and allow router to show as a hop on traceroutes;
/ip firewall filter add action=drop chain=forward disabled=yes icmp-options=8:0 protocol=icmpis a very effective way to make non-working firewall rulesCode: Select alldisabled=yes
I did see that LoL. but still not working!Of course,Doesn't Work!Block ICMP packets and allow router to show as a hop on traceroutes;
/ip firewall filter add action=drop chain=forward disabled=yes icmp-options=8:0 protocol=icmpis a very effective way to make non-working firewall rulesCode: Select alldisabled=yes
Does not need to be on top of rules as long as its not blocked by any other rule above./ip firewall filter add action=drop chain=input comment="Drop ICMP on outside IF" in-interface=ether1 log=yes log-prefix=FI_D_ICMP-outside protocol=icmp
_time type dir act rule chain in_if out_if src_mac protocol src_ip src_port dest_ip dest_port City Country
2021-07-29 07:38:30 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 31.192.111.233 na 92.220.x.y na Russia
2021-07-29 06:18:27 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 45.131.68.37 na 92.220.x.y na St Petersburg Russia
2021-07-29 06:02:00 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 110.54.236.38 na 92.220.x.y na San Fernando Philippines
2021-07-29 05:46:48 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 185.94.111.1 na 92.220.x.y na Russia
2021-07-29 03:37:21 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 218.84.127.47 na 92.220.x.y na China
2021-07-29 02:57:15 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 106.76.70.70 na 92.220.x.y na Kolhapur India
2021-07-29 01:53:24 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 110.35.161.178 na 92.220.x.y na Seoul South Korea
2021-07-29 01:34:26 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 140.250.44.225 na 92.220.x.y na Zaozhuang China
2021-07-29 01:16:07 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 155.94.222.154 na 92.220.x.y na Miami United States
2021-07-29 01:11:55 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 154.54.7.158 na 92.220.x.y na United States
2021-07-29 01:02:30 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 196.11.176.22 na 92.220.x.y na Johannesburg South Africa
2021-07-29 01:02:21 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 196.11.176.22 na 92.220.x.y na Johannesburg South Africa
2021-07-29 01:02:17 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 196.11.176.22 na 92.220.x.y na Johannesburg South Africa
2021-07-29 01:02:15 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 196.11.176.22 na 92.220.x.y na Johannesburg South Africa
2021-07-29 01:02:14 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 196.11.176.22 na 92.220.x.y na Johannesburg South Africa
2021-07-29 01:00:44 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 62.115.11.143 na 92.220.x.y na Sweden
2021-07-29 00:23:55 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 176.126.83.129 na 92.220.x.y na Milan Italy
2021-07-29 00:12:33 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.159.229 na 92.220.x.y na United States
2021-07-29 00:12:33 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.159.228 na 92.220.x.y na United States
2021-07-29 00:12:33 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.159.226 na 92.220.x.y na United States
2021-07-29 00:12:33 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.149.205 na 92.220.x.y na United States
2021-07-29 00:12:33 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.149.203 na 92.220.x.y na United States
2021-07-29 00:12:33 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 23.228.199.37 na 92.220.x.y na United States
2021-07-28 23:58:49 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 209.209.59.230 na 92.220.x.y na Los Angeles United States
2021-07-28 23:09:08 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 49.144.224.55 na 92.220.x.y na Lucena City Philippines
2021-07-28 23:09:08 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 49.144.224.55 na 92.220.x.y na Lucena City Philippines
2021-07-28 22:46:08 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 18.183.208.71 na 92.220.x.y na Tokyo Japan
2021-07-28 20:35:03 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 101.80.200.157 na 92.220.x.y na Xuhui China
2021-07-28 20:35:03 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 101.231.198.226 na 92.220.x.y na Shanghai China
2021-07-28 20:02:45 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.159.229 na 92.220.x.y na United States
2021-07-28 20:02:45 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.159.228 na 92.220.x.y na United States
2021-07-28 20:02:45 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.159.226 na 92.220.x.y na United States
2021-07-28 20:02:45 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.149.205 na 92.220.x.y na United States
2021-07-28 20:02:45 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 216.99.149.203 na 92.220.x.y na United States
2021-07-28 20:02:45 F I D FI_D_ICMP-outside input ether1 (unknown 0) 00:05:00:01:00:01 ICMP 23.228.199.37 na 92.220.x.y na United States
Country count percent
United States 319 29.373849
Morocco 210 19.337017
India 74 6.813996
Pakistan 72 6.629834
Philippines 53 4.880295
Australia 53 4.880295
China 46 4.235727
United Kingdom 26 2.394107
Russia 20 1.841621
Belgium 19 1.749540
Top Country pinging me last 7 days
Country count percent
United States 13456 16.513874
China 8960 10.996159
United Kingdom 8193 10.054858
India 7742 9.501368
Germany 4100 5.031724
Philippines 2754 3.379846
Brazil 2383 2.924536
Russia 2189 2.686450
Norway 2005 2.460636
Pakistan 1905 2.337911
OTHER 27796 34.112637
The intelligence agencies G7 + rogue know how to pattern match based on AI systems that constantly monitor/scan the terabytes^42 of data they collect on a constant and persistent basis. In the USA/Canada they have 20+ data centers in secret locations where each data center is humongous is size and scope. Once that pattern is identified they follow that stream with unbridled enthusiasm. Believe it or not 😎And I sincerely hope that the intelligence agencies worldwide know this and use other criteria when identifying the attacks. What politicians make out of their reports is another can of worms of course.
It is the same person who tries to limit torrents nowadays or insists on restricting sites on the internet with layer7...But with all the seriousness... why people block ICMP?
Microsoft suggested it years ago as best practice.. I think it is still blocked in the default OS's firewall rules..But with all the seriousness... why people block ICMP? It's harmful. Even blocking just ECHO and leaving rest of the ICMP alone is at best annoying. Rate limiting this to a reasonable value - sure, but blocking it flat-out is imho more harmful than helpful.
/ip firewall filter
add action=accept chain=input comment="Access Normal Ping" in-interface-list=WAN limit=50/5s,2:packet protocol=icmp
add action=drop chain=input comment="Drop excess pings" in-interface-list=WAN protocol=icmp
/ip firewall filter
add chain=input protocol=icmp action=jump jump-target=icmp
add chain=icmp protocol=icmp icmp-options=0:0 action=accept comment="ICMP echo reply"
add chain=icmp protocol=icmp icmp-options=3:0 action=accept comment="ICMP net unreachable"
add chain=icmp protocol=icmp icmp-options=3:1 action=accept comment="ICMP host unreachable"
add chain=icmp protocol=icmp icmp-options=3:4 action=accept comment="ICMP host unreachable fragmentation required"
add chain=icmp protocol=icmp icmp-options=4:0 action=accept comment="ICMP allow source quench"
add chain=icmp protocol=icmp icmp-options=8:0 action=accept comment="ICMP allow echo request"
add chain=icmp protocol=icmp icmp-options=11:0 action=accept comment="ICMP allow time exceed"
add chain=icmp protocol=icmp icmp-options=12:0 action=accept comment="ICMP allow parameter bad"
add chain=icmp action=drop comment="ICMP deny all other types"
/ip firewall filter
add action=drop chain=input comment="drop echo request" icmp-options=8:0 \ in-interface-list=WAN protocol=icmp
Yes, there is, as suggested above. Allow ICMP to flow freely, except ICMP echo requests if you feel like throttling them to max N per unit of time.is there a better method?
Yes there is a better method.. Leave ICMP alone.Hello,
In order not to create a new topic I want to ask how to properly block ICMP ping? There are many examples that block all icmp. Experts say this is not right. How is it right?
is there a better method?
Thank you!
/ip firewall filter
add chain=input protocol=icmp action=jump jump-target=icmp
add chain=icmp protocol=icmp icmp-options=0:0 action=accept comment="ICMP echo reply"
add chain=icmp protocol=icmp icmp-options=3:0 action=accept comment="ICMP net unreachable"
add chain=icmp protocol=icmp icmp-options=3:1 action=accept comment="ICMP host unreachable"
add chain=icmp protocol=icmp icmp-options=3:4 action=accept comment="ICMP host unreachable fragmentation required"
add chain=icmp protocol=icmp icmp-options=4:0 action=accept comment="ICMP allow source quench"
add chain=icmp protocol=icmp icmp-options=8:0 [b][u]action=DROP [/u][/b]comment="ICMP allow echo request" << =====
add chain=icmp protocol=icmp icmp-options=11:0 action=accept comment="ICMP allow time exceed"
add chain=icmp protocol=icmp icmp-options=12:0 action=accept comment="ICMP allow parameter bad"
add chain=icmp action=drop comment="ICMP deny all other types"
/ip firewall raw
add action=drop chain=prerouting comment="Drop user that has tried ports that are not open and has been added to block list" in-interface=ether1 src-address-list=FW_Block_unkown_port
Regarding this. There are more than just pings going on but that would be an interesting one to track.Just for the fun of it. Here are the blocked ping for 1 year!!
So I will blame US to be the worst countryCode: Select allCountry count percent United States 13456 16.513874 China 8960 10.996159 United Kingdom 8193 10.054858 India 7742 9.501368 Germany 4100 5.031724 Philippines 2754 3.379846 Brazil 2383 2.924536 Russia 2189 2.686450 Norway 2005 2.460636 Pakistan 1905 2.337911 OTHER 27796 34.112637
If you look at all who has tried any non open port (being blocked by this), US IP stays for nearly 20% of the blocked IP