Description | This article describes how to block ICMP timestamps and replies for internal traffic that originates from behind the FortiGate. |
Scope | FortiGate. |
Solution |
This article demonstrates an example of how to block ICMP timestamps and replies for internal traffic that originates from behind the FortiGate.
The goal is to block ICMP timestamp and replies that originated from machine behind port 1 going to ANY internal interface.
edit "TIMESTAMP" edit "TIMESTAMP_Replies"
Note: 'edit 1' is an example of a new policy. The ID sequence should be followed to avoid overwriting an existing firewall policy with ID 1.
Results:
After the traffic is initiated:
ICMP timestamp traffic is being denied.
Note: By default, normal ping through Windows does not send ICMP timestamp requests in it.
To test the ICMP timestamp traffic, a tool such as hping3 or Nmap can be used to generate traffic. https://linux.die.net/man/8/hping3 |