Description |
This article describes how to configure FortiSwitch to filter ICMP type 3 messages (for the contextual sake ICMP Type 3 code 3 will be blocked) on FortiSwitch to avoid them from reaching FortiGate.
To block ICMP Unreachable messages (Type3) due to security reasons (e.g. preventing BlackNurse attack):
Check the article Troubleshoot Tip: How ip-conn Log ID 0000000011 dns logs are generated to understand how FortiGate ip-conn app='DNS' logs are generated. |
Scope | FortiSwitch. |
Solution |
The following diagram shows how FortiSwitch and FortiGate connect.
If for example, an ICMP packet with Type 3 and code 1 reaches FortiGate (FG01) it will generate a ip-conn log message as described in the article Troubleshoot Tip: How ip-conn Log ID 0000000011 dns logs are generated
If FortiGate is connected to a FortiAnalyzer and has multiple computers generating such ICMP messages FortiAnalyzer will have multiple logs 'IP Connection error'.
Add the following command on FortiSwitch to block ICMP Type 3 code 3. Codes 0, ,1, and 4 can also be added if necessary.
FortiSwitch01# config switch acl service custom FortiSwitch01# config switch acl ingress
Related articles: Technical Tip: Blocking ICMP Unreachable Messages by using interface-policy |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.