- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Gaia 81.10/Quantum 6200: Can I drop ICMP redir...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Gaia 81.10/Quantum 6200: Can I drop ICMP redirect packets without logging?
My firewall gets a lot of ICMP requests that are dropped (reason: ICMP redirect packets are not allowed). Is it possible to have them dropped without logging?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, see https://support.checkpoint.com/results/sk/sk112772 for allowing ICMP redirect packets - then an Access policy as suggested by PhoneBoy will work!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes you should be able to create an Access Policy rule that does this.
The Track field for this rule should contain “None.”
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
seems like this doesn't work. ICMP rediret packets are dropped (and logged) before my policies are applied?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What precise rule is it logging on?
If it's Rule 0, check the Implied Rules in Global Properties.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's not an implied rule. See the screenshot in my first post, it says "Policy Name: Standard", and no rule number
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, see https://support.checkpoint.com/results/sk/sk112772 for allowing ICMP redirect packets - then an Access policy as suggested by PhoneBoy will work!
