Jump to content

fvmb

Members
  • Posts

    8
  • Joined

  • Last visited

Posts posted by fvmb

  1. 2 hours ago, itman said:

    Below is a screen shot of Eset default firewall rule for inbound IPv4 ICMP including echo reply:

    Eset_ICMP_Echo_Reply.png.2acc2cf8329d8f02842d0971e33d097b.png

    Assuming you want to block inbound IPv4 ICMP echo reply, you need to create a similar rule specifying only ICMP Type/code of "0" less the quote marks. Set the Name field to "Block incoming ICMP echo reply communication." Set Action field to Block. Set Protocol field to ICMP. Set Logging severity to "Warning" if you want the event to be logged. Checkmark the "Notify user" field if you want to alerted to block activity occurring. Click on the OK button to create your rule.

    Your rule will now be positioned at the bottom of all prior existing rules. You now must position the rule using the arrow keys provided to immediately proceeding the existing default incoming ICMP rule. Click on the OK tab and any subsequent shown one to save your changes. Finally, reenter the Firewall rules editor and validate your rule is positioned correctly.

    Note: Eset processes firewall rules in top-to-bottom order. Your created block inbound ICMP echo reply rule will always be executed prior to the existing allow one.    

    Thank you for your help. 

×
×
  • Create New...