PANW-IP-000031 - The Palo Alto Networks security platform must block malicious ICMP packets.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Internet Control Message Protocol (ICMP) messages are used to provide feedback about problems in the network. These messages are sent back to the sender to support diagnostics. However, ICMP can be misused to provide a covert channel. ICMP tunneling is when an attacker injects arbitrary data into an echo packet and sends to a remote computer. The remote computer injects an answer into another ICMP packet and sends it back. The creates a covert channel where an attacker can hide commands sent to a compromised host or a compromised host can exfiltrate data.

Solution

To configure the security policy:
Go to Policies >> Security
Select 'Add'.
In the 'Security Policy Rule' window, complete the required fields.
In the 'General' tab, complete the 'Name' and 'Description' fields.
In the 'Source' tab, complete the 'Source Zone' and 'Source Address' fields.
For the 'Source Zone' field, select 'external'.
For the 'Source Address' field, select 'any'.
In the 'Destination' tab, complete the 'Destination Zone' and 'Destination Address' fields.
For the 'Destination Zone' field, select the internal and DMZ zones.
Note: the exact number and name of zones is specific to the network.

For the 'Destination Address' field, select 'any'.
In the 'Applications' tab, select 'icmp', 'ipv6-icmp', 'traceroute'.
In the 'Actions' tab, select 'Deny' as the resulting action. Select the required Log Setting and Profile Settings as necessary.
Commit changes by selecting 'Commit' in the upper-right corner of the screen. Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001312, Rule-ID|SV-207699r557390_rule, STIG-ID|PANW-IP-000031, STIG-Legacy|SV-77159, STIG-Legacy|V-62669, Vuln-ID|V-207699

Plugin: Palo_Alto

Control ID: 191625d7d4d0c00fc80c515dadd3d36ea9e12728011ba2ec2ab568a9ed35aa71