ICMP flood attack filtering - [Steps To Avoid]

Internet Control Message Protocol (ICMP) flood attack is  also known as Ping flood attack. It is a common Denial-of-Service (DoS) attack. In an ICMP flood attack filtering, hackers target a particular device with ICMP echo-requests (pings). ICMP echo-request and echo-reply messages are particularly used to ping a network device to find the health and connectivity of the device. It shows the connection between the sender and the device. It will make the target inaccessible to normal traffic. The attacker needs to know the IP address of the target. The protection level is based on the traffic pocket’s number, and the protection will be activated when the number of packets crosses the preset threshold value. You can set the value from the Advanced section. Select System Tools and go to System Parameters. Select DOS Protection Level Settings to see the host list. Consider the procedure that is given below to activate ICMP flood attack filter.

  • Step 1 :Go to the web-based interface of the router from your browser.
  • Step 2 :Navigate to theAdvanced  Select Security and go to Settings.
  • Step 3 :Now, click on the toggle switch next toDoS Protection to enable it.
  • Step 4 :You can set the levels asOffLowMiddle, or High for ICMP-FLOOD Attack Filtering, UDP-FlOOD Attack Filtering, and TCP-SYN-FLOOD Attack Filtering.
  • Step 5 :When ICMP-FLOOD Attack Filtering is enabled, it prevents the ICMP (Internet Control Message Protocol) flood attack.
  • Step 6 :If UDP-FlOOD Attack Filtering is enabled, it prevents UDP (User Datagram Protocol) flood attack.
  • Step 7 :When TCP-SYN-FLOOD Attack Filtering is enabled, it prevents the TCP-SYN (Transmission Control Protocol-Synchronize) flood attack.
  • Step 8 :To ignore the ping packets fromthe WAN port, click the Ignore Ping Packet From WAN Port  To ignore the ping packets from the LAN port, select the Ignore Ping Packet From LAN Port option. Click on the Save button.
  • Step 9 :You have now successfully enabled ICMP flood attack filtering.