Home > Security Appliances > Firewall and Traffic Shaping > Denying Inbound ICMP on the MX

Denying Inbound ICMP on the MX

Table of contents
No headers

Pinging the Internet interface of a network edge device is a convenient way to ensure public-facing services such as Client VPN are functioning properly. However, this leaves the network vulnerable to an outside attacks on the LAN. 

The MX Security Appliance responds to ICMP ping by default but can be configured to reply to specific IP addresses or none at all. 

Configuration

 

1. Log on to your Dashboard and navigate to Configure > Firewall. 

2. In the section labeled Appliance services,  you will see the option ICMP Ping.

3. The text box for this option allows you to specify remote access rules for the local status page. The below options can be used:

a) Any - The MX will reply to all pings from external IP addresses. This is not a recommended setting since it opens your network to anyone on the Internet.
b) None - The MX will not reply to pings from any external IP addresses.

c) Allowed remote IPs -  The remote IP address(s) written in CIDR notation you would like to give remote access to.  A comma separated list of IP addresses can be entered if specifying multiple subnets.

You must to post a comment.
Last modified
17:38, 28 Aug 2017

Tags

Classifications

This page has no classifications.

Explore Meraki

You can find out more about Cisco Meraki on our main site, including information on products, contacting sales and finding a vendor.

Explore Meraki

Contact Support

Most questions can be answered by reviewing our documentation, but if you need more help, Cisco Meraki Support is ready to work with you.

Open a Case

Ask the Community

In the Meraki Community, you can keep track of the latest announcements, find answers provided by fellow Meraki users and ask questions of your own.

Visit the Community