Watchguard "ICMP Policy" Denys ICMP.

Posted on 2011-09-22
Medium Priority
Last Modified: 2012-08-13
I have a small network with multiple subnets connected to the Watchguard via a router.

For testing, I have created a duplicate network.

The "LAN" subnet is  One machine on that subnet is @ .207.  The router interface is @ .5.

The "Firewall" subnet is  The router interface is @ .2.  The XTM interface is at .1.  Another machine for testing is @ .3.

The XTM 23 has an "Internet" subnet.  The internet port for the XTM is @ .37 and the internet gateway for same is @ .33

The PC @ .3 on the firewall subnet can ping everything in both directions.

The PC @ .207 on the lan subnet can ping up to the internet @ .37 (XTM internet ip), but cannot ping .33.

The syslog shows "Process=firewall Disposition=Deny Policy=ICMP Packet Source IP= Destination IP=x.x.x.33 Source Interface=5-inside Destination Interface=0-ISP Source Port= Destination Port= Protocol=icmp"

But I can't find a firewall policy named "ICMP Packet".
Q1:  Where the heck is it?

I have tried creating firewall policies that permit everything to everywhere from everywhere and nothing works.  It always hits this "ICMP Packet" policy and presto, denied.
Q2:  Where do I place "something" to allow ICMP traffic from the other side of the router to the internet?

Rather frustrated.
Question by:OuttaCyTE
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 3

Expert Comment

ID: 36588248
ICMP is your Ping Policy.
The Ping Policy is usually set from Any-Trusted, Any-Optional to Any.

Author Comment

ID: 36588504
In my firewall policies, I have no "policy name" with the name "ICMP Packet"

I do have one named Ping-in2out, type Ping, From Any, To Any, Port ICMP (Type:8, code: 255), PBR (blank), Application Control none

The above policy is (apparently) not getting matched and I think it should.  Instead I get a policy=ICMP Packet which is denying the packet.


Expert Comment

ID: 36588555
What do you have under Global Settings for the ICMP Error Handling. It appears it is not a Policy, but an internal setting in the Firewall that is causing it.
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!


Author Comment

ID: 36588644

Thank you for responding.

All of them are checked.

(unrelated but is there a way to turn off the webui timeout value?  Does the XTM 23 have an external console - I can't find a serial port but?)


Author Comment

ID: 36588670
More Info

I have another log entry adjacent to this one (before?) that is exactly the same except policy=Internal Policy

I'm assuming the Internal Policy is the inbuilt policy that denys everything.

I unchecked all of the Error handling options and tried again.  Failed same way.


Expert Comment

ID: 36589315
There is not a console port, but you can download the WatchGuard System Manager which is much easier to use than the web interface. I highly recommend you do. The log viewer is much better as well.

Can you post a screen shot of your log file to look through?

Author Comment

ID: 36711819
Is there something that you would like to see?

The only lines in the log having something to do with this problem are the two that I have already documented.

I have set up a syslog server to capture info from the WatchGuard device.  It too only shows those two lines.  Since there isn't any other traffice going on, the log is pretty sparse except for occasional device comm and watchguard messages.


Accepted Solution

OuttaCyTE earned 0 total points
ID: 36932888
You aren't going to believe this.

The problem was because the license keys had not been installed.

I had reset the device to scratch and had not yet installed the keys because I didn't need any of the licensed services.

However it appears that, despite showing good, that some part of the device just won't work without that installed.

The WatchGuard technician (2nd level) noticed we didn't have license keys install and so tried it.  It started working for him so he had me try it from my machines and that did the trick.

Thanks for your efforts

Author Closing Comment

ID: 36954299
WatchGuard supplied the answer.  See notes above

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question