<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat signature for ICMP type in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/430920#M406</link>
    <description>&lt;P&gt;Cool idea!&amp;nbsp; Just like the GitHub code on HTTP response codes for visibility.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This configuration works for Type 8 and Type 0:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tyoung@fdslcofw01# show | match 4400&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to value 0&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to context icmp-rsp-code&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to negate no&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code order-free yes&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code scope protocol-data-unit&lt;BR /&gt;set threats vulnerability 44000 default-action alert&lt;BR /&gt;set threats vulnerability 44000 threatname "ICMP Type 0"&lt;BR /&gt;set threats vulnerability 44000 severity informational&lt;BR /&gt;set threats vulnerability 44000 direction both&lt;BR /&gt;set threats vulnerability 44000 affected-host client yes&lt;BR /&gt;set threats vulnerability 44000 affected-host server yes&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match pattern 8&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match context icmp-req-data&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match negate no&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data order-free yes&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data scope protocol-data-unit&lt;BR /&gt;set threats vulnerability 44008 default-action alert&lt;BR /&gt;set threats vulnerability 44008 threatname "ICMP Type 8"&lt;BR /&gt;set threats vulnerability 44008 severity informational&lt;BR /&gt;set threats vulnerability 44008 direction both&lt;BR /&gt;set threats vulnerability 44008 affected-host client yes&lt;BR /&gt;set threats vulnerability 44008 affected-host server yes&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44008 action default&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44008 packet-capture disable&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44000 action default&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44000 packet-capture disable&lt;BR /&gt;[edit]&lt;BR /&gt;tyoung@fdslcofw01# exit&lt;BR /&gt;Exiting configuration mode&lt;BR /&gt;tyoung@fdslcofw01&amp;gt; show bad-custom-signature&lt;/P&gt;&lt;P&gt;bad performance custom signature list:&lt;BR /&gt;TID: 44008, Vsys 1, Context: icmp-req-data, Pattern: 8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I did get the following commit warning:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Warning: one or more custom signatures have big performance impact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Please see details in CLI "show bad-custom-signature"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see the command output above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is one strange behavior.&amp;nbsp; I enabled the signatures in 1 VP, but it logs for all.&amp;nbsp; See step 4 in &lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature.html#id47dc678c-114e-4e57-a4ad-a5ed6962d770" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature.html#id47dc678c-114e-4e57-a4ad-a5ed6962d770&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Sep 2021 01:42:47 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2021-09-02T01:42:47Z</dc:date>
    <item>
      <title>Threat signature for ICMP type</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/430873#M405</link>
      <description>&lt;P&gt;Has anyone had success in creation of threat signatures for ICMP type?&amp;nbsp; I've seen (and tested) the Palo Alto guide on creation of an app to block/allow specific ICMP types and was trying to log a threat event for potential use and visibility versus creation of a new application (and needing to create a new app-id group to accommodate all ICMP types)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFZCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Working app-id CLI:&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set application icmp-type8 default ident-by-icmp-type type 8&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set application icmp-type8 subcategory ip-protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set application icmp-type8 category networking&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set application icmp-type8 technology network-protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set application icmp-type8 risk 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Non working threat CLI:&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match pattern 8&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match context icmp-req-data&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match negate no&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 signature standard icmp-req-data order-free no&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 signature standard icmp-req-data scope protocol-data-unit&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 default-action alert&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 threatname chrisvuln-icmp-type8&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 severity informational&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 direction both&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 comment "ICMP type 8"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;set threats vulnerability 44008 affected-host client yes&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 19:05:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/430873#M405</guid>
      <dc:creator>Chris_Johnston</dc:creator>
      <dc:date>2021-09-01T19:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Threat signature for ICMP type</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/430920#M406</link>
      <description>&lt;P&gt;Cool idea!&amp;nbsp; Just like the GitHub code on HTTP response codes for visibility.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This configuration works for Type 8 and Type 0:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tyoung@fdslcofw01# show | match 4400&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to value 0&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to context icmp-rsp-code&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to negate no&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code order-free yes&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code scope protocol-data-unit&lt;BR /&gt;set threats vulnerability 44000 default-action alert&lt;BR /&gt;set threats vulnerability 44000 threatname "ICMP Type 0"&lt;BR /&gt;set threats vulnerability 44000 severity informational&lt;BR /&gt;set threats vulnerability 44000 direction both&lt;BR /&gt;set threats vulnerability 44000 affected-host client yes&lt;BR /&gt;set threats vulnerability 44000 affected-host server yes&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match pattern 8&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match context icmp-req-data&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match negate no&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data order-free yes&lt;BR /&gt;set threats vulnerability 44008 signature standard icmp-req-data scope protocol-data-unit&lt;BR /&gt;set threats vulnerability 44008 default-action alert&lt;BR /&gt;set threats vulnerability 44008 threatname "ICMP Type 8"&lt;BR /&gt;set threats vulnerability 44008 severity informational&lt;BR /&gt;set threats vulnerability 44008 direction both&lt;BR /&gt;set threats vulnerability 44008 affected-host client yes&lt;BR /&gt;set threats vulnerability 44008 affected-host server yes&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44008 action default&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44008 packet-capture disable&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44000 action default&lt;BR /&gt;set profiles vulnerability Internal-VP threat-exception 44000 packet-capture disable&lt;BR /&gt;[edit]&lt;BR /&gt;tyoung@fdslcofw01# exit&lt;BR /&gt;Exiting configuration mode&lt;BR /&gt;tyoung@fdslcofw01&amp;gt; show bad-custom-signature&lt;/P&gt;&lt;P&gt;bad performance custom signature list:&lt;BR /&gt;TID: 44008, Vsys 1, Context: icmp-req-data, Pattern: 8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I did get the following commit warning:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Warning: one or more custom signatures have big performance impact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Please see details in CLI "show bad-custom-signature"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see the command output above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is one strange behavior.&amp;nbsp; I enabled the signatures in 1 VP, but it logs for all.&amp;nbsp; See step 4 in &lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature.html#id47dc678c-114e-4e57-a4ad-a5ed6962d770" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature.html#id47dc678c-114e-4e57-a4ad-a5ed6962d770&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 01:42:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/430920#M406</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-09-02T01:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: Threat signature for ICMP type</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/431091#M407</link>
      <description>&lt;P&gt;Makes sense it would log in all, unless you went into each VP and marked it as 'ignore'.&amp;nbsp; That was the challenge with creation of app - it overrides all other icmp apps and unless you create a new application group 'icmp-all' that included icmp and the customs....potential for things to be missed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&amp;nbsp; Actually, no...doesn't make sense on the VP now looking in depth.&amp;nbsp; Probably one of those PA gotchas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for crafting the signature!&amp;nbsp; I'm looking forward to seeing it in my lab (and potentially prod!)&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 13:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/431091#M407</guid>
      <dc:creator>Chris_Johnston</dc:creator>
      <dc:date>2021-09-02T13:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Threat signature for ICMP type</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/439982#M409</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/104430"&gt;@Chris_Johnston&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What are we solving;&lt;BR /&gt;Identify the ICMP request and reply using a custom threat signature.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For ICMP response ( echo-response):&amp;nbsp;&lt;BR /&gt;In the custom vulnerability signature, the identity echo-response is easy as the context is available.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The signature&amp;nbsp;&lt;SPAN&gt;44000, will work perfectly as we have selected icmp-rsp-code [ as 0] and you can also add icmp-rsp-type [ also as 0].&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-10-10 at 6.10.53 PM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36921iA6265E4531A6094C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-10-10 at 6.10.53 PM.png" alt="Screen Shot 2021-10-10 at 6.10.53 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The threat logs is shown as below.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-10-10 at 6.24.03 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36930i22690696F9C2C76D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-10-10 at 6.24.03 PM.png" alt="Screen Shot 2021-10-10 at 6.24.03 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For ICMP request, that is echo request:&amp;nbsp;&lt;BR /&gt;This is hard to identify as in the custom vulnerability signature, there is no context to select "icmp-req-code" or "icmp-req-type".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The below line will match the payload in the icmp protocol.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;gt;set threats vulnerability 44008 signature standard &lt;STRONG&gt;&lt;EM&gt;icmp-req-data&lt;/EM&gt; &lt;/STRONG&gt;and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match context icmp-req-data&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The best way to identify the response code is, please use the custom application identification with ICMP base and select the Type and code as follows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-10-10 at 10.23.29 PM.png" style="width: 805px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36931i616AB2CBE8BE762D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-10-10 at 10.23.29 PM.png" alt="Screen Shot 2021-10-10 at 10.23.29 PM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CLI:&amp;nbsp;show application icmp-echo-request&lt;BR /&gt;set application icmp-echo-request default ident-by-icmp-type type 8&lt;BR /&gt;set application icmp-echo-request default ident-by-icmp-type code 0&lt;BR /&gt;set application icmp-echo-request subcategory internet-utility&lt;BR /&gt;set application icmp-echo-request category general-internet&lt;BR /&gt;set application icmp-echo-request technology network-protocol&lt;BR /&gt;set application icmp-echo-request risk 1&lt;BR /&gt;set application icmp-echo-request parent-app icmp&lt;BR /&gt;[edit]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-10-10 at 6.22.59 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36932i133D9329880619A7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-10-10 at 6.22.59 PM.png" alt="Screen Shot 2021-10-10 at 6.22.59 PM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;show threats&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to value 0&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to context icmp-rsp-code&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 1" or-condition "Or Condition 1" operator equal-to negate no&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 2" or-condition "Or Condition 1" operator equal-to value 0&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 2" or-condition "Or Condition 1" operator equal-to context icmp-rsp-type&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code and-condition "And Condition 2" or-condition "Or Condition 1" operator equal-to negate no&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code order-free yes&lt;BR /&gt;set threats vulnerability 44000 signature standard icmp-rsp-code scope protocol-data-unit&lt;BR /&gt;set threats vulnerability 44000 default-action alert&lt;BR /&gt;set threats vulnerability 44000 threatname "ICMP echo response"&lt;BR /&gt;set threats vulnerability 44000 severity informational&lt;BR /&gt;set threats vulnerability 44000 direction both&lt;BR /&gt;set threats vulnerability 44000 affected-host client yes&lt;BR /&gt;set threats vulnerability 44000 affected-host server yes&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 06:01:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/439982#M409</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2021-10-11T06:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Threat signature for ICMP type</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/446603#M411</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/104430"&gt;@Chris_Johnston&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With app and threat release 8484-7039, we have added a new context matching for customer signature. With these 2 new customer contexts, the type detection in ICMP will be a lot easier.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;icmp-req-type&amp;nbsp;&lt;/P&gt;
&lt;P&gt;icmp-req-code&lt;/P&gt;
&lt;P&gt;I tested with icmp-req-type=8 to check the echo request and it was detected.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see the attached screen capture.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-11-09 at 4.17.02 PM.png" style="width: 946px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37562i41DC0FBF772CDE9A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-11-09 at 4.17.02 PM.png" alt="Screen Shot 2021-11-09 at 4.17.02 PM.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-11-09 at 4.17.47 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37563i6F427D38559C83FE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-11-09 at 4.17.47 PM.png" alt="Screen Shot 2021-11-09 at 4.17.47 PM.png" /&gt;&lt;/span&gt;&amp;nbsp;Himani&lt;/P&gt;</description>
      <pubDate>Wed, 10 Nov 2021 00:27:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/threat-signature-for-icmp-type/m-p/446603#M411</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2021-11-10T00:27:02Z</dc:date>
    </item>
  </channel>
</rss>

