Home
EN
Location
Documentation Home
Palo Alto Networks
Support
Live Community
Knowledge Base
>
Clear
ICMPv6 Drop
Updated on
Thu Aug 28 10:12:18 PDT 2025
Focus
Updated on
Thu Aug 28 10:12:18 PDT 2025
Focus
Home
Next-Generation Firewall
Network
Network > Network Profiles
Network > Network Profiles > Zone Protection
Packet Based Attack Protection
ICMPv6 Drop
Next-Generation Firewall
ICMPv6 Drop
Table of Contents
Filter
Expand All
|
Collapse All
Next-Generation Firewall Docs
Getting Started
Administration
Networking
Quick Start
Reference
Incidents & Alerts
Release Notes
Select a Document
PAN-OS 12.1
PAN-OS 11.2
PAN-OS 11.1
PAN-OS 11.0 (EoL)
PAN-OS 10.2
PAN-OS 10.1
PAN-OS 10.0 (EoL)
PAN-OS 9.1 (EoL)
PAN-OS 9.0 (EoL)
PAN-OS 8.1 (EoL)
Help
Select a Document
PAN-OS 12.1
PAN-OS 11.2
PAN-OS 11.1
PAN-OS 10.2
PAN-OS 10.1
Previous
IPv6 Drop
Next
Protocol Protection
ICMPv6 Drop
To instruct the firewall what to do with certain ICMPv6 packets it receives in the zone, select the following settings to enable them.
Zone Protection Profile Settings—Packet Based Attack Protection
Configured In
Description
ICMPv6 destination unreachable - require explicit security rule match
Network
Network Profiles
Zone Protection
Packet Based Attack Protection
ICMPv6 Drop
Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
ICMPv6 packet too big - require explicit security rule match
Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
ICMPv6 time exceeded - require explicit security rule match
Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
ICMPv6 parameter problem - require explicit security rule match
Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
ICMPv6 redirect - require explicit security rule match
Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
Previous
IPv6 Drop
Next
Protocol Protection