≡ Menu

Linux Iptables allow or block ICMP ping request

The Internet Control Message Protocol (ICMP) has many messages that are identified by a “type” field. You need to use 0 and 8 ICMP code types.

=> Zero (0) is for echo-reply

=> Eight (8) is for echo-request.

To enable ICMP ping incoming client request use following iptables rule (you need to add following rules to script).

My default firewall policy is blocking everything.

Task: Enable or allow ICMP ping incoming client request

Rule to enable ICMP ping incoming client request ( assuming that default iptables policy is to drop all INPUT and OUTPUT packets)

iptables -A INPUT -p icmp --icmp-type 8 -s 0/0 -d $SERVER_IP -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT

iptables -A OUTPUT -p icmp --icmp-type 0 -s $SERVER_IP -d 0/0 -m state --state ESTABLISHED,RELATED -j ACCEPT

Task: Allow or enable outgoing ping request

To enable ICMP ping outgoing request use following iptables rule:

iptables -A OUTPUT -p icmp --icmp-type 8 -s $SERVER_IP -d 0/0 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT

iptables -A INPUT -p icmp --icmp-type 0 -s 0/0 -d $SERVER_IP -m state --state ESTABLISHED,RELATED -j ACCEPT

How do I disable outgoing ICMP request?

Use the following rules:

iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP


iptables -A OUTPUT -p icmp --icmp-type 8 -j DROP

ICMP echo-request type will be block by above rule.

See ICMP TYPE NUMBERS (type fields). You can also get list of ICMP types, just type following command at shell prompt:
# /sbin/iptables -p icmp -h

Share this on:
{ 25 comments… add one }
  • AnonymousAugust 1, 2005, 4:19 am

    Thank you for the above post. I find what i was looking for about 15min googling.

  • polarizers 2centOctober 5, 2005, 3:25 pm

    This seems to be incomplete. An ICMP ping is an “icmp echo request” that is followed up by an “icmp echo reply”. So you need to specify the appropriate “–icmp-type” in your incoming and outgoing chains.

    Possible values for –icmp-type are listed by “iptables -p icmp -h”. There are a icmp packets you dont want to recieve or reply to.

    polarizers 2cent

  • LinuxTitliOctober 5, 2005, 11:29 pm

    >This seems to be incomplete
    Noop, this is not incomplete.

    >Possible values for –icmp-type are listed by “iptables -p icmp -h”. There are a icmp packets you dont want to recieve or reply to.

    Yup, but you don’t have to use them. I just prefer to keep it simple aka KISS. My Default firewall policy is block everything, so this works w/o problem.

  • fsckyouNovember 17, 2005, 4:39 am

    I beg to differ. IT is incomplete. You block everything, then you open all ICMP traffic. How does this block other types of ICMP traffic?

  • AnonymousJanuary 31, 2006, 7:45 pm

    i need to disable ougoing ICMP from my server with iptables, how do I do that?

  • LinuxTitliJanuary 31, 2006, 9:51 pm

    I have updated post as per your request see above.

  • LinuxTitliJanuary 31, 2006, 9:52 pm

    fsckyou, you are right i have updated the entire rules, thanks :D

  • OSCARJune 28, 2007, 4:58 pm

    How block ping request with ENDIAN firewall?
    Best regards

  • China LandscapeOctober 8, 2007, 4:48 am


    Thanks for your tip, it’s work perfectly.
    Just one question :
    Is the options –state NEW,ESTABLISHED,RELATED are mandatory ?

    China Landscape

  • nixCraftOctober 8, 2007, 5:02 am

    –state will improve security and it is one of the best features of Iptables. I recommend keeping it..

  • Hide IPDecember 2, 2007, 7:51 am

    Thanks for info! We’ll use this info in our script firewall.

  • akNovember 3, 2008, 3:13 am

    iptables -A INPUT -p icmp –icmp-type 8 -s 0/0 -d $SERVER_IP -m state –state NEW,ESTABLISHED,RELATED -j ACCEPT

    Error: Bad argument `state’

  • BillDecember 8, 2008, 6:48 pm

    AK, you have a typo. Should be “–state”

  • nixCraftDecember 8, 2008, 8:20 pm


    You must replace $SERVER_IP with actual IP address or create a variable itself.

  • ashwaniApril 24, 2009, 8:27 pm

    Nice…how about i can ping anyone but none cant ping me?…i mad lil rule

    iptables -A OUTPUT -p icmp –icmp-type echo-reply -s -d -j REJECT

    this for an single subnet :-)

  • hamedAugust 7, 2009, 4:51 am

    thank u alot

  • myHPLinuxdummyServersuxOctober 20, 2009, 9:08 pm

    hi.. im from a networking background… couldnt play around that much at home coz of ChISCO too $$$$… i heard linux also can work as a router with their IPtables stuff… may i know:
    1. SERVER_IP=”″ is whos address? me as a server or the client’s IP?
    2. 0/0 ?
    3. NEW,ESTABLISHED,RELATED (try to understand this on9, maybe yall have a clearer explanation)
    4. -m?

  • Jorge FilippoOctober 29, 2009, 11:11 am

    How can I accept ICMP with a specific packetsize? I want to be able to ping my server from my windows notebook, but with -l 666 (for example), for monitoring purposes. But IPTABLES doesn’t seem to have an option to accept or denay a specific ping size. Is that correct?. Thanks in advance.

  • BillMay 21, 2010, 3:46 pm

    This may be a dumb question, but I can’t find the answer anywhere else. After I make a rule change, do I have to reload iptables or stop/start to activate the change?

    • nixCraftMay 21, 2010, 4:12 pm

      Yes, you need to restart firewall if you made changes to config file.

      Reload script if you made changes to a shell script that loads all other rules.

  • MichaelAugust 7, 2010, 5:38 pm

    Thanks a lot it worked perfectly for me.

  • SunOctober 6, 2010, 4:43 pm

    Actually worked right away didnt need to restart atall thanks

  • SnehalOctober 25, 2011, 1:38 pm

    Thanks very much and appricate your knowledge sharing. This was helped me to block icmp traffic for my application testing.

  • helpFebruary 1, 2012, 6:18 pm

    i want to do ip spoofing for my excersize but i can’t !!!
    the question is :
    use iptables to modify your IP address to when sending out icmp requests.

  • CodyJuly 26, 2014, 1:07 pm

    Sigh. I _really_ wish administrators would STOP recommending (and actually following it) to block ICMP itself outright. Rate limit by all means, that’s good. Block fragmented packets (nowadays it is generally malicious). But blocking ICMP itself is a bad idea. And in IPv6 it is especially bad if you want a working connection, anyway (or I seem to remember.. it is vague at this time but there are certain differences for sure, in IPv6 that are absolutely necessary to be aware of if you don’t want to run in to problems). What ICMP stands for gives the reason (or should): internet control message protocol. It is for error reporting. You should block certain ICMP types, sure, but ping is a bad example of what to block (unless we’re talking spoofed packets or to broadcast (which by the way, – that is, someone sending to such – will not send to every IP that exists… as an aside) or … but that’s different). Not heeding this advice only leads to network troubleshooting issues. And I’ll point something else out: blocking ping does nothing for security. Notthing (again, rate limiting is fine). Not a damned thing. It is a false sense of security. There’s other ways to find out if your system is there and blocking ping is hardly going to stop a would be attacker.

Security: Are you a robot or human?

Leave a Comment

   Tagged with: , , , , , ,