... vulnerability may not appear to be as devastating as those deemed critical, they nonetheless may provide an inroad into the network and lead to further exploitation. Therefore, it is recommended that all ... message type Echo. With Echo packets an attacker can create a map of the protected networks behind the router or the firewall. Also, he can perform a denial of service attack by flooding the ... message contains the IP address of the interface it uses to leave the router or the firewall. Instead, set all log messages with the same IP source address of an interface on the internal network, ...