Problem: Describe a firewall's functionality and this type of attack (ICMP ping flood) in detail. Describe a rule to detect this type of attack and block it. You will receive extra credit if you can identify exactly what bits/fields in the packet the rule will examine and what values should be blocked.