Employees complain that it's taking longer than usual time to access the Web, receive e-mail messages, and otherwise communicate with external hosts. In reviewing your firewall logs, you notice a large number of ICMP echo requests coming from external host 63.10.100.4. You suspect an attempted ICMP flooding attack. How would you respond?