Solved

Firewall technology working

Posted on 2003-11-14
5
201 Views
Last Modified: 2013-11-16
How stateful, proxy & packet firewall works?
0
Comment
Question by:pravinbhole
5 Comments
 
LVL 3

Accepted Solution

by:
dschwartzer earned 25 total points
ID: 9758005
pravinbhole,
I hope it isn't any kind of homework, so I'll make it short and leave it for your futher investigation:
Stateful - is just what it means against the 'classic'/'simple' filter. While filter simply looks whether packet "SourceIP-DestIP-sourcePort-destPort" is allowed by the rulebase and makes a pass/drop decision only according to that, the firewall/proxy also looks into it's cache ('connections' kernel table in Check Point FW) to reveal which side opened the connection, and whether additional packet's parameters are ok (sequence, acknowledgement, etc).
This statefulness allows a much more flexible rulebase (with stateful you can allow for example DNS queries only from inside the organization but not into the organization), and of course increases security by being able to verify many additional connection's pararmeters.

HTH,
d
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10976409
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

--> Accept: dschwartzer

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

tim_holman
EE Cleanup Volunteer
0
 

Author Comment

by:pravinbhole
ID: 11037062
Thanks Mr. dschwartzer for providing me a valuable info. If possible please let me know How state table is build up in firewall & what are the entries in that table?
Can you pleas explain me with an example, it will very helpful for me & my friends.

Thanks & Regards,
Pravin Bhole.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
assessing firewall rules 3 86
only allowed to specific websites - web filtering 3 246
Firewall question 5 94
Best firewall recommendation 12 185
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question