Solved

Firewall technology working

Posted on 2003-11-14
5
215 Views
Last Modified: 2013-11-16
How stateful, proxy & packet firewall works?
0
Comment
Question by:pravinbhole
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 3

Accepted Solution

by:
dschwartzer earned 25 total points
ID: 9758005
pravinbhole,
I hope it isn't any kind of homework, so I'll make it short and leave it for your futher investigation:
Stateful - is just what it means against the 'classic'/'simple' filter. While filter simply looks whether packet "SourceIP-DestIP-sourcePort-destPort" is allowed by the rulebase and makes a pass/drop decision only according to that, the firewall/proxy also looks into it's cache ('connections' kernel table in Check Point FW) to reveal which side opened the connection, and whether additional packet's parameters are ok (sequence, acknowledgement, etc).
This statefulness allows a much more flexible rulebase (with stateful you can allow for example DNS queries only from inside the organization but not into the organization), and of course increases security by being able to verify many additional connection's pararmeters.

HTH,
d
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10976409
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

--> Accept: dschwartzer

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

tim_holman
EE Cleanup Volunteer
0
 

Author Comment

by:pravinbhole
ID: 11037062
Thanks Mr. dschwartzer for providing me a valuable info. If possible please let me know How state table is build up in firewall & what are the entries in that table?
Can you pleas explain me with an example, it will very helpful for me & my friends.

Thanks & Regards,
Pravin Bhole.
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question