Firewall technology working

How stateful, proxy & packet firewall works?
pravinbholeAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

dschwartzerCommented:
pravinbhole,
I hope it isn't any kind of homework, so I'll make it short and leave it for your futher investigation:
Stateful - is just what it means against the 'classic'/'simple' filter. While filter simply looks whether packet "SourceIP-DestIP-sourcePort-destPort" is allowed by the rulebase and makes a pass/drop decision only according to that, the firewall/proxy also looks into it's cache ('connections' kernel table in Check Point FW) to reveal which side opened the connection, and whether additional packet's parameters are ok (sequence, acknowledgement, etc).
This statefulness allows a much more flexible rulebase (with stateful you can allow for example DNS queries only from inside the organization but not into the organization), and of course increases security by being able to verify many additional connection's pararmeters.

HTH,
d

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Tim HolmanCommented:
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

--> Accept: dschwartzer

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

tim_holman
EE Cleanup Volunteer
pravinbholeAuthor Commented:
Thanks Mr. dschwartzer for providing me a valuable info. If possible please let me know How state table is build up in firewall & what are the entries in that table?
Can you pleas explain me with an example, it will very helpful for me & my friends.

Thanks & Regards,
Pravin Bhole.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.