What is a Stateful Firewall? - Check Point Software (2024)

How Stateful Firewall Works?

Computers use well-defined protocols to communicate over local networks and the Internet

These include low layer transport protocols, such as TCP and UDP, and also higher application layer protocols, such as HTTP and FTP.

Stateful firewalls inspect network packets, tracking the state of connections using what is known about the protocols being used in the network connection. For instance, TCP is a connection-oriented protocol with error checking to ensure packet delivery.

A TCP connection between client and server first starts with a three-way handshake to establish the connection. One packet is sent from a client with a SYN (synchronize) flag set in the packet. The server receiving the packet understands that this is an attempt to establish a connection and replies with a packet with the SYN and ACK (acknowledge) flags set. When the client receives this packet, it replies with an ACK to begin communicating over the connection.

This is the start of a connection that other protocols then use to transmit data or communicate.

For instance, the client’s browser may use the established TCP connection to carry the web protocol, HTTP GET, to get the content of a web page.

When the connection is made the state is said to be established. At the end of the connection, the client and server tear down the connection using flags in the protocol like FIN (finish). As the connection changes state from open to established, stateful firewalls store the state and context information in tables and update this information dynamically as the communication progresses. The information stored in the state tables provides cumulative data that can be used to evaluate future connections.

For stateless protocols such as UDP, the stateful firewall creates and stores context data that does not exist within the protocol itself. This allows the firewall to track a virtual connection on top of the UDP connection rather than treating each request and response packet between a client and server application as an individual communication.

FTP Example

FTP sessions use more than one connection. One is a command connection and the other is a data connection over which the data passes.

Stateful firewalls examine the FTP command connection for requests from the client to the server. For instance, the client may create a data connection using an FTP PORT command. This packet contains the port number of the data connection, which a stateful firewall will extract and save in a table along with the client and server IP addresses and server port.4

When the data connection is established, it should use the IP addresses and ports contained in this connection table. A stateful firewall will use this data to verify that any FTP data connection attempt is in response to a valid request. Once the connection is closed, the record is removed from the table and the ports are blocked, preventing unauthorized traffic.

Stateful vs. Stateless

A stateless firewall evaluates each packet on an individual basis. It can inspect the source and destination IP addresses and ports of a packet and filter it based on simple access control lists (ACL). For example, a stateless firewall can implement a “default deny” policy for most inbound traffic, only allowing connections to particular systems, such as web and email servers. For instance allowing connections to specific IP addresses on TCP port 80 (HTTP) and 443 (HTTPS) for web and TCP port 25 (SMTP) for email.

Stateful firewalls, on the other hand, track and examine a connection as a whole. They track the current state of stateful protocols, like TCP, and create a virtual connection overlay for connections such as UDP.

Stateful firewalls have the same capabilities as stateless ones but are also able to dynamically detect and allow application communications that stateless ones would not. Stateless firewalls are not application aware—that is, they cannot understand the context of a given communication.

Stateful Firewall with Check Point

The Check Point stateful firewall is integrated into the networking stack of the operating system kernel. It sits at the lowest software layer between the physical network interface card (Layer 2) and the lowest layer of the network protocol stack, typically IP.

By inserting itself between the physical and software components of a system’s networking stack, the Check Point stateful firewall ensures that it has full visibility into all traffic entering and leaving the system. No packet is processed by any of the higher protocol stack layers until the firewall first verifies that the packet complies with the network security access control policy.

The Check Point stateful firewall provides a number of valuable benefits, including:

  • Extensible: The Check Point stateful inspection implementation supports hundreds of predefined applications, services, and protocols—more than any other firewall vendor.
  • Performance: The simple and effective design of the Check Point firewall achieves optimum performance by running inside the operating system kernel. This reduces processing overhead and eliminates the need for context switching. Additionally, caching and hash tables are used to efficiently store and access data. Finally, the firewall packet inspection is optimized to ensure optimal utilization of modern network interfaces, CPU, and OS designs.
  • Scalable: Hyperscale, in a nutshell is the ability of a technology architecture to scale as more demand is added to the system. Check Point Maestro brings agility, scalability and elasticity of the cloud on premises with effective N+1 clustering based on Check Point HyperSync technology, which maximizes the capabilities of existing firewalls. Various Check Point firewalls can be stacked together, adding nearly linear performance gains with each additional firewall added to the cluster.

Check Point’s next-generation firewalls (NGFWs) integrate the features of a stateful firewall with other essential network security functionality. To learn more about what to look for in a NGFW, check out this buyer’s guide. You’re also welcome to request a free demo to see Check Point’s NGFWs in action.

Get Started

Next Generation Firewalls

Hyperscale Network Security

Small Business Firewalls

Related Topics

Different Types of Firewalls

What is a NGFW?

Compare the Top 4 Next Generation Firewalls

Firewall Software

Firewall Best Practices

What is a Stateful Firewall? - Check Point Software (2024)
Top Articles
Smart Money Breakouts [ChartPrime] — อินดิเคเตอร์โดย ChartPrime — TradingView
The Gap between Rich and Poor: Wealth Gap, Narrowing Tactics
Custom Screensaver On The Non-touch Kindle 4
Live Basketball Scores Flashscore
Bin Stores in Wisconsin
Miss Carramello
Nordstrom Rack Glendale Photos
Jesus Revolution Showtimes Near Chisholm Trail 8
Rls Elizabeth Nj
Bme Flowchart Psu
Wunderground Huntington Beach
Mission Impossible 7 Showtimes Near Regal Bridgeport Village
Oscar Nominated Brings Winning Profile to the Kentucky Turf Cup
Bestellung Ahrefs
Colts Snap Counts
Available Training - Acadis® Portal
The Ultimate Style Guide To Casual Dress Code For Women
R Personalfinance
Nhl Tankathon Mock Draft
Adt Residential Sales Representative Salary
Hannaford To-Go: Grocery Curbside Pickup
The Listings Project New York
Airtable Concatenate
Prot Pally Wrath Pre Patch
Wood Chipper Rental Menards
Mta Bus Forums
Speedstepper
Vht Shortener
Cylinder Head Bolt Torque Values
2004 Honda Odyssey Firing Order
San Jac Email Log In
What is Software Defined Networking (SDN)? - GeeksforGeeks
Broken Gphone X Tarkov
Why Are The French So Google Feud Answers
L'alternativa - co*cktail Bar On The Pier
Cars And Trucks Facebook
Consume Oakbrook Terrace Menu
Cross-Border Share Swaps Made Easier Through Amendments to India’s Foreign Exchange Regulations - Transatlantic Law International
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
Quake Awakening Fragments
Paperless Employee/Kiewit Pay Statements
Convenient Care Palmer Ma
Setx Sports
Lamont Mortuary Globe Az
Mychart Mercy Health Paducah
6576771660
Here's Everything You Need to Know About Baby Ariel
This Doctor Was Vilified After Contracting Ebola. Now He Sees History Repeating Itself With Coronavirus
SF bay area cars & trucks "chevrolet 50" - craigslist
The Hardest Quests in Old School RuneScape (Ranked) – FandomSpot
Southwind Village, Southend Village, Southwood Village, Supervision Of Alcohol Sales In Church And Village Halls
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 5356

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.