Firewall 1 Statefulinspection
Firewall 1 Statefulinspection
Security Requirements
In order to provide robust security, a firewall • Application-derived State
must track and control the flow of communication The state information derived from other appli-
TECH passing through it. To reach control decisions for cations. For example, a previously authenticated
NOTE
NOTE
TCP/IP based services (e.g., whether to accept, user would be allowed access through the firewall
reject, authenticate, encrypt and/or log communica- for authorized services only.
tion attempts), a firewall must obtain, store, retrieve
and manipulate information derived from all • Information Manipulation
communication layers and from other applications. The ability to perform logical or arithmetic
functions on data in any part of the packet
It is not sufficient to examine packets in isolation.
State information—derived from past communica-
tions and other applications—is an essential factor
Stateful Inspection Technology
in making the control decision for new communica- Stateful Inspection, invented by Check Point
tion attempts. Depending upon the communication Software Technologies, has emerged as the industry
attempt, both the communication state (derived standard for enterprise-class network security
from past communications) and the application solutions. Stateful Inspection is able to meet all the
state (derived from other applications) may be security requirements defined above while tradi-
critical in the control decision. tional firewall technologies, such as packet filters
and application-layer gateways, each fall short in
Thus, to ensure the highest level of security, a some areas. (See Table 1.)
firewall must be capable of accessing, analyzing
and utilizing the following: With Stateful Inspection, packets are intercepted at
the network layer for best performance (as in packet
• Communication Information filters), but then data derived from all communica-
Information from all seven layers in the packet tion layers is accessed and analyzed for improved
security (compared to layers 4–7 in application-layer
• Communication-derived State gateways). Stateful Inspection then introduces a
The state derived from previous communications. higher level of security by incorporating communi-
For example, the outgoing PORT command of an cation- and application-derived state and context
FTP session could be saved so that an incoming information which is stored and updated dynamically.
FTP data connection can be verified against it. This provides cumulative data against which subse-
quent communication attempts can be evaluated. It
also delivers the ability to create virtual session infor-
mation for tracking connectionless protocols (e.g.
RPC and UDP-based applications), something no
other firewall technology can accomplish.
Check Point FireWall-1: loaded. For most new applications, including most
custom applications developed by end users, the
Extensible Stateful Inspection communication-related behavior of the new appli-
Check Point FireWall-1’s Stateful Inspection archi- cation can be incorporated simply by modifying
tecture utilizes a unique, patented INSPECT Engine one of FireWall-1’s built-in script templates via the
which enforces the security policy on the gateway graphical user interface. Even the most complex
on which it resides. The INSPECT Engine looks at applications can be added quickly and easily via the
all communication layers and extracts only the INSPECT Language. Check Point provides an open
relevant data, enabling highly efficient operation, application programming interface (API) for third-
support for a large number of protocols and appli- party developers and regularly posts INSPECT
cations, and easy extensibility to new applications Scripts to support new applications on the Check
and services. Point Web site at http://www.checkpoint.com.
ink
Data Lca
Physi l
Security Policy
Rule Base
Dynamic State
Tables
Table1: Comparison of Firewall Technologies
Firewall Capability Packet Filters Application-layer Gateways Stateful Inspection
the Data Link and the Network layers (layers 2 and from the packet’s application content and store it to
3). Since the data link is the actual network provide context in those cases where the applica-
interface card (NIC) and the network link is the first tion does not provide it. Moreover, the INSPECT
layer of the protocol stack (for example, IP), Engine is able to dynamically allow and disallow
FireWall-1 is positioned at the lowest software connections as necessary. These dynamic capabili-
layer. By inspecting at this layer, FireWall-1 ensures ties are designed to provide the highest level of
that the INSPECT Engine intercepts and inspects security for complex protocols, but the user may
all inbound and outbound packets on all interfaces. disable them if they are not required.
No packet is processed by any of the higher
protocol stack layers, no matter what protocol or The INSPECT Engine’s ability to look inside a
application the packet uses, unless the INSPECT packet enables it to allow certain commands within
Engine first verifies that the packet complies with an application while disallowing others. For
the security policy. example, the INSPECT Engine can allow an ICMP
ping while disallowing redirects, or allow SNMP
Because the INSPECT Engine has access to the ‘raw gets while disallowing sets, and so on. The INSPECT
message’, it can inspect all the information in the Engine can store and retrieve values in tables
message, including information relating to all the (providing dynamic context) and perform logical or
higher communication layers, as well as the arithmetic operations on data in any part of the
message data itself (the communication- and appli- packet. In addition to the operations compiled from
cation-derived state and context). The INSPECT the security policy, the user can write his or her
Engine examines IP addresses, port numbers, and own expressions.
any other information required in order to
determine whether packets should be accepted, in
accordance with the defined security policy.
Firewall Technologies
I P F I L T E R
P/N 30202200100