Stateless Firewall & Statefull Firewall
Stateless Firewall & Statefull Firewall
A stateless firewall is a type of firewall that filters and monitors network traffic based solely on
predefined rules, without keeping track of the state of a connection. Unlike stateful firewalls, it
treats each packet as an independent entity and does not consider the packet's context or
connection.
How Stateless Firewall Works
1. Packet-by-Packet Analysis:
o Inspects individual packets as they arrive at the firewall.
o Applies filtering rules based on criteria such as:
Source IP address
Destination IP address
Source/destination port
Protocol type (e.g., TCP, UDP, ICMP)
2. Predefined Rules:
o Matches each packet against a set of static rules (allow/deny).
o No knowledge of prior packets or the state of a connection.
3. No Connection Tracking:
o Does not differentiate whether a packet is part of an existing connection, initiating
a connection, or unrelated.
Key Features
1. Simple Packet Filtering:
o Operates at the network layer (OSI Layer 3) and sometimes the transport layer
(OSI Layer 4).
2. Static Rules:
o Relies on manually defined rules to permit or block traffic.
3. Protocol-Agnostic:
o Evaluates packets without understanding session protocols or application data.
Advantages
1. High Performance:
o Processes packets faster because it doesn’t track connection states.
o Ideal for environments with limited resources.
2. Simplicity:
o Easier to configure and manage.
o Straightforward rule sets.
3. Cost-Effective:
o Often less expensive than stateful or next-generation firewalls.
Disadvantages
1. Lack of Context:
o Cannot distinguish between legitimate and malicious traffic in a session.
o Susceptible to spoofed packets and session-based attacks (e.g., TCP SYN floods).
2. Limited Security:
o Less effective for protecting against complex attacks.
o Does not verify whether packets are part of an established, valid connection.
3. No Dynamic Rules:
o Rules are static and do not adapt to the state of connections or traffic patterns.
Use Cases
Small Networks:
o Environments where simplicity and performance are more critical than advanced
security.
Low-Risk Environments:
o Internal networks with no exposure to external threats.
Use Case Basic traffic filtering Complex networks requiring session tracking
Connection
Tracks connection states Does not track connections
Tracking