How The Firewall Uses Stateful Inspection; About Firewall Rule Application Triggers - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

214
Managing firewall protection
About firewall rules

How the firewall uses stateful inspection

About firewall rule application triggers

See
About the firewall rule, firewall setting, and intrusion prevention processing
order"
on page 213.
See
Editing a policy"
on page 122.
Firewall protection uses stateful inspection to track current connections. Stateful
inspection tracks source and destination IP addresses, ports, applications, and
other connection information. Before the client inspects the firewall rules, it
makes the traffic flow decisions that are based on the connection information.
For example, if a firewall rule allows a computer to connect to a Web server, the
firewall logs the connection information. When the server replies, the firewall
discovers that a response from the Web server to the computer is expected. It
permits the Web server traffic to flow to the initiating computer without inspecting
the rule base. A rule must permit the initial outbound traffic before the firewall
logs the connection.
Stateful inspection eliminates the need to create new rules. For the traffic that is
initiated in one direction, you do not have to create the rules that permit the traffic
in both directions. The client traffic that is initiated in one direction includes
Telnet (port 23), HTTP (port 80), and HTTPS (port 443). The client computers
initiate this outbound traffic; you create a rule that permits the outbound traffic
for these protocols. Stateful inspection automatically permits the return traffic
that responds to the outbound traffic. Because the firewall is stateful in nature,
you only need to create the rules that initiate a connection, not the characteristics
of a particular packet. All packets that belong to an allowed connection are
implicitly allowed as being an integral part of that same connection.
Stateful inspection supports all rules that direct TCP traffic.
Stateful inspection does not support the rules that filter ICMP traffic. For ICMP
traffic, you must create the rules that permit the traffic in both directions. For
example, for the clients to use the ping command and receive replies, you must
create a rule that permits ICMP traffic in both directions.
See
How a firewall works"
When the application is the only trigger you define in a rule that allows traffic,
the firewall allows the application to perform any network operation. The
application is the significant value, not the network operations that the application
performs. For example, suppose you allow Internet Explorer and you define no
other triggers. Users can access the remote sites that use HTTP, HTTPS, FTP,
Gopher, and any other protocol that the Web browser supports. You can define
on page 206.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents