Firewall Stateful Configurations

Vulnerability ProtectionDeep Security's Firewall Stateful Configuration mechanism analyzes each packet in the context of traffic history, correctness of TCP and IP header values, and TCP connection state transitions. In the case of stateless protocols like UDP and ICMP, a pseudo-stateful mechanism is implemented based on historical traffic analysis. Packets are handled by the stateful mechanism as follows:

  1. A packet is passed to the stateful routine if it has been allowed through by the static Firewall Rule conditions,
  2. The packet is examined to determine whether it belongs to an existing connection, and
  3. The TCP header is examined for correctness (e.g. sequence numbers, flag combinations, etc.).
ICMP stateful filtering is only available in Deep Security Agent versions 8.0 or earlier.
ICMP stateful filtering is not available in Vulnerability Protection.

The Firewall Stateful Configurations page lets you define multiple stateful inspection configurations which you can then include in your Policies. From the toolbar or shortcut menu you can:

Clicking New () or Properties () displays the Firewall Stateful Configuration properties window.

Firewall Stateful Configuration Properties

General Information

IP Packet Inspection

TCP

TCP Packet Inspection

FTP Options

The following FTP options are only available on Deep Security Agent 8.0 and earlier.
The following FTP options are not available with Vulnerability Protection.

UDP

ICMP

ICMP stateful inspection is only available on Deep Security Agent versions 8.0 or earlier.
ICMP stateful inspection is not available with Vulnerability Protection.

Assigned To

The Assigned To tab lists the Policies and computers that are making use of this stateful inspection configuration.