Firewall Stateful Configurations
Vulnerability ProtectionDeep Security's Firewall Stateful Configuration mechanism analyzes each packet in the context of traffic history, correctness of TCP and IP header values, and TCP connection state transitions. In the case of stateless protocols like UDP and ICMP, a pseudo-stateful mechanism is implemented based on historical traffic analysis. Packets are handled by the stateful mechanism as follows:
- A packet is passed to the stateful routine if it has been allowed through by the static Firewall Rule conditions,
- The packet is examined to determine whether it belongs to an existing connection, and
- The TCP header is examined for correctness (e.g. sequence numbers, flag combinations, etc.).
ICMP stateful filtering is only available in Deep Security Agent versions 8.0 or earlier.
ICMP stateful filtering is not available in Vulnerability Protection.
The Firewall Stateful Configurations page lets you define multiple stateful inspection configurations which you can then include in your Policies. From the toolbar or shortcut menu you can:
- Create New (
) Firewall Stateful Configurations from scratch
- Import (
) Firewall Configuration from an XML file (located under the New menu.)
- Examine or modify the Properties (
) of an existing Firewall Stateful Configuration
- Duplicate (
) (and then modify) existing Firewall Stateful Configurations
- Delete a Firewall Stateful Configuration (
)
- Export (
) one or more Firewall Stateful Configurations to an XML or CSV file. (Either export them all using the Export... button, or choose from the drop-down list to export only those that are selected or displayed)
- Add/Remove Columns (
) columns can be added or removed by clicking Add/Remove Columns. The order in which the columns are displayed can be controlled by dragging them into their new position. Listed items can be sorted and searched by the contents of any column.
Clicking New (
) or Properties (
) displays the Firewall Stateful Configuration properties window.
Firewall Stateful Configuration Properties
General Information
- Name: The name of the Firewall Stateful Configuration.
- Description: Type a description of the Firewall Stateful Configuration. This description will only appear here.
IP Packet Inspection
TCP
TCP Packet Inspection
FTP Options
The following FTP options are only available on Deep Security Agent 8.0 and earlier.
The following FTP options are not available with Vulnerability Protection.
- Active FTP
- Allow Incoming: Allow Active FTP when this computer is acting as a server.
- Allow Outgoing: Allow Active FTP when this computer is acting as client.
- Passive FTP
- Allow Incoming: Allow Passive FTP when this computer is acting as a server.
- Allow Outgoing: Allow Passive FTP when this computer is acting as a client.
UDP
- Enable UDP stateful inspection: Check to enable stateful inspection of UDP traffic.
The UDP stateful mechanism drops unsolicited incoming UDP packets. For every outgoing UDP packet, the rule will update its UDP "stateful" table and will then only allow a UDP response if it occurs within 60 seconds of the request. If you wish to allow specific incoming UDP traffic, you will have to create a Force Allow rule. For example, if you are running a DNS server, you will have to create a Force Allow rule to allow incoming UDP packets to destination
port 53.
Without stateful inspection of UDP traffic, an attacker could masquerade as a DNS server and send unsolicited UDP "replies" from source port 53 to computers behind a firewall.
- Enable UDP stateful logging: Checking this option will enable the logging of UDP stateful inspection events.
ICMP
ICMP stateful inspection is only available on Deep Security Agent versions 8.0 or earlier.
ICMP stateful inspection is not available with Vulnerability Protection.
- Enable ICMP stateful inspection: Check to enable stateful inspection of ICMP traffic.
The ICMP (pseudo-)stateful mechanism drops incoming unsolicited ICMP packets. For every outgoing ICMP packet, the rule will create or update its ICMP "stateful" table and will then only allow a ICMP response if it occurs within 60 seconds of the request. (ICMP pair types supported: Type 0 & 8, 13 & 14, 15 & 16, 17 & 18.)
With stateful ICMP inspection enabled, you can, for example, only allow an ICMP echo-reply in if an echo-request has been sent out. Unrequested echo-replies could be a sign of several kinds of attack including a Smurf amplification attack, a Tribe Flood Network communication between master and daemon, or a Loki 2 back-door.
- Enable ICMP stateful logging: Checking this option will enable the logging of ICMP stateful inspection events.
Assigned To
The Assigned To tab lists the Policies and computers that are making use of this stateful inspection configuration.