Hi,
While studying flow-based inspection, I read that FGT takes the snapshot of the packet ? I am confused that what is the snapshot of the packet ? and how the packet is processed using the flow-based inspection ?
Because taking snapshot is taking the copy of the packet and the copy of the packet is buffered and the whole traffic stream needs to be captured to match against the signature so how this mode is efficient ?
What i read is that FGT takes the snapshot of the packet and compare it against the pre-existing signature database and held the last packet ? Now this approach may be valid for TCP because TCP always sends the connection termination request but UDP doesnt send the connection termination request so last packet may not be known, therefore in case of UDP how the FGT realize that this is the last packet in the stream ?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
1. What is packet snapshot in fortigate
A packet snapshot is nothing but inspecting random packets from the payload. When a firewall policy's inspection mode is set to flow, traffic flowing through the policy will not be buffered by the FortiGate. https://docs.fortinet.com/document/fortigate/7.4.4/administration-guide/659145/flow-mode-inspection-...
2. How firewall tracks UDP packets
Even though UDP is a stateless protocol, FortiGate still keeps track of 2 different 'states'.
State |
Value |
UDP Reply not seen |
0 |
UDP Reply seen |
1 |
UDP time to live (TTL) - Expire Timer, is by default 180 seconds.
hey mate thanks for answering the question but then there is another question comes into my mind, that for example if an attack vector comes in and the packets are encrypted then how does the flow based inspection will detect because those packets are encrypted and only visible information is layer 3 ?
We recommend using deep inspection for the SSL encrypted traffic https://docs.fortinet.com/document/fortigate/7.4.4/administration-guide/122078/deep-inspection.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1634 | |
1063 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.