Packet Flow in Checkpoint Firewall

How Does the Pakcte Flow in Checkpoint Firewall?

SAM Database (Suspicious Activity Monitoring)

Address Spoofing

Session Lookup

Policy Lookup

Destination NAT

Route Lookup

Source NAT

Layer 7 Inspection



Above is the various activities the cpaket is subjected to once a packet reaches a Checkpoint firewall. 

No comments:

Post a Comment