Will iptables screen UDP traffic?

Ask the Expert

Will iptables screen UDP traffic?

It seems that UDP traffic can't be screened for stateful inspection in my stateful-inspection firewall. Will a session in iptables produce the same results?

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor

You're correct; UDP traffic can't be screened using strict stateful inspection. That's because UDP is a connectionless protocol and doesn't maintain session state. The protocol is much different than TCP, which uses a three-way handshake to set up and tear down connections.

However, most modern firewalls, including iptables, treat UDP in the same manner as a connection-oriented protocol. If you create a rule allowing UDP traffic in one direction, the firewall will allow associated return traffic.

Let's consider an example. Suppose you decided to allow outbound DNS traffic on UDP port 53. In its state table, the firewall will track any requests that match the rule, and the DNS server's UDP response is then allowed to reach the client.

Without a three-way handshake, however, the firewall doesn't know when to remove the entry from its state table. To accommodate this situation, firewalls usually use a timer that allows return traffic to pass until the connection is inactive for a specified period of time, which is normally a few minutes. Once the firewall reaches that inactivity threshold, it discards the entry from the state table.

More information:

  • Find out how extrusion detection and prevention products inspect network traffic and keep confidential information within the enterprise.
  • Learn how DNS amplification attackers use UDP packets to flood their victims.
  • This was first published in September 2007