Check Point Stateful Inspection Technology 
Chapter 2: The ZoneAlarm Firewall 
17 
The fact that both of the channels are established by the client presents a challenge for the 
firewall protecting the FTP server: while a firewall can easily be configured to identify 
incoming command connections over the default port 21, it must also be able to handle 
incoming data connections over a dynamic port that is negotiated randomly as part of the 
FTP client-server communication. The following table examines how different firewall 
technologies handle this challenge: 
Table 7: Firewall Technologies and Passive FTP Connections 
Firewall Technology 
Action 
Packet Filter 
Packet filters can handle outbound FTP connections in either of the 
following ways: 
•
By leaving the entire upper range of ports (greater 
than 1023) open. While this allows the file transfer 
session to take place over the dynamically allocated port, 
it also exposes the internal network. 
•
By shutting down the entire upper range of ports. 
While this secures the internal network, it also blocks 
other services. 
Thus packet filters' handling of Passive FTP comes at the expense 
of either application support or security. 
Application-Layer 
Gateway (Proxy) 
Application-layer gateways use an FTP proxy that acts as a go-
between for all client-server sessions. 
This approach overcomes the limitations of packet filtering by 
bringing application-layer awareness to the decision process; 
however, it also takes a high toll on performance. In addition, each 
service requires its own proxy (an FTP proxy for FTP sessions, an 
HTTP proxy for HTTP session, and so on), and since the 
application-layer gateway can only support a certain number of 
proxies, its usefulness and scalability is limited. Finally, this 
approach exposes the operating system to external threats.