FIREWALL
What is a Firewall?
A firewall is a network security system—either hardware, software, or both—that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. It acts as a barrier between a trusted network and untrusted external networks (like the internet).
Why is a Firewall Useful?
Protects networks from unauthorized access and cyber threats.
Monitors and controls traffic based on defined rules.
Prevents malware, exploits, and intrusion attempts.
Supports compliance with security standards (e.g., PCI-DSS, HIPAA).
Enables segmentation of networks for control and isolation.
How It Works:
Traffic arrives at the firewall from internal or external sources.
Rules are evaluated – based on IP address, port, protocol, etc.
A decision is made: allow, deny, or log the traffic.
Traffic is forwarded or blocked accordingly.
Logs and alerts are generated for monitoring and auditing.
Where is a Firewall Used?
Enterprise networks – to protect internal infrastructure.
Cloud environments – as virtual firewalls (e.g., AWS Security Groups, Azure NSGs).
Home networks – within routers or personal firewall applications.
Data centers – to segment and secure workloads.
Industrial systems – for securing OT/SCADA networks.
Which OSI Layer Does This Concept Belong To?
Firewalls operate primarily at Layer 3 (Network) and Layer 4 (Transport) of the OSI model.
They analyze IP addresses, TCP/UDP ports, and protocols.
Next-Generation Firewalls (NGFWs) may also inspect traffic at Layer 7 (Application Layer) such as HTTP, DNS, or FTP.
Topics in this section,
In this section, you are going to learn
Terminology
Version Info
S.No |
Firewall Version |
RFC Number |
Core Idea / Contribution |
Year |
---|---|---|---|---|
1 |
Packet Filtering |
RFC 2979 |
Behavioral expectations for Internet firewalls |
2000 |
2 |
Firewall Traversal (SIP) |
RFC 5626 |
Managing NAT and firewall traversal for SIP clients |
2009 |
3 |
Middlebox Communication |
RFC 3303 |
Middlebox communication architecture and framework (firewalls, NATs, etc.) |
2002 |
4 |
Firewall-Friendly FTP |
RFC 1579 |
FTP operation through firewalls using passive mode |
1994 |
5 |
Firewall Policy Control |
RFC 3746 |
Generalized framework for policy-based routing and firewall control |
2004 |
6 |
NAT and Firewall Traversal |
RFC 3489 |
STUN protocol for NAT/firewall traversal |
2003 |
7 |
Firewall Bypass (TURN) |
RFC 5766 |
TURN protocol for relaying media through firewalls and NATs |
2010 |
8 |
Firewall Detection |
RFC 8155 |
Methods for detecting firewalls and NATs in IPv6 networks |
2017 |
Setup
Setup
TCP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
1 |
TCP |
Connection request (SYN), data transfer, ACK |
401500 |
ource Port |
Port number of sender |
2 |
|
Destination Port |
Port number of receiver |
2 |
|
Sequence Number |
Tracks packet order |
4 |
|
Acknowledgment Number |
Confirms received data |
4 |
|
Data Offset |
Header length |
0.5 |
|
Flags |
Control bits (SYN, ACK, etc.) |
1 |
|
Window Size |
Flow control |
2 |
|
Checksum |
Error-checking |
2 |
|
Urgent Pointer |
Marks urgent data |
2 |
|
Options |
Extra settings (e.g., MSS) |
040 |
|
Payload |
Actual data |
01460 |
UDP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
2 |
UDP |
DNS query, video/audio streaming packets |
281500 |
Source Port |
Port number of sender |
2 |
|
Destination Port |
Port number of receiver |
2 |
|
Length |
Total length of UDP packet |
2 |
|
Checksum |
Error-checking |
2 |
|
Payload |
Actual data |
01472 |
ICMP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
3 |
ICMP |
Ping request/reply (Echo) |
2864 |
Type |
ICMP message type (e.g., Echo) |
1 |
|
Code |
Subtype of message |
1 |
|
Checksum |
Error-checking |
2 |
|
Identifier |
Used to match requests/replies |
2 |
|
Sequence Number |
Tracks order |
2 |
|
Payload |
Optional data |
056 |
HTTP/HTTPS Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
4 |
HTTP/HTTPS |
Web page request/response |
5121500 |
Request Line |
Method, URL, HTTP version |
~20100 |
|
Headers |
Metadata (Host, User-Agent, etc.) |
~200800 |
|
Body |
Actual content (e.g., form data) |
01400 |
DNS Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
5 |
DNS |
Domain name resolution query/response |
64512 |
Transaction ID |
Identifies request/response |
2 |
|
Flags |
Query/response, recursion, etc. |
2 |
|
Questions |
Number of queries |
2 |
|
Answers |
Number of answers |
2 |
|
Authority |
Number of authority records |
2 |
|
Additional |
Number of additional records |
2 |
|
Query Section |
Domain name, type, class |
~2050 |
|
Answer Section |
IP address or CNAME |
~20100 |
SMTP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
6 |
SMTP |
Email transmission packets |
5121500 |
Command |
SMTP command (e.g., HELO, MAIL FROM) |
~410 |
|
Header |
Email metadata (From, To, Subject) |
~100800 |
|
Body |
Email content |
01400 |
|
TCP Header |
Transport layer info (ports, flags) |
20 |
|
IP Header |
Source/destination IP, TTL, etc. |
20 |
SNMP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
7 |
SNMP |
Network monitoring and management packets |
48512 |
Version |
SNMP version (v1, v2c, v3) |
1 |
|
Community String |
Authentication string |
~832 |
|
PDU Type |
Type of SNMP message (GET, SET, etc.) |
1 |
|
Request ID |
Identifies the request |
4 |
|
Error Status |
Indicates error (if any) |
1 |
|
Error Index |
Points to error field |
1 |
|
Variable Bindings |
OID and value pairs |
~32400 |
|
UDP Header |
Source/destination ports, checksum |
8 |
|
IP Header |
Source/destination IP, TTL, etc. |
20 |
GRE/IPSec Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
8 |
GRE/IPSec |
VPN tunneling packets |
641500 |
Flags |
Optional features |
2 |
|
Protocol Type |
Encapsulated protocol (e.g., IP) |
2 |
|
Payload |
Encapsulated packet |
201400 |
|
IP Header |
Outer IP header |
20 |
DHCP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
9 |
DHCP |
IP address assignment packets |
300600 |
Op Code |
Request (1) or Reply (2) |
1 |
|
Hardware Type |
Ethernet = 1 |
1 |
|
Hardware Address Length |
MAC address length |
1 |
|
Hops |
Relay agent count |
1 |
|
Transaction ID |
Identifies session |
4 |
|
Seconds Elapsed |
Time since request |
2 |
|
Flags |
Broadcast flag |
2 |
|
Client IP Address |
If already assigned |
4 |
|
Your IP Address |
IP being offered |
4 |
|
Server IP Address |
DHCP server address |
4 |
|
Gateway IP Address |
Relay agent address |
4 |
|
Client MAC Address |
Hardware address |
6 |
|
Server Hostname |
Optional |
~64 |
|
Boot File Name |
Optional |
~128 |
|
Options |
DHCP options (e.g., lease time) |
~60312 |
|
UDP Header |
Source/destination ports |
8 |
|
IP Header |
Source/destination IP |
20 |
FTP Packet
S.No |
Protocol Packet |
Description |
Size(Bytes) |
---|---|---|---|
10 |
FTP |
File transfer control/data packets |
641500 |
Command |
FTP command (e.g., USER, PASS) |
~48 |
|
Arguments |
Parameters for the command (e.g., username) |
~10100 |
|
CRLF |
End-of-line marker (rn) |
2 |
|
TCP Header |
Source/destination ports, flags, etc. |
20 |
|
IP Header |
Source/destination IP, TTL, etc. |
20 |
S.No |
Use Case |
Description |
---|---|---|
1 |
Network Perimeter Security |
Protects internal network from external threats by filtering incoming traffic. |
2 |
Application Layer Filtering |
Blocks or allows traffic based on application-level data (e.g., HTTP, DNS). |
3 |
Intrusion Prevention |
Detects and blocks suspicious activity or known attack patterns. |
4 |
VPN Gateway Protection |
Secures VPN connections and ensures encrypted traffic is properly filtered. |
5 |
Data Center Segmentation |
Isolates workloads and controls traffic between servers in a data center. |
6 |
Cloud Security |
Controls traffic between cloud resources using virtual firewalls. |
7 |
Remote Access Control |
Manages access for remote users and devices, ensuring secure connectivity. |
8 |
Compliance Enforcement |
Helps meet regulatory requirements by enforcing security policies. |
9 |
IoT Device Protection |
Filters traffic to and from IoT devices to prevent exploitation. |
10 |
Web Filtering |
Blocks access to malicious or inappropriate websites. |
S.No |
Feature |
Description |
---|---|---|
1 |
Packet Filtering |
Inspects packets based on IP, port, and protocol to allow or block traffic. |
2 |
Stateful Inspection |
Tracks active connections and makes decisions based on connection state. |
3 |
Access Control |
Defines rules to permit or deny traffic based on source/destination. |
4 |
Logging and Monitoring |
Records traffic logs for auditing and real-time threat detection. |
5 |
NAT (Network Address Translation) |
Hides internal IP addresses from external networks. |
6 |
VPN Support |
Allows secure remote access through encrypted tunnels. |
7 |
Application Layer Filtering |
Filters traffic based on application data (e.g., HTTP, FTP). |
8 |
Intrusion Detection/Prevention |
Identifies and blocks suspicious or malicious activity. |
9 |
Web Filtering |
Blocks access to specific websites or categories. |
10 |
High Availability |
Ensures continuous protection through redundancy and failover. |
Packet Filtering - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
Packet Filter Test 1 |
Test packet filtering rule #1 with specific IP, port, and protocol. |
Packet blocked |
2 |
Packet Filter Test 2 |
Test packet filtering rule #2 with specific IP, port, and protocol. |
Packet allowed |
3 |
Packet Filter Test 3 |
Test packet filtering rule #3 with specific IP, port, and protocol. |
Packet blocked |
4 |
Packet Filter Test 4 |
Test packet filtering rule #4 with specific IP, port, and protocol. |
Packet allowed |
5 |
Packet Filter Test 5 |
Test packet filtering rule #5 with specific IP, port, and protocol. |
Packet blocked |
6 |
Packet Filter Test 6 |
Test packet filtering rule #6 with specific IP, port, and protocol. |
Packet allowed |
7 |
Packet Filter Test 7 |
Test packet filtering rule #7 with specific IP, port, and protocol. |
Packet blocked |
8 |
Packet Filter Test 8 |
Test packet filtering rule #8 with specific IP, port, and protocol. |
Packet allowed |
9 |
Packet Filter Test 9 |
Test packet filtering rule #9 with specific IP, port, and protocol. |
Packet blocked |
10 |
Packet Filter Test 10 |
Test packet filtering rule #10 with specific IP, port, and protocol. |
Packet allowed |
11 |
Packet Filter Test 11 |
Test packet filtering rule #11 with specific IP, port, and protocol. |
Packet blocked |
12 |
Packet Filter Test 12 |
Test packet filtering rule #12 with specific IP, port, and protocol. |
Packet allowed |
13 |
Packet Filter Test 13 |
Test packet filtering rule #13 with specific IP, port, and protocol. |
Packet blocked |
14 |
Packet Filter Test 14 |
Test packet filtering rule #14 with specific IP, port, and protocol. |
Packet allowed |
15 |
Packet Filter Test 15 |
Test packet filtering rule #15 with specific IP, port, and protocol. |
Packet blocked |
16 |
Packet Filter Test 16 |
Test packet filtering rule #16 with specific IP, port, and protocol. |
Packet allowed |
17 |
Packet Filter Test 17 |
Test packet filtering rule #17 with specific IP, port, and protocol. |
Packet blocked |
18 |
Packet Filter Test 18 |
Test packet filtering rule #18 with specific IP, port, and protocol. |
Packet allowed |
19 |
Packet Filter Test 19 |
Test packet filtering rule #19 with specific IP, port, and protocol. |
Packet blocked |
20 |
Packet Filter Test 20 |
Test packet filtering rule #20 with specific IP, port, and protocol. |
Packet allowed |
21 |
Packet Filter Test 21 |
Test packet filtering rule #21 with specific IP, port, and protocol. |
Packet blocked |
22 |
Packet Filter Test 22 |
Test packet filtering rule #22 with specific IP, port, and protocol. |
Packet allowed |
23 |
Packet Filter Test 23 |
Test packet filtering rule #23 with specific IP, port, and protocol. |
Packet blocked |
24 |
Packet Filter Test 24 |
Test packet filtering rule #24 with specific IP, port, and protocol. |
Packet allowed |
25 |
Packet Filter Test 25 |
Test packet filtering rule #25 with specific IP, port, and protocol. |
Packet blocked |
26 |
Packet Filter Test 26 |
Test packet filtering rule #26 with specific IP, port, and protocol. |
Packet allowed |
27 |
Packet Filter Test 27 |
Test packet filtering rule #27 with specific IP, port, and protocol. |
Packet blocked |
28 |
Packet Filter Test 28 |
Test packet filtering rule #28 with specific IP, port, and protocol. |
Packet allowed |
29 |
Packet Filter Test 29 |
Test packet filtering rule #29 with specific IP, port, and protocol. |
Packet blocked |
30 |
Packet Filter Test 30 |
Test packet filtering rule #30 with specific IP, port, and protocol. |
Packet allowed |
31 |
Packet Filter Test 31 |
Test packet filtering rule #31 with specific IP, port, and protocol. |
Packet blocked |
32 |
Packet Filter Test 32 |
Test packet filtering rule #32 with specific IP, port, and protocol. |
Packet allowed |
33 |
Packet Filter Test 33 |
Test packet filtering rule #33 with specific IP, port, and protocol. |
Packet blocked |
34 |
Packet Filter Test 34 |
Test packet filtering rule #34 with specific IP, port, and protocol. |
Packet allowed |
35 |
Packet Filter Test 35 |
Test packet filtering rule #35 with specific IP, port, and protocol. |
Packet blocked |
36 |
Packet Filter Test 36 |
Test packet filtering rule #36 with specific IP, port, and protocol. |
Packet allowed |
37 |
Packet Filter Test 37 |
Test packet filtering rule #37 with specific IP, port, and protocol. |
Packet blocked |
38 |
Packet Filter Test 38 |
Test packet filtering rule #38 with specific IP, port, and protocol. |
Packet allowed |
39 |
Packet Filter Test 39 |
Test packet filtering rule #39 with specific IP, port, and protocol. |
Packet blocked |
40 |
Packet Filter Test 40 |
Test packet filtering rule #40 with specific IP, port, and protocol. |
Packet allowed |
41 |
Packet Filter Test 41 |
Test packet filtering rule #41 with specific IP, port, and protocol. |
Packet blocked |
42 |
Packet Filter Test 42 |
Test packet filtering rule #42 with specific IP, port, and protocol. |
Packet allowed |
43 |
Packet Filter Test 43 |
Test packet filtering rule #43 with specific IP, port, and protocol. |
Packet blocked |
44 |
Packet Filter Test 44 |
Test packet filtering rule #44 with specific IP, port, and protocol. |
Packet allowed |
45 |
Packet Filter Test 45 |
Test packet filtering rule #45 with specific IP, port, and protocol. |
Packet blocked |
46 |
Packet Filter Test 46 |
Test packet filtering rule #46 with specific IP, port, and protocol. |
Packet allowed |
47 |
Packet Filter Test 47 |
Test packet filtering rule #47 with specific IP, port, and protocol. |
Packet blocked |
48 |
Packet Filter Test 48 |
Test packet filtering rule #48 with specific IP, port, and protocol. |
Packet allowed |
49 |
Packet Filter Test 49 |
Test packet filtering rule #49 with specific IP, port, and protocol. |
Packet blocked |
50 |
Packet Filter Test 50 |
Test packet filtering rule #50 with specific IP, port, and protocol. |
Packet allowed |
Stateful Inspection - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
Stateful Test 1 |
Allow new TCP connection from trusted IP |
Connection allowed |
2 |
Stateful Test 2 |
Block TCP packet without SYN flag |
Packet dropped |
3 |
Stateful Test 3 |
Allow established TCP session continuation |
Packet allowed |
4 |
Stateful Test 4 |
Drop unsolicited inbound UDP packet |
Packet dropped |
5 |
Stateful Test 5 |
Allow DNS response for tracked query |
Packet allowed |
6 |
Stateful Test 6 |
Block ICMP reply without matching request |
Packet dropped |
7 |
Stateful Test 7 |
Allow FTP data connection after control session established |
Connection allowed |
8 |
Stateful Test 8 |
Drop TCP FIN packet without session context |
Packet dropped |
9 |
Stateful Test 9 |
Allow HTTPS traffic with valid session state |
Packet allowed |
10 |
Stateful Test 10 |
Block TCP RST packet from unknown source |
Packet dropped |
11 |
Stateful Test 11 |
Allow UDP response within timeout window |
Packet allowed |
12 |
Stateful Test 12 |
Drop UDP response after session timeout |
Packet dropped |
13 |
Stateful Test 13 |
Allow ICMP Echo Reply for tracked Echo Request |
Packet allowed |
14 |
Stateful Test 14 |
Block TCP ACK without prior SYN |
Packet dropped |
15 |
Stateful Test 15 |
Allow SMTP session continuation |
Packet allowed |
16 |
Stateful Test 16 |
Drop TCP packet with invalid sequence number |
Packet dropped |
17 |
Stateful Test 17 |
Allow SSH session from internal to external |
Connection allowed |
18 |
Stateful Test 18 |
Block unsolicited inbound SSH packet |
Packet dropped |
19 |
Stateful Test 19 |
Allow HTTP response for tracked request |
Packet allowed |
20 |
Stateful Test 20 |
Drop TCP packet with expired session state |
Packet dropped |
21 |
Stateful Test 21 |
Allow SIP signaling with valid session tracking |
Packet allowed |
22 |
Stateful Test 22 |
Block SIP media stream without signaling context |
Packet dropped |
23 |
Stateful Test 23 |
Allow VPN tunnel traffic after handshake |
Packet allowed |
24 |
Stateful Test 24 |
Drop GRE packet without session context |
Packet dropped |
25 |
Stateful Test 25 |
Allow ICMP Time Exceeded for tracked session |
Packet allowed |
26 |
Stateful Test 26 |
Block fragmented packet without session info |
Packet dropped |
27 |
Stateful Test 27 |
Allow DNS over TCP with valid session |
Packet allowed |
28 |
Stateful Test 28 |
Drop TCP packet with mismatched ACK number |
Packet dropped |
29 |
Stateful Test 29 |
Allow POP3 session continuation |
Packet allowed |
30 |
Stateful Test 30 |
Block unsolicited POP3 packet |
Packet dropped |
31 |
Stateful Test 31 |
Allow NTP response for tracked request |
Packet allowed |
32 |
Stateful Test 32 |
Drop NTP response without matching request |
Packet dropped |
33 |
Stateful Test 33 |
Allow Telnet session from internal host |
Connection allowed |
34 |
Stateful Test 34 |
Block Telnet packet from unknown source |
Packet dropped |
35 |
Stateful Test 35 |
Allow HTTPS session resume |
Packet allowed |
36 |
Stateful Test 36 |
Drop TCP packet with invalid flags |
Packet dropped |
37 |
Stateful Test 37 |
Allow SMB session from trusted subnet |
Packet allowed |
38 |
Stateful Test 38 |
Block SMB packet from untrusted source |
Packet dropped |
39 |
Stateful Test 39 |
Allow ICMP Destination Unreachable for tracked session |
Packet allowed |
40 |
Stateful Test 40 |
Drop ICMP packet not matching any session |
Packet dropped |
41 |
Stateful Test 41 |
Allow HTTP/2 session continuation |
Packet allowed |
42 |
Stateful Test 42 |
Block HTTP/2 packet without session context |
Packet dropped |
43 |
Stateful Test 43 |
Allow RDP session from internal network |
Connection allowed |
44 |
Stateful Test 44 |
Block RDP packet from external network |
Packet dropped |
45 |
Stateful Test 45 |
Allow VoIP RTP stream after SIP session established |
Packet allowed |
46 |
Stateful Test 46 |
Drop RTP stream without SIP signaling |
Packet dropped |
47 |
Stateful Test 47 |
Allow DHCP response for tracked request |
Packet allowed |
48 |
Stateful Test 48 |
Block DHCP offer without matching discover |
Packet dropped |
49 |
Stateful Test 49 |
Allow HTTPS traffic with session persistence |
Packet allowed |
50 |
Stateful Test 50 |
Drop TCP packet from blacklisted IP despite session |
Packet dropped |
Access Control - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
Access Control Test 1 |
Allow traffic from trusted internal IP to web server |
Access granted |
2 |
Access Control Test 2 |
Block traffic from blacklisted IP |
Access denied |
3 |
Access Control Test 3 |
Allow SSH access from admin subnet |
Access granted |
4 |
Access Control Test 4 |
Deny SSH access from public IP |
Access denied |
5 |
Access Control Test 5 |
Allow HTTP traffic on port 80 |
Access granted |
6 |
Access Control Test 6 |
Block HTTP traffic on non-standard port |
Access denied |
7 |
Access Control Test 7 |
Allow DNS queries from internal network |
Access granted |
8 |
Access Control Test 8 |
Block DNS queries from unauthorized subnet |
Access denied |
9 |
Access Control Test 9 |
Allow ICMP ping from monitoring server |
Access granted |
10 |
Access Control Test 10 |
Block ICMP from external sources |
Access denied |
11 |
Access Control Test 11 |
Allow FTP access to file server |
Access granted |
12 |
Access Control Test 12 |
Block FTP access from guest network |
Access denied |
13 |
Access Control Test 13 |
Allow SMTP traffic from mail server |
Access granted |
14 |
Access Control Test 14 |
Block SMTP traffic from unknown IP |
Access denied |
15 |
Access Control Test 15 |
Allow RDP access from IT department |
Access granted |
16 |
Access Control Test 16 |
Block RDP access from external network |
Access denied |
17 |
Access Control Test 17 |
Allow VPN access from remote employees |
Access granted |
18 |
Access Control Test 18 |
Block VPN access from unregistered devices |
Access denied |
19 |
Access Control Test 19 |
Allow access to internal database from app server |
Access granted |
20 |
Access Control Test 20 |
Block access to database from public network |
Access denied |
21 |
Access Control Test 21 |
Allow NTP traffic to time server |
Access granted |
22 |
Access Control Test 22 |
Block NTP traffic from unknown sources |
Access denied |
23 |
Access Control Test 23 |
Allow VoIP traffic from internal phones |
Access granted |
24 |
Access Control Test 24 |
Block VoIP traffic from external IPs |
Access denied |
25 |
Access Control Test 25 |
Allow HTTPS traffic to secure web server |
Access granted |
26 |
Access Control Test 26 |
Block HTTPS traffic on port 8080 |
Access denied |
27 |
Access Control Test 27 |
Allow SNMP traffic from monitoring tools |
Access granted |
28 |
Access Control Test 28 |
Block SNMP traffic from unauthorized IPs |
Access denied |
29 |
Access Control Test 29 |
Allow access to cloud services from internal network |
Access granted |
30 |
Access Control Test 30 |
Block access to cloud services from guest Wi-Fi |
Access denied |
31 |
Access Control Test 31 |
Allow access to internal Git server from dev team |
Access granted |
32 |
Access Control Test 32 |
Block access to Git server from external IP |
Access denied |
33 |
Access Control Test 33 |
Allow DHCP traffic from trusted DHCP server |
Access granted |
34 |
Access Control Test 34 |
Block rogue DHCP server broadcasts |
Access denied |
35 |
Access Control Test 35 |
Allow access to CRM system from sales team subnet |
Access granted |
36 |
Access Control Test 36 |
Block access to CRM system from external IP |
Access denied |
37 |
Access Control Test 37 |
Allow access to internal wiki from corporate network |
Access granted |
38 |
Access Control Test 38 |
Block access to internal wiki from guest network |
Access denied |
39 |
Access Control Test 39 |
Allow access to backup server from backup software |
Access granted |
40 |
Access Control Test 40 |
Block access to backup server from user devices |
Access denied |
41 |
Access Control Test 41 |
Allow access to HR portal from HR subnet |
Access granted |
42 |
Access Control Test 42 |
Block access to HR portal from other departments |
Access denied |
43 |
Access Control Test 43 |
Allow access to finance system from finance team |
Access granted |
44 |
Access Control Test 44 |
Block access to finance system from IT team |
Access denied |
45 |
Access Control Test 45 |
Allow access to printer from internal network |
Access granted |
46 |
Access Control Test 46 |
Block access to printer from guest network |
Access denied |
47 |
Access Control Test 47 |
Allow access to internal API from frontend servers |
Access granted |
48 |
Access Control Test 48 |
Block access to internal API from external IPs |
Access denied |
49 |
Access Control Test 49 |
Allow access to internal storage from authorized users |
Access granted |
50 |
Access Control Test 50 |
Block access to internal storage from unauthorized users |
Access denied |
Logging and Monitoring - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
Log Test 1 |
Log allowed HTTP traffic from internal network |
Log entry created |
2 |
Log Test 2 |
Log blocked SSH attempt from external IP |
Log entry created |
3 |
Log Test 3 |
Log dropped ICMP packet from unknown source |
Log entry created |
4 |
Log Test 4 |
Log successful VPN connection |
Log entry created |
5 |
Log Test 5 |
Log failed VPN authentication attempt |
Log entry created |
6 |
Log Test 6 |
Log FTP access from internal user |
Log entry created |
7 |
Log Test 7 |
Log DNS query from guest network |
Log entry created |
8 |
Log Test 8 |
Log blocked access to restricted website |
Log entry created |
9 |
Log Test 9 |
Log allowed SMTP traffic |
Log entry created |
10 |
Log Test 10 |
Log denied RDP access from external IP |
Log entry created |
11 |
Log Test 11 |
Log port scan attempt |
Alert generated |
12 |
Log Test 12 |
Log brute-force login attempt |
Alert generated |
13 |
Log Test 13 |
Log access to admin panel |
Log entry created |
14 |
Log Test 14 |
Log blocked Telnet connection |
Log entry created |
15 |
Log Test 15 |
Log allowed HTTPS session |
Log entry created |
16 |
Log Test 16 |
Log expired session termination |
Log entry created |
17 |
Log Test 17 |
Log traffic from blacklisted IP |
Alert generated |
18 |
Log Test 18 |
Log access to internal database |
Log entry created |
19 |
Log Test 19 |
Log blocked access to internal API |
Log entry created |
20 |
Log Test 20 |
Log allowed VoIP traffic |
Log entry created |
21 |
Log Test 21 |
Log blocked VoIP traffic from external IP |
Log entry created |
22 |
Log Test 22 |
Log DHCP request from unauthorized device |
Log entry created |
23 |
Log Test 23 |
Log SNMP traffic from monitoring server |
Log entry created |
24 |
Log Test 24 |
Log blocked SNMP traffic from unknown IP |
Log entry created |
25 |
Log Test 25 |
Log access to cloud storage |
Log entry created |
26 |
Log Test 26 |
Log blocked access to cloud service |
Log entry created |
27 |
Log Test 27 |
Log internal user accessing external FTP |
Log entry created |
28 |
Log Test 28 |
Log blocked ICMP redirect |
Log entry created |
29 |
Log Test 29 |
Log access to HR portal |
Log entry created |
30 |
Log Test 30 |
Log blocked access to finance system |
Log entry created |
31 |
Log Test 31 |
Log allowed Git traffic from dev team |
Log entry created |
32 |
Log Test 32 |
Log blocked Git traffic from external IP |
Log entry created |
33 |
Log Test 33 |
Log access to internal wiki |
Log entry created |
34 |
Log Test 34 |
Log blocked access to internal wiki |
Log entry created |
35 |
Log Test 35 |
Log access to backup server |
Log entry created |
36 |
Log Test 36 |
Log blocked access to backup server |
Log entry created |
37 |
Log Test 37 |
Log access to internal printer |
Log entry created |
38 |
Log Test 38 |
Log blocked access to printer from guest network |
Log entry created |
39 |
Log Test 39 |
Log access to internal API |
Log entry created |
40 |
Log Test 40 |
Log blocked access to internal API |
Log entry created |
41 |
Log Test 41 |
Log access to internal storage |
Log entry created |
42 |
Log Test 42 |
Log blocked access to internal storage |
Log entry created |
43 |
Log Test 43 |
Log firewall rule change |
Configuration log created |
44 |
Log Test 44 |
Log firewall reboot |
System log created |
45 |
Log Test 45 |
Log policy update |
Configuration log created |
46 |
Log Test 46 |
Log admin login to firewall |
Audit log created |
47 |
Log Test 47 |
Log failed admin login attempt |
Alert generated |
48 |
Log Test 48 |
Log configuration backup |
System log created |
49 |
Log Test 49 |
Log firmware update |
System log created |
50 |
Log Test 50 |
Log log file rotation |
System log created |
NAT - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
NAT Test 1 |
Translate private IP to public IP for outbound web traffic |
Translation successful |
2 |
NAT Test 2 |
Block outbound traffic without NAT rule |
Traffic blocked |
3 |
NAT Test 3 |
Translate multiple internal IPs to one public IP (PAT) |
Translation successful |
4 |
NAT Test 4 |
Translate internal IP to specific public IP (Static NAT) |
Translation successful |
5 |
NAT Test 5 |
Translate internal IP range to public IP pool (Dynamic NAT) |
Translation successful |
6 |
NAT Test 6 |
Block inbound traffic without port forwarding |
Traffic blocked |
7 |
NAT Test 7 |
Allow inbound HTTP traffic via port forwarding |
Traffic allowed |
8 |
NAT Test 8 |
Translate internal DNS request to external IP |
Translation successful |
9 |
NAT Test 9 |
Translate internal FTP request to external server |
Translation successful |
10 |
NAT Test 10 |
Block FTP traffic without NAT rule |
Traffic blocked |
11 |
NAT Test 11 |
Translate VoIP traffic using NAT |
Translation successful |
12 |
NAT Test 12 |
Drop SIP call due to missing NAT traversal |
Call failed |
13 |
NAT Test 13 |
Translate ICMP Echo Request to public IP |
Translation successful |
14 |
NAT Test 14 |
Block ICMP without NAT rule |
Traffic blocked |
15 |
NAT Test 15 |
Translate internal SMTP traffic to public IP |
Translation successful |
16 |
NAT Test 16 |
Block SMTP traffic without NAT |
Traffic blocked |
17 |
NAT Test 17 |
Translate internal HTTPS request |
Translation successful |
18 |
NAT Test 18 |
Translate internal SSH session |
Translation successful |
19 |
NAT Test 19 |
Block SSH without NAT rule |
Traffic blocked |
20 |
NAT Test 20 |
Translate internal RDP session |
Translation successful |
21 |
NAT Test 21 |
Block RDP without NAT rule |
Traffic blocked |
22 |
NAT Test 22 |
Translate internal DNS response |
Translation successful |
23 |
NAT Test 23 |
Translate internal NTP request |
Translation successful |
24 |
NAT Test 24 |
Block NTP without NAT rule |
Traffic blocked |
25 |
NAT Test 25 |
Translate internal SNMP request |
Translation successful |
26 |
NAT Test 26 |
Block SNMP without NAT rule |
Traffic blocked |
27 |
NAT Test 27 |
Translate internal Git traffic |
Translation successful |
28 |
NAT Test 28 |
Translate internal API call |
Translation successful |
29 |
NAT Test 29 |
Translate internal cloud storage access |
Translation successful |
30 |
NAT Test 30 |
Translate internal backup traffic |
Translation successful |
31 |
NAT Test 31 |
Translate internal CRM access |
Translation successful |
32 |
NAT Test 32 |
Translate internal HR portal access |
Translation successful |
33 |
NAT Test 33 |
Translate internal finance system access |
Translation successful |
34 |
NAT Test 34 |
Translate internal printer access |
Translation successful |
35 |
NAT Test 35 |
Translate internal wiki access |
Translation successful |
36 |
NAT Test 36 |
Translate internal monitoring tool traffic |
Translation successful |
37 |
NAT Test 37 |
Translate internal DHCP request |
Translation successful |
38 |
NAT Test 38 |
Block DHCP without NAT rule |
Traffic blocked |
39 |
NAT Test 39 |
Translate internal Telnet session |
Translation successful |
40 |
NAT Test 40 |
Block Telnet without NAT rule |
Traffic blocked |
41 |
NAT Test 41 |
Translate internal POP3 traffic |
Translation successful |
42 |
NAT Test 42 |
Translate internal IMAP traffic |
Translation successful |
43 |
NAT Test 43 |
Translate internal LDAP traffic |
Translation successful |
44 |
NAT Test 44 |
Translate internal SMB traffic |
Translation successful |
45 |
NAT Test 45 |
Translate internal HTTPS to external load balancer |
Translation successful |
46 |
NAT Test 46 |
Translate internal traffic to external CDN |
Translation successful |
47 |
NAT Test 47 |
Translate internal traffic to external API gateway |
Translation successful |
48 |
NAT Test 48 |
Translate internal traffic to external analytics platform |
Translation successful |
49 |
NAT Test 49 |
Translate internal traffic to external email service |
Translation successful |
50 |
NAT Test 50 |
Translate internal traffic to external authentication service |
Translation successful |
VPN Support - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
VPN Test 1 |
Allow IPsec VPN tunnel from remote site |
Tunnel established |
2 |
VPN Test 2 |
Block VPN connection from unauthorized IP |
Connection denied |
3 |
VPN Test 3 |
Allow SSL VPN connection from remote user |
Connection successful |
4 |
VPN Test 4 |
Block SSL VPN with invalid certificate |
Connection denied |
5 |
VPN Test 5 |
Allow L2TP VPN with correct credentials |
Tunnel established |
6 |
VPN Test 6 |
Block L2TP VPN with incorrect credentials |
Authentication failed |
7 |
VPN Test 7 |
Log successful VPN login |
Log entry created |
8 |
VPN Test 8 |
Log failed VPN login attempt |
Log entry created |
9 |
VPN Test 9 |
Allow split tunneling for VPN client |
Split tunnel active |
10 |
VPN Test 10 |
Block traffic outside VPN tunnel |
Traffic blocked |
11 |
VPN Test 11 |
Allow VPN traffic through NAT |
Tunnel established |
12 |
VPN Test 12 |
Block VPN traffic without NAT traversal |
Tunnel failed |
13 |
VPN Test 13 |
Allow VPN access to internal resources |
Access granted |
14 |
VPN Test 14 |
Block VPN access to restricted subnet |
Access denied |
15 |
VPN Test 15 |
Allow VPN client to access DNS server |
DNS resolution works |
16 |
VPN Test 16 |
Block VPN client from accessing internet |
Internet blocked |
17 |
VPN Test 17 |
Allow VPN tunnel re-establishment after disconnect |
Tunnel reconnected |
18 |
VPN Test 18 |
Block VPN tunnel with expired certificate |
Connection denied |
19 |
VPN Test 19 |
Allow VPN traffic on custom port |
Tunnel established |
20 |
VPN Test 20 |
Block VPN traffic on non-standard port |
Connection denied |
21 |
VPN Test 21 |
Allow VPN client to access internal web server |
Access granted |
22 |
VPN Test 22 |
Block VPN client from accessing file server |
Access denied |
23 |
VPN Test 23 |
Allow VPN client to access internal printer |
Access granted |
24 |
VPN Test 24 |
Block VPN client from accessing backup server |
Access denied |
25 |
VPN Test 25 |
Allow VPN client to access internal API |
Access granted |
26 |
VPN Test 26 |
Block VPN client from accessing HR system |
Access denied |
27 |
VPN Test 27 |
Allow VPN client to access finance system |
Access granted |
28 |
VPN Test 28 |
Block VPN client from accessing dev environment |
Access denied |
29 |
VPN Test 29 |
Allow VPN client to access internal Git server |
Access granted |
30 |
VPN Test 30 |
Block VPN client from accessing external websites |
Access denied |
31 |
VPN Test 31 |
Allow VPN client to use internal VoIP system |
VoIP works |
32 |
VPN Test 32 |
Block VPN client from using external VoIP |
VoIP blocked |
33 |
VPN Test 33 |
Allow VPN client to access internal database |
Access granted |
34 |
VPN Test 34 |
Block VPN client from accessing test database |
Access denied |
35 |
VPN Test 35 |
Allow VPN client to access internal CRM |
Access granted |
36 |
VPN Test 36 |
Block VPN client from accessing internal wiki |
Access denied |
37 |
VPN Test 37 |
Allow VPN client to access internal monitoring tools |
Access granted |
38 |
VPN Test 38 |
Block VPN client from accessing SNMP services |
Access denied |
39 |
VPN Test 39 |
Allow VPN client to access internal storage |
Access granted |
40 |
VPN Test 40 |
Block VPN client from accessing unauthorized storage |
Access denied |
41 |
VPN Test 41 |
Allow VPN client to access internal email server |
Access granted |
42 |
VPN Test 42 |
Block VPN client from accessing external email |
Access denied |
43 |
VPN Test 43 |
Allow VPN client to access internal time server |
Time sync successful |
44 |
VPN Test 44 |
Block VPN client from accessing external NTP |
Time sync blocked |
45 |
VPN Test 45 |
Allow VPN client to access internal LDAP |
Access granted |
46 |
VPN Test 46 |
Block VPN client from accessing external LDAP |
Access denied |
47 |
VPN Test 47 |
Allow VPN client to access internal SMB share |
Access granted |
48 |
VPN Test 48 |
Block VPN client from accessing external SMB |
Access denied |
49 |
VPN Test 49 |
Allow VPN client to access internal Telnet service |
Access granted |
50 |
VPN Test 50 |
Block VPN client from accessing Telnet externally |
Access denied |
Application Layer Filtering - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
App Filter Test 1 |
Allow HTTP traffic to trusted domain |
Access granted |
2 |
App Filter Test 2 |
Block HTTP traffic to blacklisted domain |
Access denied |
3 |
App Filter Test 3 |
Allow HTTPS traffic to secure portal |
Access granted |
4 |
App Filter Test 4 |
Block HTTPS traffic to unauthorized site |
Access denied |
5 |
App Filter Test 5 |
Allow DNS queries to internal DNS server |
Access granted |
6 |
App Filter Test 6 |
Block DNS queries to external DNS server |
Access denied |
7 |
App Filter Test 7 |
Allow FTP traffic to internal file server |
Access granted |
8 |
App Filter Test 8 |
Block FTP traffic to external server |
Access denied |
9 |
App Filter Test 9 |
Allow SMTP traffic from mail server |
Access granted |
10 |
App Filter Test 10 |
Block SMTP traffic from unknown source |
Access denied |
11 |
App Filter Test 11 |
Allow POP3 traffic from internal client |
Access granted |
12 |
App Filter Test 12 |
Block POP3 traffic from external client |
Access denied |
13 |
App Filter Test 13 |
Allow IMAP traffic to internal mail server |
Access granted |
14 |
App Filter Test 14 |
Block IMAP traffic to external mail server |
Access denied |
15 |
App Filter Test 15 |
Allow SSH traffic to internal server |
Access granted |
16 |
App Filter Test 16 |
Block SSH traffic to external server |
Access denied |
17 |
App Filter Test 17 |
Allow Telnet traffic to internal device |
Access granted |
18 |
App Filter Test 18 |
Block Telnet traffic to external device |
Access denied |
19 |
App Filter Test 19 |
Allow RDP traffic to internal workstation |
Access granted |
20 |
App Filter Test 20 |
Block RDP traffic from external network |
Access denied |
21 |
App Filter Test 21 |
Allow VoIP traffic from internal phones |
Access granted |
22 |
App Filter Test 22 |
Block VoIP traffic from external sources |
Access denied |
23 |
App Filter Test 23 |
Allow access to internal web application |
Access granted |
24 |
App Filter Test 24 |
Block access to unauthorized web application |
Access denied |
25 |
App Filter Test 25 |
Allow access to internal API |
Access granted |
26 |
App Filter Test 26 |
Block access to external API |
Access denied |
27 |
App Filter Test 27 |
Allow access to internal CRM system |
Access granted |
28 |
App Filter Test 28 |
Block access to external CRM system |
Access denied |
29 |
App Filter Test 29 |
Allow access to internal HR portal |
Access granted |
30 |
App Filter Test 30 |
Block access to external HR portal |
Access denied |
31 |
App Filter Test 31 |
Allow access to internal finance system |
Access granted |
32 |
App Filter Test 32 |
Block access to external finance system |
Access denied |
33 |
App Filter Test 33 |
Allow access to internal Git server |
Access granted |
34 |
App Filter Test 34 |
Block access to external Git server |
Access denied |
35 |
App Filter Test 35 |
Allow access to internal wiki |
Access granted |
36 |
App Filter Test 36 |
Block access to external wiki |
Access denied |
37 |
App Filter Test 37 |
Allow access to internal backup system |
Access granted |
38 |
App Filter Test 38 |
Block access to external backup system |
Access denied |
39 |
App Filter Test 39 |
Allow access to internal storage system |
Access granted |
40 |
App Filter Test 40 |
Block access to external storage system |
Access denied |
41 |
App Filter Test 41 |
Allow access to internal printer |
Access granted |
42 |
App Filter Test 42 |
Block access to external printer |
Access denied |
43 |
App Filter Test 43 |
Allow access to internal monitoring tools |
Access granted |
44 |
App Filter Test 44 |
Block access to external monitoring tools |
Access denied |
45 |
App Filter Test 45 |
Allow access to internal analytics platform |
Access granted |
46 |
App Filter Test 46 |
Block access to external analytics platform |
Access denied |
47 |
App Filter Test 47 |
Allow access to internal authentication service |
Access granted |
48 |
App Filter Test 48 |
Block access to external authentication service |
Access denied |
49 |
App Filter Test 49 |
Allow access to internal CDN |
Access granted |
50 |
App Filter Test 50 |
Block access to external CDN |
Access denied |
Intrusion Detection/Prevention, - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
IDPS Test 1 |
Detect port scanning attempt |
Alert generated |
2 |
IDPS Test 2 |
Block IP after multiple failed login attempts |
IP blocked |
3 |
IDPS Test 3 |
Detect SQL injection in HTTP request |
Alert generated |
4 |
IDPS Test 4 |
Block SQL injection attempt |
Request blocked |
5 |
IDPS Test 5 |
Detect cross-site scripting (XSS) attack |
Alert generated |
6 |
IDPS Test 6 |
Block XSS attack |
Request blocked |
7 |
IDPS Test 7 |
Detect buffer overflow attempt |
Alert generated |
8 |
IDPS Test 8 |
Block buffer overflow payload |
Payload dropped |
9 |
IDPS Test 9 |
Detect malware signature in file upload |
Alert generated |
10 |
IDPS Test 10 |
Block malware file upload |
Upload blocked |
11 |
IDPS Test 11 |
Detect brute-force SSH login attempts |
Alert generated |
12 |
IDPS Test 12 |
Block SSH brute-force attack |
IP blocked |
13 |
IDPS Test 13 |
Detect DoS attack pattern |
Alert generated |
14 |
IDPS Test 14 |
Block DoS traffic |
Traffic dropped |
15 |
IDPS Test 15 |
Detect SYN flood attack |
Alert generated |
16 |
IDPS Test 16 |
Block SYN flood packets |
Packets dropped |
17 |
IDPS Test 17 |
Detect ICMP flood |
Alert generated |
18 |
IDPS Test 18 |
Block ICMP flood |
Packets dropped |
19 |
IDPS Test 19 |
Detect unauthorized access to admin panel |
Alert generated |
20 |
IDPS Test 20 |
Block access to admin panel from unknown IP |
Access denied |
21 |
IDPS Test 21 |
Detect suspicious DNS tunneling |
Alert generated |
22 |
IDPS Test 22 |
Block DNS tunneling attempt |
Traffic blocked |
23 |
IDPS Test 23 |
Detect command and control (C2) traffic |
Alert generated |
24 |
IDPS Test 24 |
Block C2 communication |
Traffic blocked |
25 |
IDPS Test 25 |
Detect outbound traffic to known malicious IP |
Alert generated |
26 |
IDPS Test 26 |
Block outbound traffic to malicious IP |
Traffic blocked |
27 |
IDPS Test 27 |
Detect suspicious HTTP user-agent string |
Alert generated |
28 |
IDPS Test 28 |
Block HTTP request with malicious user-agent |
Request blocked |
29 |
IDPS Test 29 |
Detect unauthorized file access attempt |
Alert generated |
30 |
IDPS Test 30 |
Block access to restricted file |
Access denied |
31 |
IDPS Test 31 |
Detect suspicious payload in POST request |
Alert generated |
32 |
IDPS Test 32 |
Block POST request with malicious payload |
Request blocked |
33 |
IDPS Test 33 |
Detect use of known exploit tool |
Alert generated |
34 |
IDPS Test 34 |
Block traffic from exploit tool |
Traffic blocked |
35 |
IDPS Test 35 |
Detect abnormal outbound traffic volume |
Alert generated |
36 |
IDPS Test 36 |
Block excessive outbound traffic |
Traffic throttled |
37 |
IDPS Test 37 |
Detect unauthorized access to internal API |
Alert generated |
38 |
IDPS Test 38 |
Block access to internal API from unknown source |
Access denied |
39 |
IDPS Test 39 |
Detect suspicious SMB traffic |
Alert generated |
40 |
IDPS Test 40 |
Block SMB traffic from untrusted source |
Traffic blocked |
41 |
IDPS Test 41 |
Detect ARP spoofing attempt |
Alert generated |
42 |
IDPS Test 42 |
Block ARP spoofing packets |
Packets dropped |
43 |
IDPS Test 43 |
Detect DNS poisoning attempt |
Alert generated |
44 |
IDPS Test 44 |
Block DNS poisoning packets |
Packets dropped |
45 |
IDPS Test 45 |
Detect unauthorized VPN tunnel |
Alert generated |
46 |
IDPS Test 46 |
Block unauthorized VPN traffic |
Tunnel blocked |
47 |
IDPS Test 47 |
Detect suspicious email attachment |
Alert generated |
48 |
IDPS Test 48 |
Block email with malicious attachment |
Email blocked |
49 |
IDPS Test 49 |
Detect lateral movement within network |
Alert generated |
50 |
IDPS Test 50 |
Block internal traffic violating segmentation policy |
Traffic blocked |
Web Filtering - Testcases
High Availability - Testcases
S.No |
Test Case |
Description |
Expected Result |
---|---|---|---|
1 |
HA Test 1 |
Verify primary firewall is active |
Primary is active |
2 |
HA Test 2 |
Verify secondary firewall is in standby |
Secondary is standby |
3 |
HA Test 3 |
Simulate primary firewall failure |
Secondary takes over |
4 |
HA Test 4 |
Restore primary firewall |
Primary resumes control |
5 |
HA Test 5 |
Test failover time |
Failover < 5 seconds |
6 |
HA Test 6 |
Verify session persistence after failover |
Sessions maintained |
7 |
HA Test 7 |
Verify configuration sync between nodes |
Configs are identical |
8 |
HA Test 8 |
Modify config on primary and check sync |
Sync successful |
9 |
HA Test 9 |
Modify config on secondary (should be blocked) |
Change rejected |
10 |
HA Test 10 |
Test heartbeat communication between nodes |
Heartbeat detected |
11 |
HA Test 11 |
Disconnect heartbeat link |
Failover triggered |
12 |
HA Test 12 |
Reconnect heartbeat link |
HA state restored |
13 |
HA Test 13 |
Simulate power failure on primary |
Secondary takes over |
14 |
HA Test 14 |
Simulate network failure on primary |
Secondary takes over |
15 |
HA Test 15 |
Simulate CPU overload on primary |
Secondary takes over |
16 |
HA Test 16 |
Verify log synchronization |
Logs are synced |
17 |
HA Test 17 |
Test firmware upgrade on primary |
No impact on traffic |
18 |
HA Test 18 |
Test firmware upgrade on secondary |
No impact on traffic |
19 |
HA Test 19 |
Test manual failover |
Secondary becomes active |
20 |
HA Test 20 |
Test automatic failback |
Primary resumes control |
21 |
HA Test 21 |
Verify HA status via CLI |
Status displayed |
22 |
HA Test 22 |
Verify HA status via GUI |
Status displayed |
23 |
HA Test 23 |
Test HA alert generation |
Alert generated |
24 |
HA Test 24 |
Test HA email notification |
Email received |
25 |
HA Test 25 |
Test HA SNMP trap |
SNMP trap sent |
26 |
HA Test 26 |
Test HA syslog message |
Syslog entry created |
27 |
HA Test 27 |
Test HA with asymmetric routing |
Traffic flows correctly |
28 |
HA Test 28 |
Test HA with dynamic routing protocols |
Routes updated correctly |
29 |
HA Test 29 |
Test HA with static routes |
Routes remain consistent |
30 |
HA Test 30 |
Test HA with NAT rules |
NAT rules preserved |
31 |
HA Test 31 |
Test HA with firewall policies |
Policies preserved |
32 |
HA Test 32 |
Test HA with VPN tunnels |
VPN remains active |
33 |
HA Test 33 |
Test HA with IPS/IDS enabled |
Protection continues |
34 |
HA Test 34 |
Test HA with web filtering enabled |
Filtering continues |
35 |
HA Test 35 |
Test HA with application control enabled |
Control continues |
36 |
HA Test 36 |
Test HA with SSL inspection enabled |
Inspection continues |
37 |
HA Test 37 |
Test HA with logging server configured |
Logs sent correctly |
38 |
HA Test 38 |
Test HA with external authentication server |
Auth remains functional |
39 |
HA Test 39 |
Test HA with cloud-based management |
Cloud sync continues |
40 |
HA Test 40 |
Test HA with high traffic load |
No packet loss |
41 |
HA Test 41 |
Test HA with multicast traffic |
Multicast flows correctly |
42 |
HA Test 42 |
Test HA with broadcast traffic |
Broadcast flows correctly |
43 |
HA Test 43 |
Test HA with VLAN tagging |
VLANs preserved |
44 |
HA Test 44 |
Test HA with multiple interfaces |
Interfaces failover |
45 |
HA Test 45 |
Test HA with link aggregation |
Aggregation preserved |
46 |
HA Test 46 |
Test HA with DHCP relay |
Relay continues |
47 |
HA Test 47 |
Test HA with DNS proxy |
DNS proxy continues |
48 |
HA Test 48 |
Test HA with captive portal |
Portal remains active |
49 |
HA Test 49 |
Test HA with API integration |
API remains functional |
50 |
HA Test 50 |
Test HA with zero-touch provisioning |
Provisioning succeeds |
Reference links