Packet filtering firewall, Computer Network Security

Packet Filtering Firewall

Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interconnects IP networks is called a router. Packets that are traversing the network travel from router to router until they reach their destination. Each packet contains the address of its ultimate destination which tells the router where it wants to go. Routers communicate with each other through routing protocols like Routing Information Protocol (RIP)  and Open Shortest Path First (OSPF)  and build routing tables in their memories. These tables help the routers to determine how to get the packets to their destination. While routing a packet, a router compares the packet’s destination address to the entries in the routing table and forward the packets as directed by the routing table. In determining how to forward a packet towards it destination, a packet filtering router also analyzes each packet against a set of rules and those that conform to these rules are allowed to pass through while others are discarded.

Posted Date: 9/13/2012 5:54:32 AM | Location : United States







Related Discussions:- Packet filtering firewall, Assignment Help, Ask Question on Packet filtering firewall, Get Answer, Expert's Help, Packet filtering firewall Discussions

Write discussion on Packet filtering firewall
Your posts are moderated
Related Questions
Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment.  Note:  before commencing research on the topic, y

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc

Normal 0 false false false EN-US X-NONE X-NONE

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio