Packet filtering firewall, Computer Network Security

Packet Filtering Firewall

Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interconnects IP networks is called a router. Packets that are traversing the network travel from router to router until they reach their destination. Each packet contains the address of its ultimate destination which tells the router where it wants to go. Routers communicate with each other through routing protocols like Routing Information Protocol (RIP)  and Open Shortest Path First (OSPF)  and build routing tables in their memories. These tables help the routers to determine how to get the packets to their destination. While routing a packet, a router compares the packet’s destination address to the entries in the routing table and forward the packets as directed by the routing table. In determining how to forward a packet towards it destination, a packet filtering router also analyzes each packet against a set of rules and those that conform to these rules are allowed to pass through while others are discarded.

Posted Date: 9/13/2012 5:54:32 AM | Location : United States







Related Discussions:- Packet filtering firewall, Assignment Help, Ask Question on Packet filtering firewall, Get Answer, Expert's Help, Packet filtering firewall Discussions

Write discussion on Packet filtering firewall
Your posts are moderated
Related Questions
Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of