Packet filtering firewall-dynamic packet filtering, Computer Network Security

Dynamic Packet Filtering


Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection is made the information about the connection is stored in the memory. The filter scans the packets coming from that connection for any harmful payload. After which it calls that connection as a secure connection and any packet coming from that connection is allowed to pass without further processing. For example, if a link on a Web page is being clicked, an HTTP request is made to a specific URL address. At first packets coming back from that address would pass through the stateful inspection, checked and after ensuring that the connection is secure all later packets coming from that web server are allowed to pass which is a performance gain over static filter.

Posted Date: 9/13/2012 5:55:51 AM | Location : United States







Related Discussions:- Packet filtering firewall-dynamic packet filtering, Assignment Help, Ask Question on Packet filtering firewall-dynamic packet filtering, Get Answer, Expert's Help, Packet filtering firewall-dynamic packet filtering Discussions

Write discussion on Packet filtering firewall-dynamic packet filtering
Your posts are moderated
Related Questions
Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

implementing password policy in organisation