Packet filtering firewall-dynamic packet filtering, Computer Network Security

Dynamic Packet Filtering


Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection is made the information about the connection is stored in the memory. The filter scans the packets coming from that connection for any harmful payload. After which it calls that connection as a secure connection and any packet coming from that connection is allowed to pass without further processing. For example, if a link on a Web page is being clicked, an HTTP request is made to a specific URL address. At first packets coming back from that address would pass through the stateful inspection, checked and after ensuring that the connection is secure all later packets coming from that web server are allowed to pass which is a performance gain over static filter.

Posted Date: 9/13/2012 5:55:51 AM | Location : United States







Related Discussions:- Packet filtering firewall-dynamic packet filtering, Assignment Help, Ask Question on Packet filtering firewall-dynamic packet filtering, Get Answer, Expert's Help, Packet filtering firewall-dynamic packet filtering Discussions

Write discussion on Packet filtering firewall-dynamic packet filtering
Your posts are moderated
Related Questions
TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

Discuss the risks of having a single root user

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

UDP DATAGRAM FORMAT: It is given in the figure below:

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

ROUTING TABLES AND ADDRESS MASKS Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address m

CRC in matlab

WIRELESS SECURITY TOOLS An organization which spends its time securing wired network and leaves wireless networks to operate in any manner is opening itself up for security brea