Packet filtering firewall-dynamic packet filtering, Computer Network Security

Dynamic Packet Filtering

Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection is made the information about the connection is stored in the memory. The filter scans the packets coming from that connection for any harmful payload. After which it calls that connection as a secure connection and any packet coming from that connection is allowed to pass without further processing. For example, if a link on a Web page is being clicked, an HTTP request is made to a specific URL address. At first packets coming back from that address would pass through the stateful inspection, checked and after ensuring that the connection is secure all later packets coming from that web server are allowed to pass which is a performance gain over static filter.

Posted Date: 9/13/2012 5:55:51 AM | Location : United States

Related Discussions:- Packet filtering firewall-dynamic packet filtering, Assignment Help, Ask Question on Packet filtering firewall-dynamic packet filtering, Get Answer, Expert's Help, Packet filtering firewall-dynamic packet filtering Discussions

Write discussion on Packet filtering firewall-dynamic packet filtering
Your posts are moderated
Related Questions
?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp