Packet filtering firewall-dynamic packet filtering, Computer Network Security

Dynamic Packet Filtering


Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection is made the information about the connection is stored in the memory. The filter scans the packets coming from that connection for any harmful payload. After which it calls that connection as a secure connection and any packet coming from that connection is allowed to pass without further processing. For example, if a link on a Web page is being clicked, an HTTP request is made to a specific URL address. At first packets coming back from that address would pass through the stateful inspection, checked and after ensuring that the connection is secure all later packets coming from that web server are allowed to pass which is a performance gain over static filter.

Posted Date: 9/13/2012 5:55:51 AM | Location : United States







Related Discussions:- Packet filtering firewall-dynamic packet filtering, Assignment Help, Ask Question on Packet filtering firewall-dynamic packet filtering, Get Answer, Expert's Help, Packet filtering firewall-dynamic packet filtering Discussions

Write discussion on Packet filtering firewall-dynamic packet filtering
Your posts are moderated
Related Questions
Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare


Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

How safe is the encryption of virtual private networks?

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell