Packet filtering firewall-stateless packet filtering, Computer Network Security

Stateless Packet Filtering


Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the address the data is coming from, the address the data is going to and the ports being used to transfer the data. Such type of filtering does not make content-based decision that is basic packet filtering do not do anything based on the data itself. Once the rules defined for a port or IP address will always be followed.

Posted Date: 9/13/2012 5:55:17 AM | Location : United States







Related Discussions:- Packet filtering firewall-stateless packet filtering, Assignment Help, Ask Question on Packet filtering firewall-stateless packet filtering, Get Answer, Expert's Help, Packet filtering firewall-stateless packet filtering Discussions

Write discussion on Packet filtering firewall-stateless packet filtering
Your posts are moderated
Related Questions
(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu