Packet filtering firewall-stateless packet filtering, Computer Network Security

Stateless Packet Filtering


Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the address the data is coming from, the address the data is going to and the ports being used to transfer the data. Such type of filtering does not make content-based decision that is basic packet filtering do not do anything based on the data itself. Once the rules defined for a port or IP address will always be followed.

Posted Date: 9/13/2012 5:55:17 AM | Location : United States







Related Discussions:- Packet filtering firewall-stateless packet filtering, Assignment Help, Ask Question on Packet filtering firewall-stateless packet filtering, Get Answer, Expert's Help, Packet filtering firewall-stateless packet filtering Discussions

Write discussion on Packet filtering firewall-stateless packet filtering
Your posts are moderated
Related Questions
A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certificate

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated