PRINCIPLES OF INFORMATION SECURITY Chapter Notes -Local Area Network, Intrusion Detection System, File Transfer Protocol

27 views2 pages

Document Summary

At intersections where equipment like routers and switches are used, packet filtering firewalls run inline. These firewalls don"t route packets; instead, they check each one against a list of predetermined standards such as the permitted ip addresses, packet type, port number, and other information from the packet protocol headers. Generally speaking, difficult packets are unceremoniously dropped, which means they are not transmitted and eventually vanish from existence. This is another relatively quick method of identifying malicious content. However, they don"t check the packets themselves. gateway for applications. The single point of entry and exit for the network is this form of device, which is technically a proxy but is also referred to as a proxy firewall. Application-level gateways filter packets based on a variety of factors, such as the http request string, in addition to the service for which they are meant, as indicated by the destination port.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions