SlideShare a Scribd company logo
1 of 33
IT346 Information

System Security

Week 6-1: Firewall (1)

Faculty of Information Technology

Page

1
OSI v.s. TCP/IP
Model
Application Layer
Presentation Layer

Application Layer

Session Layer
Transport Layer

Transport Layer

Network Layer

Internet Layer

Data Link Layer

Host-to-Network Layer

Physical Layer

(Network Access)

OSI Model

Faculty of Information Technology

TCP/IP Model

Page

2
TCP/IP

 TCP/IP (Transmission Control Protocol/

Internet Protocol)
‣
‣

Faculty of Information Technology

Page

3
TCP/IP Protocol
 TCP/IP
‣

‣

-

‣
Faculty of Information Technology

Page

4
TCP/IP Model
Layer

Faculty of Information Technology

Protocol Example

Page

5
Encapsulation

Faculty of Information Technology

Page

6
Encapsulation


Layer
‣

Encapsulate
User
Application

‣

User

User Data

user

Application Data
TCP

TCP
Header

‣

TCP Segment
IP

‣
Faculty of Information Technology

IP
Header

Application Data
TCP
TCP Segment
IP
Page

7
Host-to-Network
Layer
 Host-to-Network Layer:



‣

layer
‣

Layer

Layer

IP Packet

IP

‣

IP Layer

Faculty of Information Technology

Page

8
Internet Layer
 Internet Layer:
‣

packet-switching network
Connectionless (

)

‣

Packet)

‣

Faculty of Information Technology

Page

9
Internet Layer: IP
 IP (Internet Protocol)
‣ IP
Network Layer
(Address)

IP

‣

datagram)
data
link
MTU (Maximum Transmission
Unit)
IP
Ethernet

Faculty of Information Technology

Page

10
Internet Layer: IP
 IP (Internet Protocol)
‣
IP
connectionless

datagram
‣

datagram
datagram

fragmentation)
datagram

Faculty of Information Technology

Page

11
Internet Layer:

ICMP(Internet Control Message
 ICMP
Protocol)
‣ ICMP

‣ ICMP
‣

Faculty of Information Technology

Datagram)
datagram
Router
datagram
Host
ICMP Message
datagram
ICMP Message
Error

Page

12
Transport Layer
 Transport Layer :
Protocol

Transmission Control Protocol (TCP)
‣

connection-oriented)
Byte

stream
‣

message
Internet Layer
‣ TCP
Faculty of Information Technology

(Flow Control)

message

Page

13
Transport Layer
UDP (User Datagram Protocol)
‣

connectionless)
‣

‣

system)
request/reply)

client/server

voice)
Faculty of Information Technology

Page

14
Application Layer
 Application Layer:

Telnet:
Host

‣

Host

FTP:

‣ FTP

Faculty of Information Technology

Page

15
Firewall?


Firewall



Firewall
Faculty of Information Technology

Page

16
Firewall
 Firewall

(Component)

 Firewall

‣
‣

Faculty of Information Technology

Page

17
Firewall


‣
‣

Firewall
(packet)

Firewall



Firewall
‣

Faculty of Information Technology

Page

18
Firewall
Firewall



Firewall
Network-based firewall
‣

(traffic)
• Software-based firewall
• Hardware-based firewall

Host-based firewall
‣

Faculty of Information Technology

Personal firewall
Page

19
Firewall


Layer
1.) Packet filtering firewall
‣

route)

Firewall

(Router)

header
rules)
drop)
accept)

2.) Stateful inspection firewall
‣

Packet Filtering

Header
message content)
Faculty of Information Technology

Page

20
Firewall
3.) Application layer firewall

Application Gateway
Firewall

‣

‣

‣ Application Gateway

Application Layer)
Faculty of Information Technology

Page

21
Packet Filtering
Firewall

Router
IP address
Routing Table





firewall
Faculty of Information Technology

(Packet Filtering)

(Access
Page

22
Packet Filtering
Firewall


Firewall


‣


‣


‣ Source IP address (
‣ Destination IP Address (
‣ Protocol Type (
Faculty of Information Technology

)

)

)
Page

23
Packet Filtering
Firewall

Packet Filtering
TCP



‣
‣

Address

‣
‣

Faculty of Information Technology

Page

24
Packet Filtering
Firewall


‣
‣

(transparent)

‣

function

• Packet filter firewalls

application

application

application
firewall
function

‣
Faculty of Information Technology

Page

25
Packet Filtering
Firewall


‣
‣

TCP/IP
•

address

packet
Layer 3

/

‣

Faculty of Information Technology

Page

26
Stateful Inspection
Firewall
 Packet filter

‣

packet
packet

clients
(1024 to 65535)
TCP
server
packet filtering
firewall
(inbound traffic)
TCP traffic


Faculty of Information Technology

Page

27
Stateful Inspection
Firewall

 Stateful Inspection Firewall

TCP traffic

connection

directory
(Outbound)

TCP

 State Table

Connection
Source Address, Destination
addresses, Protocol type, Port number
Flag
‣

Faculty of Information Technology

Page

28
Stateful Inspection
Firewall
 Firewall

‣

packet
packet filtering firewall
TCP connection

TCP sequence
numbers

sequence number
session hijacking
‣

protocols
SIPS
Faculty of Information Technology

FTP, IM
track

Page

29
Stateful Firewall
Connection State
 Directory

(outbound)
Source

TCP

Destination
Address

Destination
Port

Connection
State

192.168.1.100 1030

210.9.88.29

80

Established

192.168.1.102 1031

216.32.42.123 80

Established

192.168.1.101 1033

173.66.32.122 25

Established

192.168.1.106 1035

177.231.32.12 79

Established

223.43.21.231 1990

192.168.1.6

80

Established

219.22.123.32 2112

192.168.1.6

80

Established

210.99.212.18 3321

192.168.1.6

80

Established

24.102.32.23

1025

192.168.1.6

80

Established

223.21.22.12

1046

192.168.1.6

80

Established

Address

Faculty of Information Technology

Source Port

Page

30
Application Layer
Firewall


Proxy Firewall
Application Gateway



 Firewall

(Network Guard)



Traffic (


)

Application Layer Firewall

Faculty of Information Technology

Page

31
Application Layer
Firewall



Client
Proxy



Proxy
connection 2

Faculty of Information Technology

Service
Proxy
Proxy

Client

Client

Client

Proxy
Page

32
Application Layer
Firewall

Application Layer Firewall
Firewall
Firewall



Traffic

‣

server

firewall
client

 Application Layer Firewall

firewall
Faculty of Information Technology

firewall

application
Page

33

More Related Content

Similar to IT346 Firewall Week 6-1: OSI v.s. TCP/IP Model

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Edureka!
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switchesAlexandros Britzolakis
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraEmbarcados
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar ALLCAD Services Pvt Limited
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
Wireshark_Tutorial.pptx
Wireshark_Tutorial.pptxWireshark_Tutorial.pptx
Wireshark_Tutorial.pptxAdeelIshtiaq4
 
protocol architecture
 protocol architecture protocol architecture
protocol architectureSrinivasa Rao
 
Extract Network and System resource for analysis of Network Security Modeling
Extract Network and System resource for analysis of Network Security ModelingExtract Network and System resource for analysis of Network Security Modeling
Extract Network and System resource for analysis of Network Security ModelingDhiraj Gajurel
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 

Similar to IT346 Firewall Week 6-1: OSI v.s. TCP/IP Model (20)

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 
Profinet Innovations 2018 - Karsten Schneider
Profinet Innovations 2018 - Karsten SchneiderProfinet Innovations 2018 - Karsten Schneider
Profinet Innovations 2018 - Karsten Schneider
 
ip.ppt
ip.pptip.ppt
ip.ppt
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switches
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
TCP IP
TCP IP TCP IP
TCP IP
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
Wireshark_Tutorial.pptx
Wireshark_Tutorial.pptxWireshark_Tutorial.pptx
Wireshark_Tutorial.pptx
 
PI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design BasicsPI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design Basics
 
Net 2
Net 2Net 2
Net 2
 
TCP Model
TCP ModelTCP Model
TCP Model
 
protocol architecture
 protocol architecture protocol architecture
protocol architecture
 
Extract Network and System resource for analysis of Network Security Modeling
Extract Network and System resource for analysis of Network Security ModelingExtract Network and System resource for analysis of Network Security Modeling
Extract Network and System resource for analysis of Network Security Modeling
 
Hacking3e ppt ch02
Hacking3e ppt ch02Hacking3e ppt ch02
Hacking3e ppt ch02
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 

More from Bee Lalita

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsBee Lalita
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2Bee Lalita
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2Bee Lalita
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1Bee Lalita
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authenticationBee Lalita
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pkiBee Lalita
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pkiBee Lalita
 
Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Bee Lalita
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2Bee Lalita
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1Bee Lalita
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2Bee Lalita
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Bee Lalita
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1Bee Lalita
 

More from Bee Lalita (13)

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authentication
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Information system security wk4-cryptography-2
Information system security wk4-cryptography-2
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

IT346 Firewall Week 6-1: OSI v.s. TCP/IP Model

Editor's Notes

  1. A stateful inspection packet firewall tightens up the rules for TCP traffic bycreating a directory of outbound TCP connections, as shown in Table 9.2 . There isan entry for each currently established connection. The packet filter will now allowincoming traffic to high-numbered ports only for those packets that fit the profile ofone of the entries in this directory.