O'Reilly logo

Cisco Networking Simplified, Second Edition by Paul Della Maggiora, Neil Anderson, Jim Doherty

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter . Deep Packet Inspection: Controlling Unwanted Applications

How Do You Catch a Criminal When Everyone Wears a Mask?

Traditional firewalls can be very effective against network intrusions in which packets are sent from an untrusted network to a trusted one. The IP protocol being used can be checked for appropriateness and to ensure that it is part of a conversation that originated from the trusted side. In this way, security attacks that rely on manipulating certain IP protocols can be halted.

Increasingly, the number of IP protocols used on the network and the Internet is narrowing dramatically. With the popularity of TCP/IP applications, and even more so web-based applications using HTTP, the vast majority of traffic on modern networks ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required