This chapter discusses the use of technologies that have evolved to support and enhance network security. Many of these technologies are used today without the user really understanding when or where they are operating. After reading this chapter, you will understand the benefits of these technologies, where they operate, and some of the risks associated with them. By the end of this chapter, you should know and be able to explain the following:
How packet filtering can be employed to reduce simple threats to a network
Precisely what is stateful packet inspection, and why we ...
Get Network Security First-Step now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.