Skip to Main Content
Network Security First-Step, Second Edition
book

Network Security First-Step, Second Edition

by Thomas M. Thomas, Donald Stoddard
December 2011
Beginner content levelBeginner
552 pages
13h 30m
English
Cisco Press
Content preview from Network Security First-Step, Second Edition

Firewall Operational Overview

Every long journey begins with the first step. Before delving too deeply into other areas of security appliance behavior, it is essential to understand how a firewall performs its magic.

Most firewalls (most, not all) rely on Stateful Packet Inspection (SPI) to keep track of all outbound packets and the responses these packets might generate. Keeping track of the hosts on the protected network that are generating outbound packets keeps rogue or unsolicited WAN packets from entering an external interface.

In other words, a firewall that uses SPI, as discussed in Chapter 5, “Overview of Security Technologies,” watches all traffic that originates from an inside host, tracks the conversation from that host to the desired ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Security Auditing

Network Security Auditing

Chris Jackson - CCIE No. 6256
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke

Publisher Resources

ISBN: 9781587204142Purchase book