How do we test for stateful packet in firewall ?
Do we need scripts written for this ?
Answers were Sorted based on User's Feedback
Answer / s.m.feroz ahmed
Hi,
There are 3 types of packet Filtering as below :
1)Packet Filtering
2)Proxy &
3)Stateful Packet Filtering
Packet Filtering is slow and not reliable
proxy is fast but not reliable
stateful packet filtering is fast and reliable when
compared to packet and proxy filtering.So,we use Stateful
packet filtering.Stateful packet filtering works on 3rd
layer of OSI model and does the work of all 7 layers in OSI
layer.
To,test stateful packet filtering one should have
knowledge on statetable state table is defined as 3 way
handshaking wherein packets flow from Source to destination
in this manner:
SYN-----SYNACK----ACK (SYN:synchronize and
ACK:Acknowledgement).If it passes through this 3 way
handshaking then it is considered as State-ful-Packet
Filtering.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / sana
check for the protocol used connectionless or connection
oriented. if the protocol is connection oriented like TCP
then it can be a stateful packet. we do need scripts for this
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sana
check for the protocol used connectionless or connection
oriented. if the protocol is connection oriented like TCP
then it can be a stateful packet. we do need scripts for this
| Is This Answer Correct ? | 0 Yes | 0 No |
What a security mean in your sense?
What is risk in IT-Security?
Diff bet ripv1 & ripv2?
What is terminal emulation, in which layer it comes
What is an information security management system (isms)?
What defensive mechanisms for viruses can be encountered?
What is 3 DES 256 bit security in IPSec technology.
1- what is PHP ? 2- what is TS getway and TS application ? 3- what is channel in telecom and y we use ? 4- what is difference between spyware and mallware ? 5- what is main difference between standard and extended ACL ? please repley in sequence
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
Explain the difference between discretionary access control and mandatory access control?
What is RIS?
Can you give me some ransomware variants?