How do we test for stateful packet in firewall ?
Do we need scripts written for this ?
Answers were Sorted based on User's Feedback
Answer / s.m.feroz ahmed
Hi,
There are 3 types of packet Filtering as below :
1)Packet Filtering
2)Proxy &
3)Stateful Packet Filtering
Packet Filtering is slow and not reliable
proxy is fast but not reliable
stateful packet filtering is fast and reliable when
compared to packet and proxy filtering.So,we use Stateful
packet filtering.Stateful packet filtering works on 3rd
layer of OSI model and does the work of all 7 layers in OSI
layer.
To,test stateful packet filtering one should have
knowledge on statetable state table is defined as 3 way
handshaking wherein packets flow from Source to destination
in this manner:
SYN-----SYNACK----ACK (SYN:synchronize and
ACK:Acknowledgement).If it passes through this 3 way
handshaking then it is considered as State-ful-Packet
Filtering.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / sana
check for the protocol used connectionless or connection
oriented. if the protocol is connection oriented like TCP
then it can be a stateful packet. we do need scripts for this
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sana
check for the protocol used connectionless or connection
oriented. if the protocol is connection oriented like TCP
then it can be a stateful packet. we do need scripts for this
| Is This Answer Correct ? | 0 Yes | 0 No |
What is frame relay, in which layer it comes
how remove add on from explorer
How to implement PIX firewall security?
What are manageable and non manageable switches?
What is classful and classless routing?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What is risk in IT-Security?
How the Router will pass messages or packets?How it communicate with the Switches?
Name firewall architectures?
What are major types of networks and explain
explain what is meant by port blocking within lan?
What is the difference between cybersecurity and information security?