This chapter discusses the use of technologies that have evolved to support and enhance network security. Many of these technologies are used today without the user really understanding when or where they are operating. After reading this chapter, you will understand the benefits of these technologies, where they operate, and some of the risks associated with them. By the end of this chapter, you should know and be able to explain the following:
How packet filtering can be employed to reduce simple threats to a network
Precisely what is stateful packet inspection, and why we ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.