How Does the Pakcte Flow in Checkpoint Firewall?
SAM Database (Suspicious Activity Monitoring)
Address Spoofing
Session Lookup
Policy Lookup
Destination NAT
Route Lookup
Source NAT
Layer 7 Inspection
VPN
Routing.
Above is the various activities the cpaket is subjected to once a packet reaches a Checkpoint firewall.
No comments:
Post a Comment