google.com, pub-5331922595023406, DIRECT, f08c47fec0942fa0 Computer Sevak: Packet Flow in Checkpoint Firewall

Packet Flow in Checkpoint Firewall

How Does the Pakcte Flow in Checkpoint Firewall?

SAM Database (Suspicious Activity Monitoring)

Address Spoofing

Session Lookup

Policy Lookup

Destination NAT

Route Lookup

Source NAT

Layer 7 Inspection

VPN

Routing.


Above is the various activities the cpaket is subjected to once a packet reaches a Checkpoint firewall. 

No comments:

Post a Comment