Home > Articles > Home & Office Computing > Microsoft Windows Desktop

This chapter is from the book

Static Firewall

The static firewall works by examining each packet at the Network layer (Fig. 5-1) as it attempts to access a computer. By looking at the source and destination IP address and comparing them to a predefined list, the firewall will either permit or reject a packet. Although this method is effective for most purposes, it can be tedious to configure. Additionally, a static firewall can be tricked through IP spoofing. If a hacker fakes his IP address, or creates his own packets with one of the many hacker tools available on the Internet, the static firewall will think the packet is legitimate and will allow its passage.

Figure 5-1Figure 5-1 The OSI Reference Model

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.