Home > Articles > Home & Office Computing > Microsoft Windows Desktop

  • Print
  • + Share This
This chapter is from the book

Static Firewall

The static firewall works by examining each packet at the Network layer (Fig. 5-1) as it attempts to access a computer. By looking at the source and destination IP address and comparing them to a predefined list, the firewall will either permit or reject a packet. Although this method is effective for most purposes, it can be tedious to configure. Additionally, a static firewall can be tricked through IP spoofing. If a hacker fakes his IP address, or creates his own packets with one of the many hacker tools available on the Internet, the static firewall will think the packet is legitimate and will allow its passage.

Figure 5-1Figure 5-1 The OSI Reference Model

  • + Share This
  • 🔖 Save To Your Account