1- Chapter 7 . Firewalls
1+ Chapter 9 . Firewalls
22====================
33
44Whereas much of this book has focused on the uses of cryptography to
@@ -11,7 +11,7 @@ help you if your machine has unpatched vulnerabilities. So other
1111approaches are often used to keep out various forms of potentially
1212harmful traffic. Firewalls are one of the most common ways to do this.
1313
14- 7 .1 Basic Principles of Firewalls
14+ 9 .1 Basic Principles of Firewalls
1515-----------------------------------
1616
1717The historical meaning of a firewall is a barrier to prevent the
@@ -210,7 +210,7 @@ an HTTP request), this is referred to as *deep packet inspection*
210210start encrypting packets end-to-end, as with TLS. We return to this
211211issue below.
212212
213- 6 .2 Strengths and Weaknesses of Firewalls
213+ 9 .2 Strengths and Weaknesses of Firewalls
214214-----------------------------------------
215215
216216At best, a firewall protects a network from undesired access from the
@@ -285,7 +285,7 @@ enterprise or a data center that has no need to pass through such a
285285choke point. These limitations have led to the development of
286286*distributed firewalls *, which we discuss in the following section.
287287
288- 6 .3 Distributed Firewalls
288+ 9 .3 Distributed Firewalls
289289-------------------------
290290
291291A conventional firewall is implemented as a *choke point: * the network
0 commit comments