Answering the question: "How do firewalls and intrusion-detection systems work?" This video covers operational security for enterprise networks, in particular rule-based and flow-based packet filtering. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 9. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: Background music:











