From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

The 5-tuple approach

The 5-tuple approach

(bright music) - [Narrator] Let's now take a look at the 5-Tuple Approach. And this approach is to use a set of five key elements of a network communication session that will uniquely identify that session. And it's important to understand that a communication session is unidirectional. For example, let's say that on my PC, I have a Secure Shell session going with a Linux host. Well, that communication flow going back and forth between my PC and the Linux host, that would actually consist of two sessions. One session is from my PC to the Linux host, and the other session is from the Linux host back to my PC. That way a single session always has a single source and destination. For example, let's say that we have an HTTPS session going from this source PC to this destination web server. And let's consider the five Tuples that we would use to identify the session going from the source to the destination. The first Tuple is the source IP address, the IP address of that PC, which is…

Contents