They most surely will not do deep packet inspection.
However, they are usually quite good at blocking external traffic, even when you have port forwarding and whatnot enabled.
If you are doing things that would draw the attention (or ire) of a skilled attacker, then you should have already deployed (or built) a more powerful firewall.Well, still though, I was hoping they would be a little more concerned about their customers security. How is the firewall supposed to recognize if SSH traffic that's supposed to be on port 22 instead operates over HTTP ports? Is it good enough to block that kind of traffic? If its not and I become a target from a skilled hacker, I'm basically screwed.
If you are doing things that would draw the attention (or ire) of a skilled attacker, then you should have already deployed (or built) a more powerful firewall.
Why would you have ANY ports open that would allow unsolicited traffic into your network?
Even enterprise routers won't catch that type of traffic without some sort of real-time threat management (read costs a lot). What you're talking about is usually a couple of hundred dollars a year in the enterprise world and that's after buying a router that's over a grand.Well, still though, I was hoping they would be a little more concerned about their customers security. How is the firewall supposed to recognize if SSH traffic that's supposed to be on port 22 instead operates over HTTP ports? Is it good enough to block that kind of traffic? If its not and I become a target from a skilled hacker, I'm basically screwed.
And NAT is what keeps those thousands of ports closed. In fact, even port 80 is closed unless it is used by your router for some sort of remote access.Well, I don't really, I think, but there are thousands of ports that a hacker can use from my understanding. I just assumed that the modem firewalls would already perform deep packet inspections since its the new end thing.