Watch this video on YouTube
During a simulated attack, an attacker alters the TTL (Time To Live) field of the packets being sent to trick the firewall into thinking the traffic is coming from a trusted internal source. What evasion technique does this describe?