wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Cache Memory in Operating Systems

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

LinkedIn

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

OS Assignment 3

Blog banner

Data Visualization in Decision-Making

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

MYNTRA

Blog banner

Uniprocessor scheduling

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Assignment-3

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Theads

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Cyber Security in Data Breaching

Blog banner

Password Generator - Lisp

Blog banner

Clarizen

Blog banner

OS- Assignnment 1

Blog banner

The evolution of OS

Blog banner

Riddhi Miyani 53003220140

Blog banner

Types of threads

Blog banner

Apache Kafka

Blog banner

38_Exploring The Honeynet Project

Blog banner

Concurrency and Deadlocks

Blog banner

Interrupts

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Malicious softwares

Blog banner

Studying ProRat

Blog banner

Types of E-Commerce

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Buffer overflow

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

An Overview of Virtual Machines

Blog banner

Excel records

Blog banner

Mumbai

Blog banner

INTERRUPTS

Blog banner

Music helps reduce stress

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

DISK SCHEDULING

Blog banner

Hacking of web server and application

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner