wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

FIREWALL

Blog banner

How social media affect

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Strengthening Active Directory Security

Blog banner

Record Blocking

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

E-mail security

Blog banner

Modern Operating System

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Different Types of Data

Blog banner

10 Survival Tips that might save your life

Blog banner

Internet of Things and cyber security

Blog banner

Microsoft Windows Overview

Blog banner

Software

Blog banner

Risk factors in service transistion

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Boxing

Blog banner

Phishing

Blog banner

Virtual Memory

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

THE ACTORS LIFE

Blog banner

Network Forensics Tools and Techniques

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Principles of Service Operation

Blog banner

Clarizen

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

The Right way of cooking

Blog banner

Khau Galli – Vile Parle

Blog banner

Measuring IT Risk

Blog banner

OS Assignment 3

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Compromising Mobile Platforms

Blog banner

Deadlock Prevention

Blog banner

What is thread and multithreading ?

Blog banner

Love is in air.....

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

My Favorite Sportsperson

Blog banner

Banaras

Blog banner

What are Virtual Machines

Blog banner

CONCURRENCY

Blog banner