wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

To-Do List In LISP

Blog banner

Satellite Based Positioning

Blog banner

Instagram

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

MailChimp

Blog banner

Understanding E-mail Servers

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Child labour

Blog banner

Deadlock in Operating System

Blog banner

Multicore CPUs

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

GraphQL

Blog banner

RAID

Blog banner

PHISHING

Blog banner

Uniprocessor Scheduling

Blog banner

IP ADDRESS

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Deadlocks in Operating System

Blog banner

Child labour

Blog banner

objectives and function of operating system

Blog banner

NETWORK SECURITY RISKS

Blog banner

Modern OS

Blog banner

Creating Digitally Signed Document

Blog banner

The IT Service Lifecycle

Blog banner

Deadlock and Starvation

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Some web vulnerabilities

Blog banner

memory management

Blog banner

Clustering Techniques

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

From Model Mistakes to Metrics

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Memory hierarchy

Blog banner

RAID_142

Blog banner

ASANA- A Management System.

Blog banner

Getting started with Android Studio

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Computer Security

Blog banner