wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

History of Money

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Device driver

Blog banner

Time Series Analysis

Blog banner

HR Automation : Need of the hour

Blog banner

How Cyber Forensics use in AI

Blog banner

FIREWALL

Blog banner

The evolution of OS

Blog banner

Gamer life

Blog banner

Starvation

Blog banner

Phishing

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Life of a 2020-2021 student

Blog banner

APACHE KAFKA

Blog banner

Data Structures

Blog banner

Old age lifestyle

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Types of Threads

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Multicore and Multithreading

Blog banner

File management In Operating System

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Service transistion under difficult conditions

Blog banner

Virtual Machine

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

virtual memory

Blog banner

Artificial Intelligence and I

Blog banner

On-Page SEO

Blog banner

Place to visit in pune

Blog banner

Security Breaches in Stock market trading

Blog banner

10 Unknown facts about India's Independence

Blog banner

OS Assignment-3

Blog banner

Photorec - media recovery tool

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

CoWIN

Blog banner