wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Challenges and risks in service operations

Blog banner

Data Visualization in Decision-Making

Blog banner

Virtual machine

Blog banner

The Peephole

Blog banner

What is Network Security?

Blog banner

Cyber Laws In India and Around the World

Blog banner

John Titor: The Time Traveler

Blog banner

Linux 94

Blog banner

Deadlock and Starvation

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Importance of Network Security Risk

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Evolution of OS

Blog banner

SQL Injection Techniques

Blog banner

GIS info about Bermuda Triangle

Blog banner

Blockchain uses and use cases

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

SESSION HIJACKING

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Assignment-3

Blog banner

Memory heirchy

Blog banner

EdTech (Education Technology)

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Data Lake

Blog banner

Operation system

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Virtual Machine's

Blog banner

What your Favorite colour says about You?

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

DATA VAULT

Blog banner

Memory Management

Blog banner

Visualization in Data Science

Blog banner

Evolution of operating system

Blog banner

Dos (Denial of service) Attack

Blog banner

Water Resources are about to exhaust...

Blog banner

File Management

Blog banner