wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

Virus

Blog banner

Modern operating system

Blog banner

Deming’s Process

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

OS assignment 3

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Visualization in Data Science

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Memory Management

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Process in OS

Blog banner

Modern operating systems (OS)

Blog banner

operating system

Blog banner

Operating system and overviews

Blog banner

Developments in Modern Operating Systems

Blog banner

Health and fitness

Blog banner

Multiple processor scheduling

Blog banner

Multiprocessor and scheduling

Blog banner

MY FIRST BLOG?

Blog banner

NETWORK SECURITY RISKS

Blog banner

objectives and function of operating system

Blog banner

Go Daddy

Blog banner

Starvation

Blog banner

LIMITED EDITION

Blog banner

Security issues

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Ola

Blog banner

Strengthening Active Directory Security

Blog banner

Music is life

Blog banner

Cache memory

Blog banner

Smitten Kitchen Keepers

Blog banner

Memory input output management

Blog banner

Mutual exclusion

Blog banner

Monday. com App

Blog banner

File and File System Structure

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

LIFEHACKER

Blog banner

Time Series Analysis

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner