wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

Street foods

Blog banner

Social Engineering

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

What is semaphore in operating system?

Blog banner

Different Types of Data

Blog banner

Operating system

Blog banner

Virtual memory

Blog banner

Virtual memory in os

Blog banner

MUTUAL EXCLUSION

Blog banner

Understanding Regression Analysis

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

JIRA SOFTWARE

Blog banner

Deadlocks

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

RACI model in IT services

Blog banner

Emailing the merger document

Blog banner

Child labour

Blog banner

LIFEHACKER

Blog banner

Bharat Maps

Blog banner

Data Visualization

Blog banner

Memory management

Blog banner

A True Friendship

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

DIGITAL ECONOMY

Blog banner

Firewall in Computer Network

Blog banner

Memory Management

Blog banner

Top 10 Logos and their meanings

Blog banner

Starvation

Blog banner

GIS info about Bermuda Triangle

Blog banner

Disk cache

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Getting into Anime

Blog banner

Service Operations Principles

Blog banner

Memory Management

Blog banner

City of Mumbai (Bombay):

Blog banner

On-Page SEO

Blog banner

Data Science & AI

Blog banner