wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

Vikrant’s first blog

Blog banner

DATA WRANGLING

Blog banner

PERT Overview

Blog banner

Deming’s Process

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Electronic Funds Transfer

Blog banner

Life lesson

Blog banner

Meshoo

Blog banner

Types of threads

Blog banner

E-commerce

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Education?

Blog banner

10 Interesting facts you should know!!!

Blog banner

Mumbai Metro 3

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Blockchain uses and use cases

Blog banner

Linker

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Deadlock and starvation

Blog banner

This too shall pass

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Bulk E-mail software

Blog banner

INTERNET

Blog banner

Marvel Cinematic Universe

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Beauty of indian railway

Blog banner

Music helps reduce stress

Blog banner

Concept and definition of m-commerce

Blog banner

"Games and the future"

Blog banner

What is Segmentation?

Blog banner

Session Vulnerabilities

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Why Friendship at Work is Important

Blog banner

Vulnerability Assessment

Blog banner

Principal of concurrency

Blog banner

Threads and concurrency

Blog banner

Threads

Blog banner

Deadlocks in Operating System

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner