wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Packet Filtering?

profile
19_Ankita Hatiskar
Aug 18, 2022
1 Like
0 Discussions
134 Reads

Packet filtering is a firewall technique for controlling network access by monitoring outgoing and incoming packets and allowing them to pass or fail based on the source and destination Internet Protocol (IP) addresses, protocols, and ports. Packet filtering rule sets defined by network layer firewalls provide highly efficient security mechanisms. Packet filtering is also known as static filtering. 

A node transmits a packet that is filtered and matched with predefined rules and policies during network communication. When a packet matches, it is either accepted or denied. 

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified. Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.

The source and destination IP addresses are checked during packet filtering. If the IP addresses of both parties match, the packet is considered secure and verified.

Because the sender may employ a variety of applications and programs, packet filtering also examines the source and destination protocols such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) (TCP). Source and destination port addresses are also validated by packet filters.


Comments ()


Sign in

Read Next

How to write a cover letter

Blog banner

Dekkers Algorithm

Blog banner

Instagram

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

HR Automation : Need of the hour

Blog banner

FRIENDSHIP

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Direct Memory Access

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Dal Bafla Recipe

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Deadlock in Operating System

Blog banner

virtual memory

Blog banner

What is Spyware?

Blog banner

Hacking of web server and application

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Visualization in Data Science

Blog banner

FIREWALL

Blog banner

OS Assignment 3

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Cryptanalysis tool

Blog banner

DATA VAULT

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Interrupts

Blog banner

BIRYANI ! The history you never knew about

Blog banner

USPS mail

Blog banner

Deadlock

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

File management

Blog banner

A small world of Sockets

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Disk Management

Blog banner

Flipkart

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Save Environment

Blog banner

Types Of scheduling

Blog banner

DNS Cache

Blog banner

Metasploit

Blog banner