A packet filtering firewall is a network security technique that is used to control data flow to and from a network. It is a security mechanism that allows the movement of packets across the network and controls their flow on the basis of a set of rules, protocols, IP addresses, and ports.ย
Let’s understand
Packet filtering protects a local network from undesired invasion depending upon the predefined rules. The information passes through a network in the form of small pieces called packets, which travel independently across IP networks. These small packets travel through a node only if they match with predefined filtering rules otherwise get dropped. Hence, the filtering rules that are defined by the network layer firewalls in a packet filtering firewall prove to be highly efficient in providing security mechanisms.ย
In this article we will discuss:
Packet filtering controls (allows or drops) packet or data transfer based on the following standards:
The packet filtering firewall shows how filtration is executed on the firewall. The packet filtering firewall checks access control lists (ACLs) to separate packets depending on the upper-layer protocol ID, source and destination port numbers, source and destination IP addresses, and packet transmission routes.
As shown in figure 1, the passage of packets depends entirely on the decision of the packet-filtering router firewall. It filters the packets according to the security protocols programmed into the router using the firewall rules. Users set up these packet-filtering firewall rules to build protection against packet transmission and allow only packets that match certain IP addresses or ports. Users may specify rules that will permit only those packets that are meant for their server and decline all other packets. For example, rules may be set to completely reject packets heading for the ports used by NetBIOS, preventing Internet hackers’ unwanted intrusion on NetBIOS server resources.
A packet-filtering firewall can be distinguished into the following types based on the usage of rules:
Packet-filtering firewalls usually run on either general-purpose computers/routers or special-purpose routers and have their share of packet-filtering firewall advantages and disadvantages.
Packet filtering is an efficient defense system against intrusions from computers or networks outside a local area network (LAN). It is also a standard, and cost-effective means of protection as most routing devices possess integrated filtering capabilities, so there is no need to set a new firewall device. Following are some of the prominent advantages of packet filtering firewall that makes them highly acceptable worldwide:
Although packet filtering offers several advantages, it also has some weaknesses. Some of the disadvantages of a packet filtering firewall are:
Packet filters act on the source and destination IP and port addresses that are present in each TCP/IP packet. You can set rules allowing access to only familiar and established IP addresses and denying access to all unknown or unrecognized IP addresses.ย
For example, if you set rules denying access to port 80 to outsiders, you would block off all outside access to the HTTP server as most HTTP servers run on port 80. Alternatively, you can set packet filtering firewall rules permitting packets designated for your mail or web server and rejecting all other packets.
Despite its weaknesses, packet filter firewalls are widely used for being leverage and inexpensive. It controls the movement of information/packets according to a set of rules defined by the user and protects the network from unwanted intrusion or attacks. Thus, it acts as a powerful security tool and provides a good network security level.
There are four primary types of packet filtering:ย
This filtering firewall expects you to establish firewall rules manually. Similarly, internal and external firewall network collection also remains closed or open until and unless adjusted by an administrator. These firewall types allow users to define rules and manage ports, access control lists (ACLs) and IP addresses. They’re often simple and practical, making them an apt choice for smaller applications or users without a lot of criteria.ย ย
Dynamic firewalls allow users to adjust rules dynamically to reflect certain conditions. You can set ports to remain open for specified periods of time and to close automatically outside those established time frames. Dynamic packet filtering firewalls offer more flexibility than static firewalls because you can set adjustable parameters and automate certain processes.ย
Stateless packet filtering firewalls are perhaps the oldest and most established firewall options. While they’re less common today, they do still provide functionality for residential internet users or service providers who distribute low-power customer-premises equipment (CPE). They protect users against malware, non-application-specific traffic, and harmful applications. If users host servers for multi-player video games, email, or live-streamed videos, they often must manually configure firewalls if they plan to deviate from default security policies. Manual configurations allow different ports and applications through the packet filter.ย
Unlike stateless packet filtering options, stateful firewalls use modern extensions to track active connections, like transmission control protocol (TCP) and user datagram protocol (UDP) streams. By recognizing incoming traffic and data packets’ context, stateful firewalls can better identify the difference between legitimate and malicious traffic or packages. Typically, new connections must introduce themselves to the firewall before they gain access to the approved list of allowed connections.
Fill in the details to know more
What Is Asset Classification?
March 20, 2023
Masquerade Attack โ Everything You Need To Know!
February 27, 2023
Best Infosys Information Security Engineer Interview Questions and Answers
What Are SOC and NOC In Cyber Security? What’s the Difference?
A Brief Introduction to Cyber Security Analytics
February 26, 2023
Cyber Safe Behaviour In Banking Systems
February 17, 2023
Add your details:
By proceeding, you agree to our privacy policy and also agree to receive information from UNext through WhatsApp & other means of communication.
Upgrade your inbox with our curated newletters once every month. We appreciate your support and will make sure to keep your subscription worthwhile