What is a packet filter?

packet filter is in its most basic firewall that protects network computers from pollution from external sources, specifically from the Internet. The term is in fact the application name, the type of internet protocol filter (IP), which is called in the conventions of the name of the Berkeley (BSD) software distribution. He acts as a network policeman and examines all the network focused on the network before the operation sometimes approaches the network. Computers can think of this from the point of view of the guard tower outside the moat that surrounds the castle. The packet filter also serves the role of the ditch and guard towers, as most of the procedures include more than one layer of security. A suitable analogy would be the Great Wall of China, which was built to maintain the attacking barbarians and maintain a dissident Chinese. "Dangerous" traffic, which package Filter will not reach escape can be very well the secret of the company, such as information about the customer's identity and the like.

Packet filter can of course be adapted. The network administrator can set the high level of the filter so that nothing gets unless it allows it. It can be programmed to search for certain keywords or IP addresses when incoming transmissions. The network administrator can even program the filter to rule out all except the level of information whose parameters sets forward.

In most cases, the packet filter will maintain all its activity. This protocol can also be adapted to include data columns such as the number of data streams, the number of data flows, why these currents have been captured, IP addresses and all incoming transmissions and how many times the transmissions have tried. Thus, the network administrator can monitor an attempt at a safety violation.

A large network of computers usually requires this protection application. The last thing, for examplebanks. The packet filter in this case will undoubtedly have a high level of security.

The company could also want to focus on internal operation filter to ensure that there are no transmissions or data flows between internally controlled computers. The application is not perfect, even if its creators want it to be, and for any reason, inappropriate files may slip. This type of penetration on one computer may soon lead to infection of other computers in the network simply because they share an IP address or other type of network connection.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?