Everything About Packet Filtering Firewall

If you are considerate about the security of your computer network, you must know about the packet filtering firewall. The purpose of this article is to provide a clear understanding of that mechanism and its importance. So, continue reading.

In simplest terms, a packet filtering firewall is a security measure used to control a given network. Such firewalls can monitor and control both outgoing and incoming packets. Considering several aspects, the firewall will pass or halt the data packets. For instance, it will consider the source and destination IP addresses, ports, and protocols.

The functionality of a packet filtering firewall

Firewalls work on different levels in terms of TCP/IP protocols. Know more about Firewall Meaning here. A packet filtering firewall is designed to function at level 3 and level 4 of the TCP/IP protocol stack. It functions regardless of the combination of source IP, destination IP, source port, or destination port.

The most basic type of firewall cannot filter anything beyond incoming packets. Also, it can block the ports that are already closed. However, there are advanced firewall varieties that come with sophisticated features.

A packet filtering firewall that is running on regular devices offers NAT (Network Address Translation). An edge router exposes a single IP address to the network either to the internet or intranet. When the packets arrive, the respective firewall will examine them. Then, they will determine the destination port (to which those packets are sent) as well. After that, the firewall will put those incoming packets to a specific internal table. With the assistance of that table, the firewall maps the port to an internal IP address of the host. In general, the internal IP addresses are non-routable. They are not exposed to the internet, so they are safer from external threats.

Pretty much all the personal firewall you use falls into the category of packet filtering firewall. In fact, there is a slight difference between a packet filtering firewall and one available on home routers. Basically, a packet filtering firewall has a better logging capacity compared to a one available on home routers.

As you have already learned, a packet filtering firewall monitors each packet that crosses the firewall. It tests all those packets based on the specific rules which are set-up by default or by you. If the data packets pass the test of the firewall, the respective packets can reach the determined port. If not, the packets will be rejected.

In general, packet filters are the most affordable type of firewalls. That is one of the most obvious reasons behind the increasing popularity of this variety. Nevertheless, there are some drawbacks to these firewalls, so an expert hacker may be able to bypass them. Therefore, a packet filtering firewall may not be the best option for those who expect the optimal protection. Do you intend to maximize the protection of a packet filtering firewall? Then it should be coupled with other security measures.

PS: click to find out what does a firewall do.

Packet filtering firewall and ports

Each TCP/IP comprise of source and destination IP and Port Addresses. TCP/IP is the shortened form for Transmission Control Protocol/Internet Protocol. A packet filter firewall works by inspecting these elements. TCP/IP ports are represented in the form of numbers, and they are assigned to different services. These services help in identifying the precise job of each packet. For instance, let’s take an HTTP protocol. It has the port number 80 as its destination port.

In most cases, port numbers are displayed with color and the respective IP address. Let’s take the previous port number as an example in this case also. Assume that there is an HTTP service on a given server, and the server’s IP address is In that case, the HTTP service on the same server will be displayed as So, anyone with reasonable computer knowledge can realize that thousands of established ports are being utilized during operation. To give you a better idea about it, we intend to list down some common ports.

20Represents File Transfer Protocol (FTP)
21Represents File Transfer Protocol (FTP)
22Represents Secure Shell Protocol (SSH)
23Represents Telnet
25Represents the Simple Mail Transfer Protocol (SMTP)
53Represents Domain Name Server (DNS)
80Represents the World Wide Web (HyperText Transport Protocol; HTTP)
110Represents Post Office Protocol (POP3)
119Represents Network News Transfer Protocol (NNTP)
137Represents NetBIOS Name Service
138Represents NetBIOS Datagram Service
139Represents NetBIOS Session Service
143Represents Internet Message Access Protocol (IMAP)
161Represents the Simple Network Management Protocol (SNMP)
194Represents Internet Relay Chat (IRC)
389Represents Lightweight Directory Access Protocol (LDAP)
396Represents NetWare over IP
443Represents HTTP over TLS/SSL (HTTPS)

The rules you will set up (configuring the firewall) for packet filtering will permit or deny their access. For instance, you can consider your firewall to permit packets related to your mail server. If not, you can configure it to permit packets of the web server and reject other packets. Likewise, you can configure your firewall, depending on your priorities.

If not, you can configure your firewall to deny packets that are directed towards the posts related to NetBIOS. As a result, internet hackers who try to access your NetBIOS server resources will find it difficult. NetBIOS server resources include aspects such as printers or files.

Besides, here is everything about the Shell Infrastructure Host for your reference.

What are the flaws associated with packet filtering firewalls?

One of the most significant flaws associated with packet filtering is that they rely on packets. That means they trust the data included in the packets assuming that they tell the truth. In other words, this method believes what those packets are, where they are from, and where they are going. An experienced and skilled hacker can utilize this weakness. They can exploit it through various techniques and trick the firewall, so it will allow packets to pass. This is known as IP spoofing in general. They insert a bogus fake IP address in the packets, which will then enter your network.

There is another weakness related to packet filtering is that this system examines every single packet in isolation. That means this system doesn’t consider what packets have gone through the respective firewall. Also, it doesn’t consider what those packets may follow. The best way to describe this situation is that it is a stateless process. If, by any chance, a hacker figures out how to exploit it, he can get through the firewall.

Apart from the above weaknesses, a packet filtering firewall has various advantages as well. Mentioned below are the reasons for this variety of firewalls to be so popular.

● Packet filtering firewall is a very efficient system

In general, a packet filtering firewall is a very efficient method. Firewalls monitor the content of the packets before allowing them through. It sounds like a pretty lengthy process at once. However, when it comes to a packet filtering process, the system is very efficient. It holds up each inbound and outbound packet for a couple of milliseconds only and assures negligible lags. Once the addresses and the ports are determined, the packet filter applies the rules quickly without any lag. In other words, it takes the decision quickly. In contrary to that, other firewall models are not as efficient as this system. They deliver considerable lagging.

● Working with packet filtering is easy

Packet filters display notifications only when a packet is being rejected by the firewall. In other words, it is just a matter of installing the firewall. In contrary to that, other firewalls require you to configure the settings manually on servers and clients.

● They are affordable

The other major advantage is that packet filtering firewalls are very affordable.

Well, that’s what you should know about a packet filtering firewall. If you need further information related to this matter, please let us know.



Ten years of experience in information and computer technology. Passionate about electronic devices, smartphones, computers, and modern technology.