CITS3002 Computer Networks  
prev
next CITS3002 help3002 CITS3002 schedule  

Possible packet filtering criteria

Network packets may be filtered on a number of criteria, such as their routing properties (for IP and ICMP), and transport and service properties (for TCP and UDP).

By examining the headers of TCP/IP traffic, we can detect obviously falsified traffic:

  • filter on each IP packet's source address. Packets which arrive on a network interface connected to the outside of our internal network (i.e. the Internet) and announce their source address as being from the internal network, probably have spoofed source addresses.

  • filter on each IP packet's destination address. Packets destined for an internal network address should not leave the network via an external interface.

  • filter based on specific low-level routing or transport protocols, such as denying all ICMP or UDP traffic from leaving,

  • filter based on application protocols, such as permitting HTTP and FTP requests to leave, but not permitting NFS mount requests to enter, and

  • filter based on recent activity. Stateful filtering (or stateful inspection) has knowledge of recent traffic; for example, stateful FTP filtering permits an incoming FTP data-connection request, only if a corresponding outgoing control-connection already exists.



CITS3002 Computer Networks, Lecture 11, Security of TCP/IP, p18, 15th May 2024.