Packet Filtering Concept Dashboard

Simulator
Core Concept & Walkthrough
What Packet Filtering Means

Packet filtering checks packet-header fields against firewall rules and decides PASS, BLOCK, or FLAG.

Step-By-Step Logic
  1. Receive packet at inspection node.
  2. Read fields: source, destination, protocol/next-header, TTL/hop-limit.
  3. Evaluate conditions (Exact, GT, LT, Between, Bit).
  4. Resolve action priority: BLOCK > FLAG > PASS.
Mini Input Example

Rule A: BLOCK Source=2001:db8:1::10. Rule B: FLAG Next Header=UDP.

  1. P1 (source 2001:db8:1::10, TCP) => BLOCK
  2. P2 (source 2001:db8:1::11, UDP) => FLAG
  3. P3 (source 2001:db8:1::11, TCP) => PASS
Purpose & Real Use
  • Enforce security policy and limit unauthorized traffic.
  • Enterprise and campus firewalls
  • Cloud virtual network security groups
  • ISP and carrier edge filtering
  • Linux hosts with netfilter/nftables
Key Parameters
  • Source and destination IP addresses
  • Protocol (IPv4) or Next Header (IPv6)
  • TTL (IPv4) or Hop Limit (IPv6)
  • Traffic Class and Flow Label (IPv6)
  • Rule operators and AND/OR logic
  • Rule action: PASS / BLOCK / FLAG
Video Explainer
How Packet Filtering Works In Firewalls

https://www.youtube.com/watch?v=kDEX1HXybrU

References & Extended Reading
Textbook Reference
Official Technical Sources
Educational Sources