Fix(guide): Add ways to filter packets with tools

This commit is contained in:
Mihirraj Dixit
2018-10-22 00:00:01 +05:30
committed by Heather Kusmierz
parent 6648cdcca9
commit 9094978529

View File

@@ -11,3 +11,8 @@ Network layer firewalls define packet filtering rule sets, which provide highly
### Filtering Methods
There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to appear, for example, during Web browsing.
## Various ways to do packet filtering
1) The user can sniff through the packet via wireshark tool and filter the packets.
2) Packets can also be filtered using the netfilter queue library in python.
3) One can use scapy or pyshark python library or tshark tool to filter out packets.