Sie sind hier : Homepage →  Glossary→  Networking Basics→  filtering


Filters can be created for the Pipeline products to customize operation with specific types of packets or packet addresses. Filters can be used to restrict access to or from defined destinations, or to identify which packets will cause a connection (call) to be made. Filter conditions can be set up to cover a wide variety of different requirements and restrictions.


Filters are setup in the Filters tab. Filters look for certain values in defined segments of a packet. The filter checks each packet that comes into the Pipeline from the WAN, or it checks each packet that leaves the Pipeline from the LAN or PC. If a packet if found that matches the value in the filter, the packet is either discarded or allowed to continue to its destination (or further checked by another filter), depending on the rules set up in the filter. In the animation above, packets with a matching value at the designated segment are discarded.


The packet header shown below illustrates a portion of a UDP packet. The UDP header segment is an 8-byte segment (the detail is not shown here) containing a 16-bit application source port, followed by a 16-bit application destination port, plus other information about packet length, checksums, and the UDP data. If you want to filter out packets whose application source port or destination port is an FTP service, you would discard packets whose source or destination port is equal to 21. (Also see firewalls .)

The following table shows the value for common network applications:

Port Name Protocol
20 FTP-DATA File Transfer Data
21 FTP File Transfer Control
23 TELNET Terminal Services
25 SMTP Simple Mail Transfer Protocol
42 NAMESERV Host Name Server
43 NICKNAME Who is
53 DOMAIN Domain Name Server
69 TFTP Trivial File Transfer Protocol
79 FINGER Finger
161 SNMP SNMP Net Monitor
514 SYSLOG Syslog
520 RIP UDP Routing Info Protocol
Homepage -- © 2001/2016 - Copyright RDE Consult Gert Redlich - D-65191 Wiesbaden