Egress filtering

Egress filtering

In computer networking, egress filtering is a method of filtering electronic traffic that contributes to the security of a network and therefore makes it less prone to attacks from crackers.

This method of filtering prevents crackers from using a machine or resources to launch attacks against other systems. It does this by monitoring and filtering packets that leave the internal network to external networks (Internet) via a router. Egress filtering helps ensure that unauthorized traffic never leaves the internal network.

In a corporate network the initial default would be to block egress of "all" packets, then to only allow outward web, email and DNS traffic from specified servers. User workstations would then need to be set (typically automatically) to use the central mail server, web proxy etc. The effect of such a "restrictive firewall" is that each new application needing some internet access may require a firewall policy change - which is why it is an uncommon feature on consumer and very small business networks.

See also

*Ingress filtering
*Internet protocol spoofing


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Ingress filtering — In computer networking, ingress filtering is a technique used to make sure that incoming packets are actually from the networks that they claim to be from. Contents 1 Problem 2 Solution 3 Networks 4 See also …   Wikipedia

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • PF (firewall) — PF (Packet Filter, also written pf) is a BSD licensed stateful packet filter, a central piece of software for firewalling. It is comparable to iptables, ipfw and ipfilter. PF is developed on OpenBSD, but has been ported to many other operating… …   Wikipedia

  • Firewall (computing) — This article is about the network security device. For other uses, see Firewall. An illustration of where a firewall would be located in a network …   Wikipedia

  • IP traceback — is a name given to any method for reliably determining the origin of a packet on the Internet. The datagram nature of the Internet makes it difficult to determine the originating host of a packet – the source id supplied in an IP packet can be… …   Wikipedia

  • IP address spoofing — In computer networking, the term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing… …   Wikipedia

  • Network Monitoring Interface Card — A network monitoring interface card or NMIC is similar to a network card (NIC). However, unlike a standard network card, an NMIC is designed to passively (and silently) listen on a network. At a functional level, an NMIC may differ from a NIC, in …   Wikipedia

  • Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… …   Wikipedia

  • входная и выходная фильтрация — Метод защиты от хакерских атак путем фильтрации фальшивых IP адресов на входе и выходе узла сети. [http://www.morepc.ru/dict/] Тематики информационные технологии в целом EN ingress and egress filtering …   Справочник технического переводчика

  • Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”