animated filtering
Filters -- Filters can be created for the Pipeline products to customize operation with specific types of packets or packet addresses. Filters can be used to restrict access to or from defined destinations, or to identify which packets will cause a connection (call) to be made. Filter conditions can be set up to cover a wide variety of different requirements and restrictions.

Filters are setup in the Filters tab. Filters look for certain values in defined segments of a packet. The filter checks each packet that comes into the Pipeline from the WAN, or it checks each packet that leaves the Pipeline from the LAN or PC. If a packet if found that matches the value in the filter, the packet is either discarded or allowed to continue to its destination (or further checked by another filter), depending on the rules set up in the filter. In the animation above, packets with a matching value at the designated segment are discarded.

The packet header shown below illustrates a portion of a UDP packet. The UDP header segment is an 8-byte segment (the detail is not shown here) containing a 16-bit application source port, followed by a 16-bit application destination port, plus other information about packet length, checksums, and the UDP data. If you want to filter out packets whose application source port or destination port is an FTP service, you would discard packets whose source or destination port is equal to 21. (Also see firewalls .)

UDP packet

The following table shows the value for common network applications:

Port
Name
Protocol
20
FTP-DATAFile Transfer Data
21
FTPFile Transfer Control
23
TELNETTerminal Services
25
SMTPSimple Mail Transfer Protocol
42
NAMESERVHost Name Server
43
NICKNAMEWho is
53
DOMAINDomain Name Server
69
TFTPTrivial File Transfer Protocol
79
FINGERFinger
161
SNMPSNMP Net Monitor
162
SNMP-TRAPSNMP Traps
514
SYSLOGSyslog
520
RIPUDP Routing Info Protocol