Open In App

What is Egress Filtering?

Egress Filtering is the term for filtering data packets as they leave your network. This is usually performed on an Intrusion Prevention System or firewall that monitors traffic, either inbound or outbound, from the network. This will often be in addition to other firewall protocols such as Domain Name System Security Extensions (DNSSEC), which provides authentication for domains, and (D)TLS, which provides end-to-end encryption for most Internet websites through HTTPS traffic.

Working:

The simplest way to see how Egress Filtering works is to use an analogy. This can be done by making sure that when they leave, your teenager has no pockets and anything that they’re taking out of the house has to fit in a bag which can only contain certain items. Egress Filtering works by limiting what data packets flowing out of your network may contain based on rules that you specify. This can be, limiting what protocols your network will accept to flow through it. It may also allow only certain ports of a protocol to be used, or even not allow some protocols that you don’t want being in your network at all.



The two main ways for Egress Filtering are by using rules that match specific traffic and TCP/UDP ports. The former is called Port-Based Egress Filtering and the latter is called Protocol-Based Egress Filtering.

Port-Based Egress Filtering:

Port-Based Egress Filtering involves the process of identifying certain traffic that you won’t want to leave your network and blocking it from doing so. This is usually done by specifying a range of ports that shouldn’t be accessed in your network or shouldn’t have data packets leaving your network. For example, if you’re running a web server on port 80, then you can make it so that any traffic going towards ports smaller than 80 is blocked. Protocol Based Egress filtering is much more complex and involves determining the contents of a data packet’s protocol and making decisions based on those contents.



Key points:

An Overview of Egress Filtering Rules:

Countermeasures:

Article Tags :