Packetviper: Filtering Order and Priorities

Packetviper: Filtering Order and Priorities

PacketViper’s traffic evaluation process is designed to control and verify every connection with precision, ensuring only legitimate data traverses the network. This layered, rules-based approach applies security checks in a specific order, allowing PacketViper to identify and stop threats instantly at the point of detection. 

1. Custom Rules (Highest Priority) 

  • Execution Order: Processed from the lowest to highest numerical designation. 

  • Tie-Breaker: If rules share the same priority, execution follows the creation timestamp. Purpose: Ensures mission-critical security directives are enforced before any other step. 

2. Global Network Lists (GNL) 

  • Allow Rules First: GNL entries set to Allow are evaluated before those set to Block. 

  • Benefit: Maintains operational efficiency while providing strong access control. 

3. Country-Based Filters 

  • Geolocation Filtering: Applies country-of-origin or destination restrictions. 

  • Override Flexibility: Custom Rules or Sensors can override these filters to address changing threat conditions. 

4. Sensors (Flexible Placement) 

Sensors detect and respond to anomalies, with their placement affecting behavior: 

  1. Before Custom Rules: No filtering occurs beforehand; generates repeated alerts—ideal for sensitivity testing. 

  2. Default (After Custom Rules): Prevents repeat attempts from reaching the sensor by adding new Custom Rules for detected threats. 

  3. Post Global Network Lists: Positions deception tactics before country filtering. 

  4. Post Country-Based Filters: Serves as the last checkpoint before allowing traffic. 

5. Match Detection and Enforcement 

  • Stop on Match: Evaluation halts when a match occurs. 

  • Immediate Action: The configured response—allow, block, alert, or blacklist—is applied instantly. 

  • No Traffic Rerouting: Threats are contained directly at the detecting boundary.


By following this ordered process, PacketViper ensures fast, decisive containment of threats while keeping legitimate operations uninterrupted. 

 

You can download this document

    • Related Articles

    • Technical Advantages of PacketViper's Granular Geo-Targeting Approach

      The intricacies of geo-blocking stem from its ever-changing landscape, characterized by daily updates to subnet allocations for each country and its businesses. Furthermore, generalized statements like "block North Korea" are largely ineffective. To ...
    • Packetviper: Network Maps

      Maps Included in this document Single Gateway Single ISP, Dual PV Units, Double Inline High Availability Dual ISP, Single Firewall Dual ISP and Firewalls, Single PacketViper Unit with Dual Gateways Dual ISP and Firewalls Load Balancer With Dual ISP, ...
    • PacketViper Automated Moving Target Defense Q&A

      How do you define automated moving target defense in the context of your market? PacketViper's Automated Moving Target Defense Technology works differently from other moving target defense tools and technology approaches, with an emphasis on ...
    • PacketViper Zero Trust Network Access (ZTNA) - FAQ

      1. What makes PacketViper’s approach to ZTNA unique compared to traditional IT-focused solutions? PacketViper delivers agentless, inline, behavioral Zero Trust enforcement designed for both IT and OT. Unlike conventional ZTNA solutions that rely on ...
    • Enhancing Operational Technology (OT) Security with PacketViper's MODBUS Integration

      White Paper: Enhancing Operational Technology (OT) Security with PacketViper's MODBUS Integration Abstract Operational Technology (OT) environments, critical to industries such as manufacturing, energy, and utilities, are increasingly vulnerable to ...