You've got it...
Try this sometime... open a web page, let it load, and then immediately go to a command prompt and type "Netstat."
You will get output which will include something similar to this:
- Code: Select all
Active Connections
Proto Local Address Foreign Address State
TCP 10.35.3.1:55268 dsl-67-55-1-226:http TIME_WAIT
TCP 10.35.3.1:55271 dsl-67-55-1-226:http TIME_WAIT
or, with "netstat -n"
- Code: Select all
Active Connections
Proto Local Address Foreign Address State
TCP 10.35.3.1:55402 67.55.1.226:80 ESTABLISHED
TCP 10.35.3.1:55403 67.55.1.226:80 ESTABLISHED
TCP 10.35.3.1:55404 67.55.1.226:80 ESTABLISHED
TCP 10.35.3.1:55405 67.55.1.226:80 ESTABLISHED
TCP 10.35.3.1:55406 67.55.1.226:80 ESTABLISHED
TCP 10.35.3.1:55407 67.55.1.226:80 ESTABLISHED
These are two different snapshots of communications with my computer to the forum.subsonic.org server, located at 67.55.1.226 (which reverse resolves to dsl-67-55-1-226.acanac.net). In the first one, netstat resolved all know port numbers to abbreviations (ie, 80 becomes http) and resolves all IP addresses that it can to DNS names.
But, as you can see, in the first case my computer had opened two connections to the web server hosting this forum, one originating on port 55268 and the other on 55271, but those connections had been idle for a bit and were getting ready to be closed down completely (TIME_WAIT).
In the second case, I had JUST refreshed the forum page, and you can see that my PC made 6 outbound connections to the web server, originating on ports 55402 through 55407.
But they all ended at port 80 on the web server.
Source port filtering is seldom used in home environments. At work I have used it before, when I could control the originating port, and been able to direct different clients to different locations based on what port we had pre-configured the device we provided them to initiate communications on. But in the real world, most traffic originates on random high number ports and is directed to known end port numbers.
Make sense?
Glenn