Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
However, there are some other types of firewalls used in large enterprises, SMB or even home networks.
Some of these types of firewalls are very popular and some are rarely encountered by professionals (such
as the type discussed at the end of this article).
The main reasons to implement a firewall device or firewall software in a network is to control traffic flow,
allow or block traffic between hosts, restrict access to applications, inspect packets for malicious patterns
etc.
The above can be accomplished in different Layers of the OSI model, starting from Layer 3 up to Layer 7
which is the application layer.
So, without further delay let’s see the various architectures and types of firewalls that you can find in your
professional career.
Table Of Contents
1) Hardware Firewall
2) Software Firewall
3) Stateful Inspection Firewalls
4) Packet Filtering Firewall
5) Application firewall
6) Next-generation Firewall (NGFW)
7) Telephony Related Firewalls
1) HardwareTRAINING
NETWORKS Firewall
This is the most popular type of firewall. It is used extensively in modern networks either as border device
(i.e to separate and protect the internal LAN network from the Internet or other non-trusted networks as
ABOUT MY BOOKS SUGGESTED TRAINING
shown below) or to segment and protect internal networks in large enterprises.
1
Shares
Hardware firewalls usually have many physical network interfaces which can be used to create different
“security zones” which are essentially different Layer 3 subnets. Each physical interface can be further
divided in “subinterfaces” which can further expand the protection zones.
Because the firewall is running on its own dedicated hardware appliance, it can handle large volumes of
packets, thousands or millions of connections and generally they are high performance devices.
Some popular brands of hardware firewalls include Cisco ASA, Fortigate, Juniper, Checkpoint, Palo Alto,
SonicWall etc.
2) Software Firewall
A classic example of a software firewall is the Windows Firewall installed by default on all Microsoft
Windows operating systems. It is a host-based firewall and controls traffic and applications on end-user
workstations or servers.
Some other examples of software host firewalls are those found on Linux machines such as IPTABLES,
NETWORKS
CSF etc. TRAINING
However, software firewalls are not only host-based. There are several flavors of Open Source Software
ABOUT MY BOOKS SUGGESTED TRAINING
firewalls (such as pfSense, OPNSense, ClearOS etc) which can be installed on dedicated hardware
(servers, Linux boxes etc) and thus create a dedicated hardware firewall device.
1
The
Shares first two types mentioned above are two broad categories of firewalls. Now let’s see some other types
based on their architecture, how they handle traffic and on which Layer of the OSI model they work.
In a TCP communication between a client and a server (e.g a user with web browser communicating with a
web server as shown above), the client browser starts an HTTP communication at port 80 with an Internet
webserver.
Assume that the Stateful Inspection Firewall sitting in the middle allows this outgoing HTTP traffic to
pass. Packets therefore will reach the Web Server which will reply back to the client (as happens with
every TCP communication).
Now, the Stateful Firewall under the hood will save the details of the initiating connection from client to
server in a “state table”. This table will include details such as source IP and source port, destination IP and
destination port, TCP flags, TCP sequence numbers etc.
Therefore, any reply packets coming back from the external web server that match the initial connection
started from the client, will pass through the firewall and reach the client without any extra configuration.
This makes the configuration easier since the administrator does not need to configure any rules on the
firewall to allow the return/reply packets coming from outside to inside. These packets will be allowed
automatically if they belong to an already established connection from client to server.
Having said that, this type of firewall filters traffic statically only by IP address and port numbers. There is
ABOUT MY BOOKS SUGGESTED TRAINING
no state kept by the firewall about each connection (like the stateful firewall we described above).
1
Packet
Shares
filtering is also called “stateless firewall”. In Cisco devices for example an Access Control List (ACL)
configured on a router works as a packet filter firewall.
MORE READING: How to Scan your Network for MS17-010 SMB Eternalblue
Vulnerability
One main disadvantage of packet filter firewalls is that you need to configure rules to allow also the reply
packets that are coming back from destination hosts. This is because the firewall does not keep a “state
table” like the stateful firewall we discussed above.
5) Application rewall
As the name suggests, this type works at Layer 7 (application) of OSI model. It inspects and controls
packets at the application level.
This firewall has knowledge of what constitutes safe or normal application traffic and what is malicious
application traffic.
For example, an application firewall that protects a web server, knows about web related HTTP attacks (e.g
SQL injections, Cross Site scripting etc) and protects the application from these attacks by looking into the
HTTP application traffic.
This type offers deep-packet inspection and is capable to identify malicious traffic in all Layers of the OSI
model (up to the application layer).
A NGFW usually provides advanced intrusion detection/prevention, antivirus features, application control
NETWORKS TRAINING
etc. These are usually licensed separately and the customer has to pay extra fees for enabling some/all of
the protections.
These are special firewalls related to telephony and VoIP services and are used to protect systems from
telephony communication attacks.
Related Posts
What is a Network Security Key in Home Wireless Networks?
Scanning and Fixing the BlueKeep (CVE-2019-0708) RDP Vulnerability
10 Best Hardware Firewalls for Home and Small Business Networks (2020)
NMAP Commands Cheat Sheet and Tutorial with Examples (Download PDF)
10 Best Open Source Firewalls Comparable to Commercial Solutions
By submitting this form, you agree that the information you provide will be transferred to
Elastic Email for processing in accordance with their Terms of Use and Privacy Policy.
Also, you allow me to send you informational and marketing emails from time-to-time.
NETWORKS TRAINING I'm not a robot
reCAPTCHA
Privacy - Terms
SUBSCRIBE
1
Shares
1
Shares
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment
Name *
Email *
POST COMMENT
This site uses Akismet to reduce spam. Learn how your comment data is processed.
NETWORKS TRAINING
Categories
Select Category
1
Shares
We Provide Technical Tutorials and Configuration As an Amazon Associate I earn from qualifying
Examples about TCP/IP Networks with focus on Cisco purchases.
Products and Technologies. This blog entails my own Amazon and the Amazon logo are trademarks of
thoughts and ideas, which may not represent the Amazon.com, Inc. or its affiliates.
thoughts of Cisco Systems Inc. This blog is NOT
affiliated or endorsed by Cisco Systems Inc. All product
SEARCH
names, logos and artwork are copyrights/trademarks of
their respective owners.
Search this website
BLOGROLL
Firewall.cx
IP Balance
Copyright © 2019 · | Privacy Policy | Privacy Tools | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy