The document discusses firewall types and how they work. It describes five main types of firewalls: packet-filtering, circuit-level gateways, stateful inspection, proxy (application-level), and next-generation firewalls. It also discusses three common deployment methods: software, hardware, and cloud-based firewalls. The primary goal of all firewalls is to block malicious traffic while allowing legitimate traffic to pass through by inspecting packets and TCP handshakes at various levels of the network traffic.
2. A firewall is a type of cybersecurity tool used to filter traffic on a network.
Firewalls can separate network nodes from external traffic sources, internal
traffic sources, or even specific applications. Firewalls can be software,
hardware, or cloud-based, with each type of firewall having unique pros and
cons.
The primary goal of a firewall is to block malicious traffic requests and data
packets while letting through legitimate traffic.
What is a Firewall?
3. Types of Firewalls and Deployment Architectures :
You can divide firewall types into several categories based on
their general structure and method of operation. Here are the
five types of firewalls and their three modes of deployment.
Firewall Types:
Packet-filtering firewalls
Circuit-level gateways
Stateful inspection firewalls
Application-level gateways (a.k.a. proxy firewalls)
Next-gen firewalls
Firewall Delivery Methods:
Software firewalls
Hardware firewalls
Cloud firewalls
4. Packet-Filtering Firewalls :
It’s the most basic and oldest type of firewall architecture, packet-filtering firewalls
create a checkpoint at a traffic router or switch.
The firewall performs a simple check of the data packets coming through the
router—inspecting information such as the destination and origination IP address,
packet type, port number, and other surface-level details without opening the packet
to examine its contents.
It then drops the packet if the information packet doesn’t pass the inspection.
Fig: Packet filter firewall topology
5. Circuit-Level Gateways:
Circuit-level gateways are another simplistic firewall type meant to quickly and
easily approve or deny traffic without consuming significant computing resources.
Circuit-level gateways work by verifying the transmission control protocol (TCP)
handshake.
This TCP handshake check is designed to ensure that the session the packet is
from is legitimate.
While extremely resource-efficient, these firewalls do not check the packet itself.
So, if a packet held malware but had the proper TCP handshake, it would easily
pass through. Vulnerabilities like this are why circuit-level gateways are not
enough to protect your business by themselves.
7. Stateful Inspection Firewalls :
This firewall type combines packet inspection technology and TCP handshake
verification to create a more significant level of protection than either of the two
architectures could provide alone.
•However, these firewalls also put more of a strain on computing resources.
• This may slow down the transfer of legitimate packets compared to the other
solutions.
fig: Stateful Inspection
Firewalls
8. Proxy Firewalls (Application-Level Gateways/Cloud Firewalls):
Proxy firewalls operate at the application layer to filter incoming traffic between
your network and the traffic source—hence, the name “application-level gateway.”
•These firewalls are delivered via a cloud-based solution or another proxy device.
Rather than letting traffic connect directly, the proxy firewall first establishes a
connection to the source of the traffic and inspects the incoming data packet.
•This check is similar to the stateful inspection firewall in looking at both the packet
and the TCP handshake protocol.
However, proxy firewalls may also perform deep-layer packet inspections,
checking the actual contents of the information packet to verify that it contains no
malware.
Fig: Proxy Firewalls (Application-Level Gateways/Cloud
Firewalls)
9. Next-Generation Firewalls:
Many of the most recently-released firewall products are touted as “next-
generation” architectures. However, there is no consensus on what makes a firewall
genuinely next-gen.
Some typical features of next-generation firewall architectures include deep-packet
inspection (checking the actual contents of the data packet), TCP handshake
checks, and surface-level packet inspection.
Next-generation firewalls may consist of other technologies, such as intrusion
prevention systems (IPSs), that automatically stop attacks against your network.
10. Firewall Deployment Architecture :
Software Firewalls:
Software firewalls include any type of firewall that is installed
on a local device rather than a separate piece of hardware (or a
cloud server).
The big benefit of a software firewall is that it's highly useful
for creating defense in depth by isolating individual network
endpoints from one another.
Fig: Software
Firewalls
11. Hardware firewalls use a physical appliance that acts like a traffic router to intercept
data packets and traffic requests before they're connected to the network's servers.
Physical appliance-based firewalls like this excel at perimeter security by ensuring
malicious traffic from outside the network are intercepted before the company's
network endpoints are exposed to risk.
However, the major weakness of a hardware-based firewall is that it is often easy for
insider attacks to bypass them.
Hardware Firewalls :
13. Cloud Firewalls :
Whenever you use a cloud solution to deliver a firewall, it can be called a cloud
firewall or firewall-as-a-service (FaaS).
Many consider cloud firewalls synonymous with proxy firewalls since a cloud
server is often used in a firewall setup (though the proxy doesn't necessarily have to
be on the cloud, it frequently is).
The primary benefit of having cloud-based firewalls is that they are straightforward
to scale with your organization.
As your needs grow, you can add additional capacity to the cloud server to filter
larger traffic loads.
15. How does a Firewall Work?
A firewall determines which internet traffic is trustworthy enough to pass
through it and which traffic is not. But just before diving into more detail, we must
first comprehend how a firewall performs to filter among web-based networks.
Firewall rules are designed to safeguard secure connections and the endpoint
gadgets that make up those networks. Hosts are electronic devices that can
interact with other hosts through some kind of network. They communicate both
inbound and outbound between internal networks as well as with external
networks.
Fig: Working of firewall