cyberstalin.com

Cyber Security

A Firewall is designed to protect your internal network from the untrusted, dangerous internet. It can be a device in line with your router, or a software running on your computer. Regardless of how it’s deployed, they all serve the same purpose and that is to inspect traffic in and out of a network.

How does it work?

Firewalls are smart devices that can take a session and inspect the traffic on the return. In other words, if a user goes to a website, then the firewall will allow that session and verify that the return traffic coming back is for that user. If any anomalies or abnormal behavior, then the firewall drops the traffic. This concept works a lot like when you go to Disney World. The park will verify your ticket when you arrive, and if you choose to leave before the park closes, they’ll stamp your hand so that you can get back in. Newer firewalls can do so much to guard a network and can inspect much more information about data entering a network.

What are some types of firewalls?

Proxy Firewalls – A proxy firewall is a device that acts as the mediator between a user and a website. It can sit in a segmented location of your network, like a DMZ, and accept traffic on behalf of a network client before forwarding it on. This offers some benefits like caching websites, which can enhance a user experience by speeding up internet load times.

Stateful Firewalls – A stateful firewall is the traditional function of a firewall, it monitors traffic and inspects the port and protocol for every session. An administrator can set rules to the firewalls so that the firewall can only pass certain types of traffic, like HTTP or HTTPS and nothing else. However, if an internal device establishes a session on a different port, then the firewall will allow the return traffic until the session is finished.

Unified Threat Management – A unified threat management firewall can be considered a hybrid stateful firewall because of the ability to detect intrusions. Using a intrusion prevention system and stateful firewall, the UTM can detect anomalies and send alerts to analysts. The UTM is an all-in-one solution for IDS/IPS and firewalls.

Next Generation Firewalls – Next generation firewalls provide some of the best technology in one solution. They can subscribe to threat intelligence and inspect complex application layer protocols. With these capabilities, they can stop a network attack very quickly and address emerging cyber threats.

Threat Focused Firewalls – Threat focused firewalls include all the technology of next-gen firewalls and takes it further. They are specifically built for cyber defensive capabilities and gather information on endpoints to correlate events for security operations centers. They also can identify weak devices and know where the largest threats exist on a network.

Want to learn more about firewalls or consider buying firewall solutions to you business? Contact us for a free consultation here.

Share this content:
Related posts: