Overview

firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network’s firewall builds a bridge between the internal network or computer it protects, upon securing that the other network is secure and trusted, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.

Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions

 

Firewalls Types

Network layer firewalls

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IPprotocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term “packet filter” originated in the context of BSDoperating systems.

Network layer firewalls generally fall into two sub-categories, stateful and stateless. Stateful firewalls maintain context about active sessions, and use that “state information” to speed packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP or TCP ports, and the current stage of the connection’s lifetime (including session initiation, handshaking, data transfer, or completion connection). If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with the firewall’s state table, it will be allowed to pass without further processing

The Benefits of Firewalls

  • Secures a computer network from hostile intrusions.
  • Firewalls can monitor and record information. This can be of value in determining who is accessing what type of information.
  • Firewalls can be used to complement or supplement content and email filtering solutions.
  • Firewalls can automatically block most email viruses and malware attacks even before they start.
  • Firewalls can be set up to allow access for certain users to access certain information but prevent others from doing so.
  • Firewalls can also calculate usage of the internet, i.e. who spends most time using the internet and how this affects the performance of the network.
  • Some firewalls can cause constraints or bottlenecks on the network as they concentrate security in one area.
  • Organisations need to have a written policy or procedure that outlines what information can be accessed by employees and by whom. A firewall can be used to enforce these policies.

Proxy server

A proxy server (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets. A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user

Application-layer firewalls

Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender).

On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The additional inspection criteria can add extra latency to the forwarding of packets to their destination.

Network Security Solutions

Palo Alto NGFW
Fortinet FortiGate
Trend Micro IPS (Tipping Point)
Juniper SRX Series
Barracuda NGFW
Dell SonicWall
Forcepoint NGFW

Palo Alto Networks, Inc. has pioneered the next generation of network security with an innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is the next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimised hardware and software architecture.

 

Solution Description

Palo Alto Networks® next-generation firewalls detect known and unknown threats, including in encrypted traffic, using intelligence generated across many thousands of customer deployments. That means they reduce risks and prevent a broad range of attacks. For example, they enable users to access data and applications based on business requirements as well as stop credential theft and an attacker’s ability to use stolen credentials.

 

More information: https://www.paloaltonetworks.com/products/secure-the-network/next-generation-firewall.html

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. Gartner estimates that by 2019 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic.

FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity with automated visibility into applications, users and network and provides security ratings to adopt security best practices. 

 

Solution Description

FortiGate enterprise firewalls offer flexible deployments from the network edge to the core, data center, internal segment, and the Cloud. FortiGate enterprise firewalls leverages purpose-built security processors (SPUs) that delivers scalable performance of advanced security services like Threat Protection, SSL inspection, and ultra-low latency for protecting internal segments and mission critical environments.

FortiGate NGFW provides automated visibility into cloud applications, IoT devices and automatically discovers end to end topology view of the enterprise network. FortiGate is a core part of security fabric and validated security protect the enterprise network from known and unknown attacks. 

 

More information: https://www.fortinet.com/products/next-generation-firewall.html

Trend Micro goes beyond next-gen IPS to address the evolving requirements of the most demanding data centers and enterprise networks without sacrificing security or performance. With purpose-built hardware, centralized management, and industry-leading threat intelligence, we provide a smart, optimized, and connected network security solution that integrates across all types of environments.

Juniper Networks ISG Series Integrated Security Gateways are purpose-built security
solutions that are ideally suited for securing enterprise, carrier, and data center
environments where consistent, scalable performance is required.

Solution Description

Juniper SRX Series offers:

  • Predictable performance: ASIC-based architecture provides linear performance for all packet sizes at multi-gigabit speeds.
  • System and network resiliency: Hardware component redundancy, multiple high availability options and route based VPNs offer reliability and resiliency.
  • Network security: The SRX Series provides embedded Web filtering, anti-spam, IPS, ICAP antivirus redirect, and optionally integrated IDP.
  • Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.
  • Certifications: The SRXSeries fulfills the requirement for FIPS, common criteria, ICSA, and others.
  • Robust IPv6

More Information: https://www.juniper.net/us/en/products-services/security/

The Barracuda NG Firewall is an enterprise-grade next-generation firewall that was purpose-built for efficient deployment and operation within dispersed, highly dynamic, and security-critical network environments.

More Information: https://www.barracuda.com/products/cloud-generation-firewalls

Dell SonicWALL security solutions enable organizations to secure their network, systems, users and data without compromising network performance.

More Information: https://www.sonicwall.com/en-us/products/firewalls

Forcepoint Next Generation Firewall (NGFW) combines fast, flexible networking (SD-WAN and LAN) with industry-leading security to connect and protect people and the data they use throughout diverse, evolving enterprise networks. Forcepoint NGFW provides consistent security, performance and operations across physical, virtual and cloud systems. It’s designed from the ground up for high availability and scalability, as well as centralized management with full 360° visibility.

More information: https://www.forcepoint.com/product/ngfw-next-generation-firewall