The Different Types of Firewalls

There are several types of firewalls, and one of the major challenges that companies face when trying to secure their sensitive data is finding the right one. First off, a firewall – a network firewall – is a network appliance designed to define and enforce a perimeter. They can be deployed at the connection between an organization’s internal network and the public Internet or internally within a network to perform network segmentation.

Read the Frost & Sullivan Report Schedule a Demo

How Do Firewalls Operate and Why Are They Important?

A firewall sits at the perimeter of a protected network, and all traffic crossing that boundary flows through the firewall. This provides it with visibility into these traffic flows and the ability to block any traffic that violates the predefined access control list (ACLs) or is otherwise deemed a potential threat to the network.

 

A firewall is important because it acts as the network’s first line of defense. An effective firewall can identify and block a wide variety of threats, preventing them from reaching the internal network. This decreases the amount of malicious traffic that other security solutions must inspect and the potential threats faced by the internal network.

 

Pros and Cons

Firewalls can be classified in a few different ways. Three important concepts to understand when selecting a firewall solution are the difference between stateful and stateless firewalls, the various form factors in which firewalls are available, and how a next-generation firewall (NGFW) differs from traditional ones.

 

  • Stateful vs. Stateless

The oldest and simplest distinction between firewalls is whether it is stateless or stateful. A stateless firewall inspects traffic on a packet-by-packet basis. The earliest firewalls were limited to checking source and destination IP addresses and ports and other header information to determine if a particular packet met simple access control list requirements. This enabled firewalls to block certain types of traffic from crossing the network boundary, limiting their exploitability and ability to leak sensitive data.

 

Over time, firewalls grew more sophisticated. Stateful firewalls are designed to track details of a session from its beginning to its end. This enabled these firewalls to identify and block packets that don’t make sense in context (such as a SYN/ACK packet sent without a corresponding SYN). The greater functionality provided by stateful firewalls means that they have completely replaced stateless ones in common usage.

 

  • Next Generation Firewall

Traditional types of firewalls (stateful or stateless) are designed to filter traffic based upon predefined rules. This includes checking packet header information and ensuring that incoming or outgoing packets logically fit into the current connection’s flow.

 

A next-generation firewall (NGFW) includes all of this functionality but also incorporates additional security features. A NGFW adds additional security solutions such as application control, an intrusion prevention system (IPS), and the ability to inspect suspicious content in a sandboxed environment. This enables it to more effectively identify and block incoming attacks before they reach an organization’s internal network.

 

  • Firewall Form Factors

Another way to distinguish between different types of firewalls is based on how they are implemented. Firewalls generally fall into three categories:

 

#1. Hardware Firewalls: These firewalls are implemented as a physical appliance deployed in an organization’s server room or data center. While these firewalls have the advantage of running as “bare metal” and on hardware designed specifically for them, they are also constrained by the limitations of their hardware (number of network interface cards (NICs), bandwidth limitations, etc.).

 

#2. Software Firewalls: Software firewalls are implemented as code on a computer. These firewalls include both the firewalls built into common operating systems and virtual appliances that contain the full functionality of a hardware firewall but are implemented as a virtual machine.

 

#3. Cloud Firewalls: Organizations are increasingly moving critical data and resources to the cloud, and cloud-native firewalls are designed to follow suit. These virtual appliances are specifically designed to be deployed in the cloud and may be available as either standalone virtual machines or as a Software as a Service (SaaS) offering.

 

Each of these different firewall form factors has its advantages and disadvantages. While a hardware firewall has access to optimized hardware, its capabilities can also be constrained by the hardware it uses. A software firewall may have slightly lower performance but can be easily updated or expanded. A cloud firewall, however,  takes advantage of all of the benefits of the cloud and can be deployed near to an organization’s cloud-based resources.

The Future of the Firewall

The firewall has undergone a series of transformations as the evolution of enterprise networks and the cyber threat landscape have caused organizations’ security requirements to change. The latest of these changes is of course the increased adoption of cloud computing and remote work.

 

Cloud firewalls are a step in the right direction toward meeting enterprise cloud security needs. However, as enterprise networks continue to evolve, organizations will continue to move to deploy a next-generation firewall as part of an integrated Secure Access Service Edge (SASE) solution.

Which Firewall is Right for Your Organization?

In general, a next-generation firewall is always the right choice for protecting an organization’s network. Beyond that, the details (such as the desired form factor) depend upon the organization’s business needs and the firewall’s intended deployment location.

 

To learn more about NGFWs and what to look for when shopping for one, check out this buyer’s guide. Then, to learn more about how Check Point solutions can help to secure your network, contact us and schedule a demonstration.

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK