fbpx

04 Types of Firewalls & Use Cases – 2019 FAQ for Freshers!

Quick Bite - 01 Packet filtering firewalls, 02 Circuit-level gateways, 03 Application-level gateways, 04 UTM firewalls | Get a brief Use Case on Each.
firewall

Here are the 04 types of firewalls & use cases ,The term firewall was initially used to describe the process of filtering out unwanted network traffic. The idea was to insert a type of filter between the apparently safe internal network and any traffic entering or leaving from that network’s connection to the broader internet. They can be implemented using both hardware and software, and are used to prevent unauthorized access to or from a network. They are essential as they provide a single block point, an accurate analogy for firewalls is a bouncer or a doorman, as they stand at the entrance of networks, applications and, other resources checking and validating incoming (and outgoing) data traffic, and deciding what to let through the entrance and what to reject.

Over the years, firewalls have evolved significantly to the point where no discussion of network security can take place without at least mentioning firewalls. All businesses use them as an extra layer of security to safeguard their company from cyber attacks. Any IT security enthusiast or pro must be aware of the different kinds of firewall architectures used today, such as packet filtering firewalls, circuit level gateways and, UTM firewalls.

Packet filtering firewalls

These are traditional network firewalls that provide essential network protection by shielding the internal network from the external threats. They work by applying a set of network firewall security rules, typically known as Access Control Lists (ACLs) to decide whether to allow or deny access to the network. Each packet received is taken apart and the header is compared to certain established criteria such as source and destination IP addresses, port number, packet type, etc. If the packet does not pass the inspection, it is dropped and the logs are updated about the same.

They are implemented on the Network Layer of the OSI model and their biggest advantage is that they tend to be very fast and almost transparent to the users. Packet firewalls can be built at a low cost and are best suited for smaller networks. However, they are easy to bypass if a firewall is configured with outdated rules, the packet headers can be manipulated by hackers into looking harmless.

packet filtering firewall

Circuit-level gateways

Circuit level gateways work at the Session layer of the OSI model that provides a standard UDP and TCP security connection. They work by verifying the Transmission Control Protocol(TCP) handshake, this is a quick and easy method to accept or deny traffic without consuming significant computing resources. It works between the internal user and proxy server to swiftly recognise malicious content by monitoring these handshakes across the network. If the session initiated is deemed legitimate, only then is the remote host trusted. The disadvantage of these firewalls is they don’t check the content of the packets, thus once a connection is established, user may access an unsafe site or file which would compromise the network.

circuit level gateway

Application-level gateways

Commonly known as the proxy firewall, this firewall operates at the Application layer by combining the attributes of both packet filtering firewalls and circuit-level gateways. This firewall first establishes a connection to the source of the traffic and scans all the way through the application layer when inspecting the incoming data packet. The verification is much more thorough here as they verify the TCP handshake protocol as well as the contents of the packets. Another advantage is that they have their own IP address, hence can prevent direct contact to any other networks. Firewalls working at the application level provide additional anonymity & data security and have advanced logging & inspection abilities, but they adversely affect the network performance due to the extra steps in the data packet verification process.

application level gateways

UTM firewalls

Unified Threat Management Firewalls are one step ahead of the traditional firewall architectures as they provide additional security programs in their design and incorporate them in the form of a small box that plugs into the network. These products are pretty valuable to small or medium-sized enterprises that do not have dedicated security staff and lack the skills needed to configure point solutions. Other than a traditional firewall, the extra features typically included with a UTM are an intrusion detection system, anti-malware software, anti-virus, internet gateway security, VPN and, DOS/DDOS protection. Basically, a UTM device combines multiple functions that are traditionally handled by separate devices/systems thus offering centralized management through a single console. The main attraction is the ease of deployment & integration capabilities without altering the performance of the network. Although this is a platform that provides fully integrated security and networking functions, in retrospect, they may not provide the same level of protection as a combination of single-function products. Another disadvantage is that the company may be heavily dependent on the UTM alone and its failure could have a catastrophic effect on company security, essentially shutting them down.

UTM firewall

  • Firewalls must be checked and their configuration settings must be updated periodically.
  • While choosing a firewall, companies are advised to have multiple layers of firewalls in order to provide better protection. This will help in making a network tougher to crack by creating an in-depth defence that isolates different assets so that the attackers need to do extra work in order to reach all the sensitive information.
  • Use firewalls with deep packet inspection. Some firewalls check the contents of data packets to make sure they don’t contain any malware and are safe to let through the network

While firewalls help a lot in preventing cyber attacks, one shouldn’t rely on just firewalls. One still needs to exercise good cybersecurity practices such as using anti-virus and strong passwords in order to minimize exposure to risk.

About Cybervie

Cybervie provides best cyber security training program in hyderabad, India.This cyber security course enables you to detect vulnerablities of a system, wardoff attacks and manage emergency situations. Taking a proactive approach to security that can help organisations to protect their data, Cybervie has designed its training module based on the cyber security industry requirements with three levels of training in both offensive and defensive manner, and use real time scenarios which can help our students to understand the market up-to its standard certification which is an add on advantage for our students to stand out of competition in an cyber security interview.

More Info – Click Here

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp

Recent Posts

Follow Us on Youtube

Cyber Security Training Program 2020

Cyber security Course offered by Cybervie prepares students for a path of success in a highly demanding and rapidly growing field of cyber security. The course is completely designed with an adaptable mindset, where the program allows the student to complete the course work at their own pace while being able to complete weekly assignments. Hence, also making it convenient for busy working professionals to pursue the training to help them advance their career in cyber security.

Cybervie has designed the training module based on the cyber security industry requirements in both offensive and defensive manner, using real time scenarios which help our students to understand the market standards.

Sign up for our Newsletter

Interested in Cyber Security Training Program 2020 – Click Here

Short Logo

Thank You!

We will Schedule a Program Demo & Invite to Given Mail Id in 24 Hours.

Meanwhile you can Download Brochure to Know More about the Program.

Short Logo

We’re here to help.

2020 Cyber Security Training Program.

Short Logo

Hurry You Won!

You are Eligible for the Scholarship on 2020 Cyber Security Training Program.

We will Schedule a Program Demo & Invite you to the Given Mail Id in 24 Hours.

Short Logo

We’re here to help.

Avail Scholarship
On 2020 Cyber Security Training Program.