Fire Wall
Fire Wall
Firewall
Prepared by :
Amir Hadi
Mohammed Awat
Dyarko Mohammed
2023-2024
1
Contents
What is a Firewall?....................................................................................................................................3
7 Types of Firewalls...................................................................................................................................4
Packet-Filtering Firewalls.........................................................................................................................5
Circuit-Level Gateways............................................................................................................................6
Stateful Inspection Firewalls....................................................................................................................6
Proxy Firewalls (Application-Level Gateways/Cloud Firewalls)................................................................7
Next-Generation Firewalls.......................................................................................................................8
Software Firewalls...................................................................................................................................8
Hardware Firewalls..................................................................................................................................9
Reference..................................................................................................................................................10
2
What is FireWall ?
The primary goal of a firewall is to block malicious traffic requests and data
packets while allowing legitimate traffic through.[1]
[2]
3
7 Types of Firewalls
Firewall types can be divided into several different categories based on their
general structure and method of operation. Here are eight types of firewalls:
Packet-filtering firewalls
Circuit-level gateways
Stateful inspection firewalls
Application-level gateways (a.k.a. proxy firewalls)
Next-gen firewalls
Software firewalls
Hardware firewalls
4
Note: The last three bullets list methods of delivering firewall functionality, rather
than being types of firewall architectures in and of themselves.
How do these firewalls work? And, which ones are the best for your business’
cybersecurity needs?
Packet-Filtering Firewalls
5
If the information packet doesn’t pass the inspection, it is dropped.[3]
The good thing about these firewalls is that they aren’t very resource-intensive.
This means they don’t have a huge impact on system performance and are
relatively simple. However, they’re also relatively easy to bypass compared to
firewalls with more robust inspection capabilities.[3]
Circuit-Level Gateways
As another simplistic firewall type that is meant to quickly and easily approve or
deny traffic without consuming significant computing resources, circuit-level
gateways work by verifying the transmission control protocol (TCP) handshake.
This TCP handshake check is designed to make sure that the session the packet is
from is legitimate.
While extremely resource-efficient, these firewalls do not check the packet itself.
So, if a packet held malware, but had the right TCP handshake, it would pass right
through. This is why circuit-level gateways are not enough to protect your business
by themselves.[3]
6
7
Proxy Firewalls (Application-Level Gateways/Cloud
Firewalls)
Proxy firewalls operate at the application layer to filter incoming traffic between
your network and the traffic source—hence, the name “application-level gateway.”
These firewalls are delivered via a cloud-based solution or another proxy device.
Rather than letting traffic connect directly, the proxy firewall first establishes a
connection to the source of the traffic and inspects the incoming data packet.
This check is similar to the stateful inspection firewall in that it looks at both the
packet and at the TCP handshake protocol. However, proxy firewalls may also
perform deep-layer packet inspections, checking the actual contents of the
information packet to verify that it contains no malware.
Once the check is complete, and the packet is approved to connect to the
destination, the proxy sends it off. This creates an extra layer of separation between
the “client” (the system where the packet originated) and the individual devices on
your network—obscuring them to create additional anonymity and protection for
your network.
If there’s one drawback to proxy firewalls, it’s that they can create significant
slowdown because of the extra steps in the data packet transferal process.[3]
8
Next-Generation Firewalls
Many of the most recently-released firewall products are being touted as “next-
generation” architectures. However, there is not as much consensus on what makes
a firewall truly next-gen.
Software Firewalls
Software firewalls include any type of firewall that is installed on a local device
rather than a separate piece of hardware (or a cloud server). The big benefit of a
software firewall is that it's highly useful for creating defense in depth by isolating
individual network endpoints from one another.
9
Hardware Firewalls
Hardware firewalls use a physical appliance that acts in a manner similar to a
traffic router to intercept data packets and traffic requests before they're connected
to the network's servers. Physical appliance-based firewalls like this excel at
perimeter security by making sure malicious traffic from outside the network is
intercepted before the company's network endpoints are exposed to risk.
10
Reference
1. https://www.tunnelsup.com/what-is-a-firewall/
2. https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-
firewall.html
3. https://www.compuquip.com/blog/types-firewall-architectures
11