0% found this document useful (0 votes)
41 views

Types of Firewall

Uploaded by

aziz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Types of Firewall

Uploaded by

aziz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

EXPLAINED EASY

TYPES OF
FIREWALL
PACKET FILTERING
FIREWALL
Think of this as a security guard at a nightclub
checking IDs. The guard only lets people in if they
meet certain criteria.

This firewall examines small chunks of data (packets)


as they try to enter or leave a network. It checks the
packet's source, destination, and other basic
information to decide whether to allow it through or
block it.
Santosh Nandakumar

STATEFUL INSPECTION
FIREWALL
Imagine a more attentive security
guard who not only checks IDs but
also remembers who's already inside
and watches how people behave.

This firewall keeps track of the state of


network connections passing through
it. It can determine if a packet is the
start of a new connection, part of an
existing connection, or not part of any
connection.
Santosh Nandakumar

APPLICATION LAYER
FIREWALL
Picture a very thorough security guard
who not only checks IDs and watches
behavior but also understands the specific
activities happening inside the club and
can make decisions based on that.

This firewall can understand specific


applications and protocols. It can detect if
unwanted protocols or applications are
being used over allowed ports, or if
protocols are being abused.
Santosh Nandakumar

NEXT-GENERATION
FIREWALL
This is like having a high-tech security
system that combines all the previous
guards' abilities, plus uses advanced
technology to detect more complex
threats.

NGFWs combine traditional firewall


technology with additional features like
intrusion prevention, deep packet
inspection, and application awareness.
They can make more intelligent
decisions about traffic passing through
the network.
Santosh Nandakumar

CLOUD FIREWALL
Instead of having security guards at your
physical location, you hire a security
company that monitors and protects
your property remotely.

This is a cloud-based security solution


that provides firewall and other security
features as a service. It's particularly useful
for protecting cloud-based assets and for
organizations with distributed networks.
Santosh Nandakumar

CIRCUIT-LEVEL
FIREWALL
Imagine a security guard who doesn't
look at what's inside the packages
people are carrying, but instead focuses
on making sure the person delivering
the package is allowed to do so and is
following the correct procedure.

It monitors TCP handshaking between


packets to determine whether a
requested session is legitimate. Once
the session is established, it doesn't
inspect the contents of packets; it only
ensures that the communication follows
the correct protocol.
Santosh Nandakumar

PROXY
FIREWALL
Think of this as a middleman who
receives requests from people inside a
building, goes out to get what they need,
and then brings it back. The people inside
never directly interact with the outside
world.

Acts as a middleman between internal


and external networks. It intercepts all
traffic, hiding true network addresses. It
thoroughly inspects requests and
responses, provides logging, and can filter
content.
FOLLOW US

INFOSEC &
PRIVACY
MADE EASY

WWW.MINISTRYOFSECURITY.CO

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy