3.1 3-Firewall Technologies
3.1 3-Firewall Technologies
3.1 3-Firewall Technologies
Stateless Firewalls:
o Stateless Firewalls watch network traffic and restrict or block the packets.
o This Firewalls restrict or block packet based on source & destination addresses.
o Stateless Firewalls also restrict or block packet based on other static values.
o Stateless Firewalls are not ‘aware’ of the traffic patterns or the data flows.
o A stateless firewall filter, also known as an Access Control List or (ACL).
o Stateless Firewall does not state fully inspect the traffic to keep the records.
o It evaluates packet contents statically and does not keep track of connection state.
o An example of a packet filtering firewall is the Extended ACL on Cisco Routers.
Proxy Firewall:
o Proxy Firewall works as a proxy for clients of Internal LAN users.
o No direct communication occurs between client & destination server.
o Takes requests from a client, puts that client on hold for a moment.
o Makes the requests as if it is its own request out to the final destination.
o Proxy Firewall is Memory and disk intensive at the proxy server or device.
o Proxy Firewall could potentially be a single point of failure in the network.
Personal Firewall:
o Personal Firewall is typically software application that is installed on endpoint device.
o Personal Firewall protect the device itself from unauthorized intrusions or access.
o Most operating systems such as windows or Linux have integrated personal firewalls.
o Personal Firewalls protect a single host or device only in the network.
o Personal Firewalls control traffic arriving at and leaving individual hosts.
o Personal Firewalls have the ability to permit and deny traffic based on the application.
o Personal Firewalls have also the ability to define policies for different classes of network.
Could-Based Firewall:
o Cloud Firewalls are software-based, cloud deployed network devices.
o Cloud Firewalls built to stop or mitigate unwanted access to private networks.
o As Cloud Firewalls a new technology, they are designed for modern business needs.
o Cloud Firewalls are sit within online application environments to stop any attacks.
o Firewall-as-a-service (FWaaS), Security-as-a-service (SECaaS) are the examples.
UTM Firewall:
o The term UTM firewall or simply UTM (Unified Threat Management) is the terminology.
o It is given to hardware or software device capable of assembling various security functions.
o Such as packet filtering, proxy, IDS & IPS, protection against malware, application control.
o UTM provides multiple security features & services in single device or service on network.
o UTM includes functions such as anti-virus, anti-spam, content filtering, & web filtering etc.
o UTM (Unified Threat Management) Firewall is not consider Next-Generation Firewall.
Basic firewall filtering is recommended at every trust boundary, externally and internally,
throughout the enterprise network in data center, Perimeter or edge etc .