How a hardware and software firewall differ
31-01-2023, 13:55
Firewalls or also known as firewalls are a fundamental element in the perimeter security of any home or company. The domestic routers that we all have at home have a firewall to allow or deny connections from abroad, with the aim of protecting ourselves against possible attacks that we carry out, The same is also true in companies, this type of technology is used to allow or block access between two or more networks. Today at RedesZone we are going to explain the types of firewalls that exist and what are their strengths and weaknesses.
A firewall, or also known as a firewall, is a hardware and / or software system that is responsible for monitoring all incoming and outgoing connections on different networks, with the aim of allowing or denying traffic between different networks. A firewall can be installed on a final computer or host, but also on a router that incorporates a firewall, and even a dedicated one to control all connections between different networks.
When we install a firewall on a computer or final host, it will allow us to block or allow data traffic at the IP level, This means that we will be able to allow or block the connections that we want, and only our specific team will be affected, and not the rest of the local network equipment. When we have the firewall on the router, or directly have a dedicated firewall, then we can allow or block network traffic from all devices on the local network, whether domestic or professional.
The objective of a firewall is to allow or block connection attempts, to prevent unauthorized users from sending us different types of packages, We can also visualize and block any traffic made by the applications installed on our equipment, in addition, we could also configure an intrusion detection and prevention system, with the aim of increasing its functionalities.
Today there are firewalls both by software and by hardware, Logically, hardware firewalls include an operating system with all the necessary functionalities to evaluate the network traffic to be allowed or blocked. However, there are different types of firewall depending on how we configure them and what characteristics they have, then we will explain in detail the different types that exist today.
Currently we have different types, both for the Windows operating system and also other software specifically geared towards firewalls. Knowing the difference between the different types is very important to choose the one that interests us.
This type of firewall is the most basic that exists, it is known as « stateless firewall » or « firewall with packet filtering ». This is the type is the oldest and simplest we have, this type of firewall is usually installed within the perimeter of the network, does not route any type of package nor does it know if the different connections that are allowed have been established or not. This type of firewall works based on predefined basic rules, where we must accept or deny the different packages, but never controlling if the connection has been established, if it is related to other ports as it happens with the passive FTP protocol, nor if the connection is invalid.
If you want to have good security and prevent intrusions, our recommendation is that you do not use this type, without using the SPI ( Stateful Packet Inspection ).
This type of firewall is more advanced than the previous one, this type is known as « with state », and it is capable of knowing if a connection has been established, it is related and even invalid. This guy is the least we should have to be quite protected against external threats. Thanks to the fact that it is a stateful firewall, it is capable of supervising the active connection, track and even limit the number of simultaneous connections on a certain computer to protect it against DoS attacks. Other very important characteristics are that it is capable of preventing malicious traffic from gaining access to the internal network, since it can monitor connections in real time and even detect unauthorized access attempts.
This type of firewall is the one that is usually used when we use dedicated hardware, a Linux server and other devices. It is always recommended to use this instead of the previous one.
An application level firewall ( ALG ) is a kind of proxy that provides us with security in applications, the objective of this type of firewall is to filter incoming traffic based on certain rules. Not all the applications we commonly use are supported by ALG, for example, FTP, SIP, various VPN, RSTP protocols, and BitTorrent protocol do support it. The ALG operating form is as follows:
Below, you can see the advantages and disadvantages:
We have this ALG type available in most domestic routers, and, of course, also in professionals.
The Next-Generation Firewall or also known as NG-Firewall are technologically advanced firewalls. They have Stateful Packet Inspection technologies, in addition, they carry out a deep inspection of all the packages that goes beyond looking at the header of the IP, TCP or UDP packet, among other protocols, is able to see the payload being sent in order to protect us against more sophisticated attacks. These types of firewalls offer inspection at the application level, so we reach layer 7 of the OSI model.
Although it generally offers the same benefits as an SPI firewall, they are more advanced in allowing dynamic and static packet filtering policies to be applied, together with advanced VPN support in order to protect all incoming and outgoing connections on the network. NGFWs are the most widely used in medium and large companies to protect all communications.
This type are the most recommended to use in the business field, since it incorporates the best of the SPI and the ALG, since it supports absolutely everything in addition to adding additional features in order to protect the network.
Having a firewall on our computer is very basic and even the Windows or Linux operating system itself incorporates. In home environments with WiFi routers, we have it integrated into the equipment itself, iptables being the most widely used since the firmware of all routers is based on Linux, so it carries this type of SPI type firewall ( Stateful Packet Inspection ). If we are in a somewhat more advanced environment and want to protect everything at the network level, Having a hardware firewall like Netgate appliances with pfSense or similar platforms is highly recommended, especially since they incorporate additional functionalities like IDS and IPS, in addition to being able to install and configure VPN servers easily and quickly.
Any local team or network must have a minimum of one SPI firewall, of course, medium and large companies always use NGFWs that are much more advanced and allow us a greater capacity to detect attacks and are even capable of mitigating malware, since they are in charge of carrying out a deep inspection of packages at the L7 level, with the aim of protecting all the equipment of the professional local network.
31-01-2023, 13:55
17-01-2023, 17:16
28-01-2023, 17:52
There are no comments
Information
Users of Visitor are not allowed to comment this publication.