A Guide to Firewall Security in 2019

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog

Key takeaway

Firewall security protects networks by filtering traffic based on rules to block malicious threats. From basic packet filtering to advanced next-gen firewalls, each type offers different layers of defense. Choosing the right firewall is key to securing your data, applications, and systems.


Select a solution with robust threat data, seamless integration with your stack, and flexible deployment. Consider the following when comparing solutions:

It’s no secret that firewall security is important. The online world is advancing at a record-breaking pace. And while the progress being made allows human beings to work more efficiently, connect with one another more conveniently, and accomplish tasks that were impossible just a few years ago (taking the first photo of a black hole, for example), these technological strides also contribute to an upsurge in cybercrime.

In fact, according to a study by Global Market Insights, the value of the cybersecurity market is anticipated to reach $300 billion by 2024.

Another global study by Accenture showed that security breaches increased by 11 percent in 2018

Figures like these conclusively prove that firewall security has never been more necessary than it is today. Especially when you consider that 73 percent of businesses are not ready to respond to a cyber attack.

Firewall security is a major factor when it comes to preventing malware attacks and other computer-related crimes.

In this post, we’ll be discussing the various types of security firewalls, and how businesses can use them to avoid becoming a victim of cybercrime in 2021.

If you’re new to the world of data and web security, you may be wondering “What is firewall protection?”. So let’s answer this question first before diving into the separate methods that are available.

What is firewall security?

Firewall security refers to a network security system that blocks malicious traffic from accessing your computer network. It accomplishes this by using a predetermined set of security rules (which are established by network owner) to filter traffic. Firewall security can be hardware-based or software-based and can be used on both personal or business networks.

What are the different types of firewall security?

There are several kinds of network firewall security programs, each with a unique purpose and method of protecting your computer systems.

Some of the most widely-used security firewall features include:

1. Packet Filtering

Packet filtering firewalls analyze packets (units of data) as they enter or leave a computer network. Depending on the packet’s IP addresses and the transport ports to indicate the protocol, a packet filtering firewall will either grant the packet access or deny it entry. 

While this form of firewall security is a great first step to any security system, it isn’t ideal on its own. This is because packet filtering firewalls don’t have the capability to automatically open temporary “pinhole” connections used in many protocols, so they must be configured to allow all possible pinholes. That means that a lot of traffic will be allowed that normally should be blocked.

For this reason, it’s recommended that network owners not rely on packet filtering firewalls alone.

2. Stateful Firewalls

A stateful firewall is an improvement on a packet filtering firewall in that it analyzes packet data to determine the authenticity and security of the information that is being received or sent out from a computer network. It differs, however, in the sense that it can also store details about previous packets that have entered or left the network. This makes it a more reliable form of firewall security, since it can adapt its security policy to allow new connections from previously trusted locations, and log more information that can be used to identify potential threats.  However, a purely stateful firewall does not perform any security checks on the payload for those connections, making it possible for malware to bypass the firewall.

3. Deep Packet Inspection 

This type of firewall network security is even more advanced than the options listed above. Unlike stateful firewalls or packet filtering firewalls that only examine a packet’s header information (which is akin to only reading the cover of a book), deep packet inspection firewalls examine all of a packet’s content and can be programmed by a network manager or IT professional to look for specific traits, like IPS attack signatures. It can also be programmed to reroute these packets to predetermined destinations for further examination.

4. Application-Aware 

These security firewalls enable a network manager or IT profession to set rules based on applications, like allowing access to Office 365 but not Xbox. This network firewall security comes from deep packet inspection to identify the application for each connection. Since the Internet is large and geographically diverse, applications are often hosted in multiple different locations, and can even use different transport ports, so it’s difficult to apply policy to web apps using other types of firewall rule bases. Application-aware firewalls greatly simplify the task of providing security for a network of users.

5. Application Proxy 

Application Proxy Firewalls differ from other types of security firewalls because they act as a gatekeeper, preventing information packets from crossing the firewall entirely. Instead, these packets are sent to the proxy, a completely separate “sorting facility”. This is important since many apps are created by software developers who may or may not have an in-depth knowledge of security best practices. Thus, an application or tool you are using may be hackable, or vulnerable to threats. Since you can not completely rely on the developer to create an impenetrable app, having your own specialized firewall protection in place is always a wise decision.

6. United Threat Management 

A united threat management firewall (aka UTM) is a security system that combines multiple services and features, forming a conglomerate of mechanisms that can be used to protect your network. 

These mechanisms include:

  • IPS/IDS (Intrusion Prevention/Detection System)
  • DOS and DDOS (Denial of Service and Distributed Denial of Service)
  • Application Proxy Filtering 
  • Spam filtering
  • Anti-Phishing
  • Anti-virus
  • Anti-spyware
  • URL filtering
  • Rootkit protection
  • Zero Day Protection
  • DLP (Data Leakage Prevention)

United threat management systems are extremely cost-effective, as they eliminate the need for multiple programs, and thus the need for more manpower to manage them.

They also streamline the firewall security process, allowing all data to be sorted through one operating system, and make it possible to respond to potential threats more quickly.

7. Next-Generation Firewalls

While all of the other methods of firewall security we’ve included are unquestionably valuable, they only operate on the Transport Layer and Network Layer of the OSI model. What does this mean in layman’s terms? Fundamentally, it means that certain functions of your telecommunication or computing system aren’t protected by the other firewalls network security options we’ve covered.

Next-generation firewalls address this issue by combining application awareness with sophisticated intrusion detection systems (IDS) and intrusion protection systems (IPS). These systems use more comprehensive analytics that looks for traffic behavioral patterns, threat signatures and anomalous activity— factors that other security firewalls miss.

Another benefit is that next-generation firewalls continuously update their malware and antivirus protection, and the process is completed automatically, providing network owners with peace of mind.

Now that you have an overall understanding of the most common forms of firewall protection, you can combat cybercrime successfully in 2021 and beyond.

How Indeni can help protect your investment in Firewall Security

Indeni provides security infrastructure automation with unprecedented visibility that’s ready to go in minutes. Our production-ready firewall security knowledge is curated from vetted, community-sourced experience, to deliver automation of tedious tasks with turn-key integration with your existing processes. View firewall security issues that Indeni can automatically detect in the Automation Explorer, or Contact us today!

Related content

Stop the ticket bottleneck: Automate DNS, DHCP, and IPAM with Quick Service

Automated DNS, DHCP, and IPAM (DDI) service delivery enables organizations to replace manual, ticket-based workflows with policy-driven, self-service…

Read more

Stay ahead of network issues with real-time metrics with BlueCat Integrity X

Get real-time DNS, DHCP, and IPAM metrics with BlueCat Integrity X. Detect issues early using native Prometheus telemetry and proactive DDI observability.

Read more

Adding business context to DDI with tagging in BlueCat Integrity X

Add business context to DNS, DHCP, and IPAM with tagging in BlueCat Integrity X. Improve visibility, automation, and governance across complex networks.

Read more

Security Insights for network security at the edge without complexity 

For LiveWire and LiveNX users, analyze flow and packet telemetry for faster threat detection, stronger forensics, and shared visibility.

Read more