A Guide to Firewall Security in 2019

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog

Key Takeaways
  • Firewall security enforces predefined rules to filter network traffic and block malicious activity at network boundaries.
  • Basic packet filtering and stateful firewalls provide foundational protection but are limited in handling complex protocols and inspecting payloads for threats.
  • Deep packet inspection and application-aware firewalls extend visibility into packet contents and application contexts to support more granular security policies.
  • Application proxy firewalls isolate internal systems by terminating client connections and relaying traffic through a controlled intermediary service.
  • Unified threat management (UTM) systems consolidate multiple security capabilities—such as IPS/IDS, anti-malware, and URL filtering—into a single platform for simplified operations.
  • Next-generation firewalls combine application awareness with advanced IDS/IPS and continuous threat intelligence updates to detect behavioral anomalies and modern attack patterns beyond traditional layer 3/4 controls.

Key takeaway

Firewall security protects networks by filtering traffic based on rules to block malicious threats. From basic packet filtering to advanced next-gen firewalls, each type offers different layers of defense. Choosing the right firewall is key to securing your data, applications, and systems.


Select a solution with robust threat data, seamless integration with your stack, and flexible deployment. Consider the following when comparing solutions:

It’s no secret that firewall security is important. The online world is advancing at a record-breaking pace. And while the progress being made allows human beings to work more efficiently, connect with one another more conveniently, and accomplish tasks that were impossible just a few years ago (taking the first photo of a black hole, for example), these technological strides also contribute to an upsurge in cybercrime.

In fact, according to a study by Global Market Insights, the value of the cybersecurity market is anticipated to reach $300 billion by 2024.

Another global study by Accenture showed that security breaches increased by 11 percent in 2018

Figures like these conclusively prove that firewall security has never been more necessary than it is today. Especially when you consider that 73 percent of businesses are not ready to respond to a cyber attack.

Firewall security is a major factor when it comes to preventing malware attacks and other computer-related crimes.

In this post, we’ll be discussing the various types of security firewalls, and how businesses can use them to avoid becoming a victim of cybercrime in 2021.

If you’re new to the world of data and web security, you may be wondering “What is firewall protection?”. So let’s answer this question first before diving into the separate methods that are available.

What is firewall security?

Firewall security refers to a network security system that blocks malicious traffic from accessing your computer network. It accomplishes this by using a predetermined set of security rules (which are established by network owner) to filter traffic. Firewall security can be hardware-based or software-based and can be used on both personal or business networks.

What are the different types of firewall security?

There are several kinds of network firewall security programs, each with a unique purpose and method of protecting your computer systems.

Some of the most widely-used security firewall features include:

1. Packet Filtering

Packet filtering firewalls analyze packets (units of data) as they enter or leave a computer network. Depending on the packet’s IP addresses and the transport ports to indicate the protocol, a packet filtering firewall will either grant the packet access or deny it entry. 

While this form of firewall security is a great first step to any security system, it isn’t ideal on its own. This is because packet filtering firewalls don’t have the capability to automatically open temporary “pinhole” connections used in many protocols, so they must be configured to allow all possible pinholes. That means that a lot of traffic will be allowed that normally should be blocked.

For this reason, it’s recommended that network owners not rely on packet filtering firewalls alone.

2. Stateful Firewalls

A stateful firewall is an improvement on a packet filtering firewall in that it analyzes packet data to determine the authenticity and security of the information that is being received or sent out from a computer network. It differs, however, in the sense that it can also store details about previous packets that have entered or left the network. This makes it a more reliable form of firewall security, since it can adapt its security policy to allow new connections from previously trusted locations, and log more information that can be used to identify potential threats.  However, a purely stateful firewall does not perform any security checks on the payload for those connections, making it possible for malware to bypass the firewall.

3. Deep Packet Inspection 

This type of firewall network security is even more advanced than the options listed above. Unlike stateful firewalls or packet filtering firewalls that only examine a packet’s header information (which is akin to only reading the cover of a book), deep packet inspection firewalls examine all of a packet’s content and can be programmed by a network manager or IT professional to look for specific traits, like IPS attack signatures. It can also be programmed to reroute these packets to predetermined destinations for further examination.

4. Application-Aware 

These security firewalls enable a network manager or IT profession to set rules based on applications, like allowing access to Office 365 but not Xbox. This network firewall security comes from deep packet inspection to identify the application for each connection. Since the Internet is large and geographically diverse, applications are often hosted in multiple different locations, and can even use different transport ports, so it’s difficult to apply policy to web apps using other types of firewall rule bases. Application-aware firewalls greatly simplify the task of providing security for a network of users.

5. Application Proxy 

Application Proxy Firewalls differ from other types of security firewalls because they act as a gatekeeper, preventing information packets from crossing the firewall entirely. Instead, these packets are sent to the proxy, a completely separate “sorting facility”. This is important since many apps are created by software developers who may or may not have an in-depth knowledge of security best practices. Thus, an application or tool you are using may be hackable, or vulnerable to threats. Since you can not completely rely on the developer to create an impenetrable app, having your own specialized firewall protection in place is always a wise decision.

6. United Threat Management 

A united threat management firewall (aka UTM) is a security system that combines multiple services and features, forming a conglomerate of mechanisms that can be used to protect your network. 

These mechanisms include:

  • IPS/IDS (Intrusion Prevention/Detection System)
  • DOS and DDOS (Denial of Service and Distributed Denial of Service)
  • Application Proxy Filtering 
  • Spam filtering
  • Anti-Phishing
  • Anti-virus
  • Anti-spyware
  • URL filtering
  • Rootkit protection
  • Zero Day Protection
  • DLP (Data Leakage Prevention)

United threat management systems are extremely cost-effective, as they eliminate the need for multiple programs, and thus the need for more manpower to manage them.

They also streamline the firewall security process, allowing all data to be sorted through one operating system, and make it possible to respond to potential threats more quickly.

7. Next-Generation Firewalls

While all of the other methods of firewall security we’ve included are unquestionably valuable, they only operate on the Transport Layer and Network Layer of the OSI model. What does this mean in layman’s terms? Fundamentally, it means that certain functions of your telecommunication or computing system aren’t protected by the other firewalls network security options we’ve covered.

Next-generation firewalls address this issue by combining application awareness with sophisticated intrusion detection systems (IDS) and intrusion protection systems (IPS). These systems use more comprehensive analytics that looks for traffic behavioral patterns, threat signatures and anomalous activity— factors that other security firewalls miss.

Another benefit is that next-generation firewalls continuously update their malware and antivirus protection, and the process is completed automatically, providing network owners with peace of mind.

Now that you have an overall understanding of the most common forms of firewall protection, you can combat cybercrime successfully in 2021 and beyond.

How Indeni can help protect your investment in Firewall Security

Indeni provides security infrastructure automation with unprecedented visibility that’s ready to go in minutes. Our production-ready firewall security knowledge is curated from vetted, community-sourced experience, to deliver automation of tedious tasks with turn-key integration with your existing processes. View firewall security issues that Indeni can automatically detect in the Automation Explorer, or Contact us today!

Related content

Three armored figures walking toward a futuristic Las Vegas skyline with pyramids, glowing orb, and "Welcome to Fabulous Las

Your journey to intelligent NetOps begins at Cisco Live

Visit BlueCat’s booth or book a meeting now to learn more about how our solutions can help you build a network that supports constant change.

Read more
Stacked colorful wooden directional arrows on a post by a calm seaside with distant hills and blue sky

Replace BIND and ISC with Micetro DNS/DHCP Server (MDDS)

Tired of patching and manually configuring BIND DNS and ISC DHCP? Discover how Micetro MDDS appliances can replace them for modern DDI.

Read more
Row of orange industrial robotic arms positioned along an automated conveyor belt in a factory setting

Automate it all in Integrity with REST v2 API-first DDI management

Discover API-first DDI with Integrity X by using REST v2 to automate DNS, DHCP, and IPAM for scalable, secure network operations.

Read more
Three colleagues at monitors collaborating, overlaid with network, analytics, cloud, and gear icons.

Agentic AI adoption in network observability propels NetOps teams

Network observability is crucial for today’s networks and even more capable with agentic AI, according to new Omdia and BlueCat research.

Read more

⏳ Cisco Live is almost here. Put BlueCat on your agenda for smarter, more secure networks.