Firewall types and architecture | Infosec (2024)

Network security

A firewall is a network security device placed at the perimeter of the corporate network, thus all the packets entering and leaving the network go through the firewall first and appropriate actions are taken based on the network rules configured by the organization.

The firewall is placed at the network level closely with a router for filtering all the network packets as per the rule configured. Thus, architecting a firewall and placing it in the right location in the corporate network architecture is of utmost importance since it controls incoming and outgoing traffic.

Factors for architecting a firewall

There are many factors that come into consideration for architecting a firewall. The major ones are:

  1. Organization‘s ability to implement and develop the architecture
  2. The budget allotted by the organization
  3. Objectives of the network

Firewall architecture implementation

There are four common architectural implementations of firewalls widely in use. They are packet filtering routers, screened host firewalls, dual-homed firewalls and screened subnet firewalls. Let’s understand each one of them in detail.

Packet filtering routers

Most of organizations have a router as the interface to the Internet. This router is placed at the perimeter between the organization‘s internal networks and the internet service provider. These routers can be configured to accept or reject the packets as per the rule of the organization. This is one of the simple and effective ways to lower down the organization‘s risk from the internet.

Drawbacks

The length and the complexity of the rule sets implemented to filter the packets can grow and degrade network performance. Also, it suffers from a lack of auditing and strong authentication mechanisms.

Screened host firewalls

This firewall combines a packet-filtering router with a discrete firewall such as an application proxy server. In this approach, the router screens the packet before entering the internal network and minimizes the traffic and network load on the internal proxy. The application proxy inspects application layer protocol such as HTTP or HTTPS and performs the proxy services. This separate host is called a bastion host and can be a rich target for external attacks, thus it should be thoroughly secured.

The bastion host stores copies of the internal documents, making it a promising target to the attackers. A bastion host is also commonly referred to as the Sacrificial Host.

Advantage

This configuration requires the attacker to hack and compromise two separate systems, before accessing the internal data. In this way, the bastion host and router protects the data and is more effective and secure implementation.

Dual-homed host firewalls

This architecture is a more complex implementation of screened host firewalls. In this architectural approach, the bastion host accommodates two NICs (Network Interface Cards) in the bastion host configuration. One of the NIC is connected to the external network, and the other one is connected to the internal network thus providing an additional layer of protection.

This architecture often makes use of Network Address Translation (NATs). NAT is a method of mapping external IP addresses to internal IP addresses, thus forming a barrier to intrusion from external attackers.

Screened subnet firewalls (with DMZ)

Of all the architecture available, Screened Subnet Firewall is widely used and implemented in corporate networks. Screened Subnet Firewalls as the name suggests make use of DMZ and are a combination of dual-homed gateways and screened host firewalls.

In a screened subnet firewall setup, the network architecture has three components and the setup is as follows:

  • 1st component: This component acts as a public interface and connects to the Internet.
  • 2nd component: This component is a middle zone called a demilitarized zone. It acts as a buffer between 1st and 3rd components.
  • 3rd component: The system in this component connects to an intranet or other local architecture.

Advantage

The use of an additional "layer" and other aspects of the screened subnet firewall makes it a viable choice for many high-traffic or high-speed traffic sites. Screened subnet firewall also helps with throughput and flexibility.

Conclusion

In this article, we have seen the various architecture and implementation of firewalls in a typical network. As per the needs and the requirement, the right architecture must be selected and used to secure the network from external attacks and intrusion.

Firewall types and architecture | Infosec (2)

Learn Network Security Fundamentals

Build your skills with seven hands-on courses covering network models and protocols, wireless and mobile security, network security best practices and more.

Start Learning

Sources

Posted: February 3, 2021

Firewall types and architecture | Infosec (3)

Nitesh Malviya

View Profile

Nitesh Malviya is a Security Consultant. He has prior experience in Web Appsec, Mobile Appsec and VAPT. At present he works on IoT, Radio and Cloud Security and open to explore various domains of CyberSecurity. He can be reached on his personal blog - https://nitmalviya03.wordpress.com/ and Linkedin - https://www.linkedin.com/in/nitmalviya03/.

Firewall types and architecture | Infosec (2024)
Top Articles
Add these new Google widgets to your iPhone
Amazon PTO & Vacation Policy
Warren Ohio Craigslist
Ffxiv Palm Chippings
The Atlanta Constitution from Atlanta, Georgia
Wells Fargo Careers Log In
Words From Cactusi
Optum Medicare Support
Magic Mike's Last Dance Showtimes Near Marcus Cedar Creek Cinema
Cape Cod | P Town beach
Herbalism Guide Tbc
South Bend Tribune Online
Binghamton Ny Cars Craigslist
Restaurants Near Paramount Theater Cedar Rapids
TS-Optics ToupTek Color Astro Camera 2600CP Sony IMX571 Sensor D=28.3 mm-TS2600CP
Arre St Wv Srj
Q Management Inc
Fdny Business
Lcwc 911 Live Incident List Live Status
[Cheryll Glotfelty, Harold Fromm] The Ecocriticism(z-lib.org)
Jeff Now Phone Number
Apple Original Films and Skydance Animation’s highly anticipated “Luck” to premiere globally on Apple TV+ on Friday, August 5
We Discovered the Best Snow Cone Makers for Carnival-Worthy Desserts
Melissababy
Mc Donald's Bruck - Fast-Food-Restaurant
Maxpreps Field Hockey
2013 Ford Fusion Serpentine Belt Diagram
What Equals 16
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Yale College Confidential 2027
Elijah Streams Videos
Grand Teton Pellet Stove Control Board
Jambus - Definition, Beispiele, Merkmale, Wirkung
Morlan Chevrolet Sikeston
Nacho Libre Baptized Gif
Missouri State Highway Patrol Will Utilize Acadis to Improve Curriculum and Testing Management
PA lawmakers push to restore Medicaid dental benefits for adults
Crystal Mcbooty
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Bella Thorne Bikini Uncensored
Thanksgiving Point Luminaria Promo Code
Directions To Advance Auto
SF bay area cars & trucks "chevrolet 50" - craigslist
Appraisalport Com Dashboard Orders
Download Diablo 2 From Blizzard
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Tom Kha Gai Soup Near Me
Paperlessemployee/Dollartree
Jimmy John's Near Me Open
Ajpw Sugar Glider Worth
Laura Houston Wbap
Besoldungstabellen | Niedersächsisches Landesamt für Bezüge und Versorgung (NLBV)
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 6091

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.