What Is an NGFW? NGFWs vs. Firewalls vs. UTMs - Huawei (2024)

Definition of NGFW

Back to 2007, Gartner, a well-known consultative firm, proposed the concept of NGFW based on changes in the enterprise service workflow and IT architecture and emerging trends in security threats. In 2009, Gartner officially released Defining the Next-Generation Firewall.

Gartner defines an NGFW as "a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks." According to Gartner, the NGFW must provide the following capabilities:

  1. Traditional Firewall Functions

    The NGFW is a substitute for traditional firewalls in the new environment and must be backward compatible with traditional firewall functions, including packet filtering, protocol status detection, NAT, and VPN.

  2. Application Identification and Control Technologies

    Application awareness, refined security policies based on applications, and hierarchical bandwidth control are the most important capabilities introduced by NGFWs. Traditional stateful inspection firewalls merely work at Layer 2 through Layer 4 and do not inspect packet payloads. The NGFW can inspect information at Layer 2 through Layer 7, providing visibility into and control over network services.

  3. In-Depth Integration of IPS and Firewall Functions

    The NGFW must support the IPS function and integrate it with firewall functions for convergence. In this case, one plus one equals more than two. Gartner specially emphasizes more integration between the IPS and firewall than mere their interworking in NGFWs. For example, a firewall should be able to automatically update and deliver security policies when malicious traffic is detected by the IPS, without manual involvement. In other words, a firewall with IPS integrated is more intelligent. Gartner finds that the NGFW and IPS markets are converging, particularly in enterprise boundary-specific deployment scenarios, in which the NGFW encroaches on the market of standalone IPS products.

  4. Using Information Outside the Firewall to Enhance Management and Control

    The NGFW can use the user, location, vulnerability, and network resource information provided by other IT systems to improve security policies. For example, to address the changeable IP address-induced control challenges in mobile working scenarios, the NGFW can be integrated with a user authentication system to enforce security policies based on user information instead of IP addresses.

NGFWs vs. Traditional Firewalls vs. UTMs

Firewalls have evolved with network development since their emergence.

What Is an NGFW? NGFWs vs. Firewalls vs. UTMs - Huawei (1)
Development history of packet filtering firewalls, stateful inspection firewalls, UTMs, and NGFWs

  1. Early packet filtering firewalls isolated networks only by implementing access control.
  2. A stateful inspection firewall (also called a traditional firewall) integrated the TCP/UDP and application status detection capabilities to implement Layer 3 and Layer 4 protection. On the stateful inspection firewall, the concept of policy was introduced and what was to be processed was changed from packets to flows, improving processing efficiency.
  3. In 2004, UTMs were developed to integrate traditional firewall, content security (antivirus, IPS, and URL filtering), and VPN functions. Each functional module ran separately, requiring that packets be parsed repeatedly for detection by each module. As such, detection efficiency was not improved. The UTMs simplified security product deployment to some extent and were suitable for small- and medium-sized enterprises.
  4. As the number of web applications increased, the relationships between applications, ports, and protocols became more complex. For instance, some people may use HTTP during their studies, and some may use it to play games. Therefore, traditional firewalls that identify traffic based only on 5-tuple information cannot clearly identify network traffic. Through this, the NGFW with application identification technology emerged. It can distinguish applications corresponding to traffic, even if these applications use the same protocol and port. In addition, the NGFW deeply integrates multiple security services, such as IPS and antivirus, with the firewall services for parallel processing. This addresses the issue in which the UTM device is required to process packets module by module with low performance. However, in most cases, the UTM and NGFW do not provide the web application firewall (WAF) capability.

What Is an NGFW? NGFWs vs. Firewalls vs. UTMs - Huawei (2)
Capability comparison among traditional firewalls, UTMs, and NGFWs

Which Type of Firewall Is Needed Now?

With the development of mobility, socialization, cloud, and big data, the ICT network environment is being reshaped. The NGFW must satisfy the strict requirements of the network security environment.

High Performance

As the NGFW is a real-time protection device, its performance is the top consideration for possible purchasers. Huawei's NGFW relies on the advanced integrated intelligent awareness engine to perform integrated processing on packet content. In other words, data extracted at a time is eligible for being processed by all content-based security features, delivering high detection performance.

Comprehensive Threat Prevention Capabilities

  • In addition to inheriting and improving traditional security functions, the NGFW effectively identifies applications and defends against application-layer threats and attacks.
  • It integrates the user authentication system and supports user identification to address the challenges associated with mobile access.
  • It supports content protection and filters content of web pages, emails, and files.
  • It supports SSL-encrypted traffic detection. It can decrypt SSL traffic and detect content in decrypted traffic.
  • It interworks with a sandbox and can send suspicious files to the sandbox for detection to identify unknown threats.

Refined Detection Granularity

The NGFW supports flow-based integrity detection, real-time monitoring, and cache-free technology. By using only a few system resources, the firewall uses these technologies to detect fragments and packets to identify applications, intrusion behavior, and virus files in real time.

Cloud Computing and Data Centers

The NGFW supports virtualization in terms of route-based forwarding, configuration management, and security services. A single NGFW can be virtualized into multiple independent virtual firewalls, which can be used by tenants of cloud computing and data centers.

Simplified Management

  • The NGFW provides the visualized management UI and various log reports.
  • It supports intelligent policy optimization and agile cloud management.
  • It provides open RESTful and NETCONF APIs for northbound management.

Future of NGFW

The NGFW is not the final solution. With the rapid development of networks, new technologies and requirements are always emerging.

  • As the volume of encrypted traffic swells, problems cannot be resolved just by improving processing performance.
  • Various new attack approaches, such as using DGA malicious domain names and C&C traffic, emerge one after another, presenting a trend of three-dimensional attacks and rapidly increasing variant attacks.
  • Mass attack events make security O&M analysis more and more complex.

From traditional firewalls to NGFWs, they protect against network attacks from the network layer to the application layer. In the era of big data and artificial intelligence (AI), NGFWs must evolve towards platformization and intelligence. In 2018, Huawei proposed the concept of AI firewall to implement advanced threat defense based on AI capabilities. The AI firewall continuously improves automated handling and knowledge collaboration capabilities by virtue of the big data security platform.

What Is an NGFW? NGFWs vs. Firewalls vs. UTMs - Huawei (2024)
Top Articles
Decoding the Kraken Affiliate Program
When I Buy a Domain Name, Who Gets the Money?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Maia Crooks Jr

Last Updated:

Views: 6323

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Maia Crooks Jr

Birthday: 1997-09-21

Address: 93119 Joseph Street, Peggyfurt, NC 11582

Phone: +2983088926881

Job: Principal Design Liaison

Hobby: Web surfing, Skiing, role-playing games, Sketching, Polo, Sewing, Genealogy

Introduction: My name is Maia Crooks Jr, I am a homely, joyous, shiny, successful, hilarious, thoughtful, joyous person who loves writing and wants to share my knowledge and understanding with you.