Firewall Intro

Introduction to Firewalls

A Firewall is a foundational network security system—available as physical hardware or software—that actively monitors and controls incoming and outgoing network traffic based on strict, predefined security rules.

Think of a firewall as a digital security guard standing between your trusted internal network (LAN) and the untrusted outside world (the Internet/WAN). When data packets try to cross this barrier, the firewall filters them and takes one of three actions:


Firewall: The Barrier Between LAN and WAN

The Internet WAN (Untrusted) FIREWALL Internal PCs LAN (Trusted) Valid Data ACCEPT Suspicious REJECT (Error Reply) Malicious DROP (Silently Blocked)

The Firewall strictly enforces Accept, Reject, and Drop traffic policies.


Why Are Firewalls Important?


How Does a Firewall Work?

A firewall operates by constantly inspecting all incoming and outgoing traffic to decide whether to allow or block it. The general workflow is:

  1. All data packets entering or leaving the network must first pass through the firewall.
  2. The firewall deeply examines each packet against a strict set of predefined security rules set by the organization.
  3. If the packet matches the "safe" rules, it is allowed in. If it is suspicious, blacklisted, or contains malicious content, it is instantly blocked.
  4. Blocked or highly unusual traffic is recorded in digital logs, and real-time alerts may be generated for the security team to investigate.

The Default Policy: Because it is impossible for an administrator to write a specific rule for every single type of traffic on the internet, the firewall applies a Default Policy (accept, reject, or drop) for any traffic that is not explicitly covered by existing rules. To prevent unauthorized access, security best practices dictate that the default policy should always be set to Drop or Reject.


Types of Firewalls

Firewalls have evolved significantly over the years and can be categorized based on their data filtering methods, network placement, and form factor.

1. By Data Filtering Method

2. By Network Placement

3. By Systems Protected

4. By Form Factor


Knowledge Check

?

According to security best practices, what should the "Default Policy" of a firewall be set to for any traffic that doesn't match an existing rule?