{"id":118,"date":"2021-06-12T12:14:54","date_gmt":"2021-06-12T12:14:54","guid":{"rendered":"https:\/\/infosec.klbproductions.nl\/?p=118"},"modified":"2021-06-12T12:14:54","modified_gmt":"2021-06-12T12:14:54","slug":"firewalls-explained","status":"publish","type":"post","link":"https:\/\/security.klbproductions.org\/?p=118","title":{"rendered":"Firewalls Explained"},"content":{"rendered":"\n<p>Thanks for watching another episode of Infosec Hub, today we will explain the concept of a firewall. I know most of the viewers and subscribers to my channel are more into the technical measures you can take to keep you computers and network safe, so this one is for all of you. To secure your computers and applications on a network level, the firewall is a good place to start.<\/p>\n\n\n\n<p>So what is a firewall ? <\/p>\n\n\n\n<p>A firewall is a system designed to prevent unauthorised access to a private network, the private network being your home network or a company network for instance. The attempt to access that network comes from the internet. In IT terms, the WAN, wide area network is the internet, the LAN, local area network is your own network. All computers on your private network have internet access but the firewall is placed at a central place in your network, all requests will go trough the firewall. So what do the professionals at CISCO say that a firewall is ?<\/p>\n\n\n\n<p>According to CISCO a provider from network devices such as switches, routers, VoIP phones a firewall is as follows;<\/p>\n\n\n\n<p>A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.<\/p>\n\n\n\n<p>Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.<\/p>\n\n\n\n<p>There are several implementations of firewalls, I will go over the most common implementations;<\/p>\n\n\n\n<p><strong>Stateful inspection firewall<\/strong><\/p>\n\n\n\n<p>Now thought of as a \u201ctraditional\u201d firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening of a connection until it is closed. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/infosec.klbproductions.nl\/wp-content\/uploads\/2021\/06\/well-known-tcp-ip-ports-protocols-service-names.jpeg\" alt=\"\" class=\"wp-image-123\"\/><\/figure>\n\n\n\n<p><strong>Next generation firewall<\/strong><\/p>\n\n\n\n<p>Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying&nbsp;<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/what-is-a-next-generation-firewall.html\">next-generation firewalls<\/a>&nbsp;to block modern threats such as advanced malware and application-layer attacks.<\/p>\n\n\n\n<p>According to Gartner, Inc.\u2019s definition, a next-generation firewall must include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Standard firewall capabilities like stateful inspection<\/li><li>Integrated intrusion prevention<\/li><li>Application awareness and control to see and block risky apps<\/li><li>Upgrade paths to include future information feeds<\/li><li>Techniques to address evolving security threats<\/li><\/ul>\n\n\n\n<p>While these capabilities are increasingly becoming the standard for most companies, NGFWs can do more.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/infosec.klbproductions.nl\/wp-content\/uploads\/2021\/06\/next-generation-firewall-1024x504.png\" alt=\"\" class=\"wp-image-125\"\/><\/figure>\n\n\n\n<p><strong>Proxy firewall<\/strong><\/p>\n\n\n\n<p>An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. However, this also may impact throughput capabilities and the applications they can support.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/infosec.klbproductions.nl\/wp-content\/uploads\/2021\/06\/Web-Proxy-firewall-1024x512.jpeg\" alt=\"\" class=\"wp-image-126\"\/><\/figure>\n\n\n\n<p><strong>Virtual firewall<\/strong><\/p>\n\n\n\n<p>A virtual firewall is typically deployed as a virtual appliance in&nbsp;a&nbsp;private cloud (VMware ESXi, Microsoft Hyper-V, KVM) or public cloud (AWS, Azure, Google, Oracle) to monitor and secure traffic across physical and virtual networks.&nbsp;A virtual firewall is often a key component in software-defined networks (SDN).&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/infosec.klbproductions.nl\/wp-content\/uploads\/2021\/06\/virtual-fireall-cloud.png\" alt=\"\" class=\"wp-image-133\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/infosec.klbproductions.nl\/wp-content\/uploads\/2021\/06\/Virtual-firewall.png\" alt=\"\" class=\"wp-image-127\"\/><\/figure>\n\n\n\n<p><strong>PfSense &#8211; OPENSOURCE firewall solution<\/strong><\/p>\n\n\n\n<p>In the near future we will make a few videos based on the open source firewall solution that has the name PFSENSE, based on FreeBSD, PfSense is free but setting it up will take time and experience. I will try to make a few videos for you guys to better understand the inner workings of PfSense.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/infosec.klbproductions.nl\/wp-content\/uploads\/2021\/06\/pfsense.png\" alt=\"\" class=\"wp-image-130\"\/><\/figure>\n\n\n\n<p><strong>Web Application Firewalls<\/strong><\/p>\n\n\n\n<p>Last type of firewall I want to talk about is the WAF or web application firewall, if you are reading this on my blog you are accessing a web application, if you are browsing to your favorite website it is probably a CMS, content management system. These systems organise content like text, images, embedded videos etc. These are web-based applications, there is a specific need for these web applications to stay safe. They are connected to the internet 24\/7 365 days a year. A web application firewall is specifically tailor made for the application. If you go for a subscription service the WAF will be regularly updated with the latest information about threats, weaknesses in other words vulnerabilities. Also security rules can be updated, usually the WAF is maintained by the security community of the firewall. Like it is the case with WordPress. The firewall can detect attacks based on AI, it can detect automated attacks and close the firewall on ip-basis or port-number.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Firewalls Explained\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/PhGjsb2eKZU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Thanks for watching another episode of Infosec Hub, today we will explain the concept of a firewall. I know most of the viewers and subscribers to my channel are more&hellip;<\/p>\n","protected":false},"author":1,"featured_media":135,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-journey"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Firewalls Explained - InfoSec Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security.klbproductions.org\/?p=118\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Firewalls Explained - InfoSec Hub\" \/>\n<meta property=\"og:description\" content=\"Thanks for watching another episode of Infosec Hub, today we will explain the concept of a firewall. I know most of the viewers and subscribers to my channel are more&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security.klbproductions.org\/?p=118\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Hub\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-12T12:14:54+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#\\\/schema\\\/person\\\/f5dec858fef5b00006e67ddc032c3820\"},\"headline\":\"Firewalls Explained\",\"datePublished\":\"2021-06-12T12:14:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118\"},\"wordCount\":775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Journey into Infosec\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118\",\"url\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118\",\"name\":\"Firewalls Explained - InfoSec Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2021-06-12T12:14:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/security.klbproductions.org\\\/?p=118\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/?p=118#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/security.klbproductions.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Firewalls Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#website\",\"url\":\"https:\\\/\\\/security.klbproductions.org\\\/\",\"name\":\"InfoSec Hub\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/security.klbproductions.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#organization\",\"name\":\"InfoSec Hub\",\"url\":\"https:\\\/\\\/security.klbproductions.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/security.klbproductions.org\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Schermafbeelding-2025-07-04-142429-1024x591.png\",\"contentUrl\":\"https:\\\/\\\/security.klbproductions.org\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Schermafbeelding-2025-07-04-142429-1024x591.png\",\"width\":1024,\"height\":591,\"caption\":\"InfoSec Hub\"},\"image\":{\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.youtube.com\\\/@infosec_hub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/security.klbproductions.org\\\/#\\\/schema\\\/person\\\/f5dec858fef5b00006e67ddc032c3820\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/392339b0add2557e08670db5436d015f9906a143214be7f5802cd0a9acc8a1a3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/392339b0add2557e08670db5436d015f9906a143214be7f5802cd0a9acc8a1a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/392339b0add2557e08670db5436d015f9906a143214be7f5802cd0a9acc8a1a3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/security.klbproductions.org\"],\"url\":\"https:\\\/\\\/security.klbproductions.org\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Firewalls Explained - InfoSec Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security.klbproductions.org\/?p=118","og_locale":"en_US","og_type":"article","og_title":"Firewalls Explained - InfoSec Hub","og_description":"Thanks for watching another episode of Infosec Hub, today we will explain the concept of a firewall. I know most of the viewers and subscribers to my channel are more&hellip;","og_url":"https:\/\/security.klbproductions.org\/?p=118","og_site_name":"InfoSec Hub","article_published_time":"2021-06-12T12:14:54+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/security.klbproductions.org\/?p=118#article","isPartOf":{"@id":"https:\/\/security.klbproductions.org\/?p=118"},"author":{"name":"admin","@id":"https:\/\/security.klbproductions.org\/#\/schema\/person\/f5dec858fef5b00006e67ddc032c3820"},"headline":"Firewalls Explained","datePublished":"2021-06-12T12:14:54+00:00","mainEntityOfPage":{"@id":"https:\/\/security.klbproductions.org\/?p=118"},"wordCount":775,"commentCount":0,"publisher":{"@id":"https:\/\/security.klbproductions.org\/#organization"},"image":{"@id":"https:\/\/security.klbproductions.org\/?p=118#primaryimage"},"thumbnailUrl":"","articleSection":["Journey into Infosec"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/security.klbproductions.org\/?p=118#respond"]}]},{"@type":"WebPage","@id":"https:\/\/security.klbproductions.org\/?p=118","url":"https:\/\/security.klbproductions.org\/?p=118","name":"Firewalls Explained - InfoSec Hub","isPartOf":{"@id":"https:\/\/security.klbproductions.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/security.klbproductions.org\/?p=118#primaryimage"},"image":{"@id":"https:\/\/security.klbproductions.org\/?p=118#primaryimage"},"thumbnailUrl":"","datePublished":"2021-06-12T12:14:54+00:00","breadcrumb":{"@id":"https:\/\/security.klbproductions.org\/?p=118#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security.klbproductions.org\/?p=118"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security.klbproductions.org\/?p=118#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/security.klbproductions.org\/?p=118#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/security.klbproductions.org\/"},{"@type":"ListItem","position":2,"name":"Firewalls Explained"}]},{"@type":"WebSite","@id":"https:\/\/security.klbproductions.org\/#website","url":"https:\/\/security.klbproductions.org\/","name":"InfoSec Hub","description":"","publisher":{"@id":"https:\/\/security.klbproductions.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security.klbproductions.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/security.klbproductions.org\/#organization","name":"InfoSec Hub","url":"https:\/\/security.klbproductions.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security.klbproductions.org\/#\/schema\/logo\/image\/","url":"https:\/\/security.klbproductions.org\/wp-content\/uploads\/2025\/07\/Schermafbeelding-2025-07-04-142429-1024x591.png","contentUrl":"https:\/\/security.klbproductions.org\/wp-content\/uploads\/2025\/07\/Schermafbeelding-2025-07-04-142429-1024x591.png","width":1024,"height":591,"caption":"InfoSec Hub"},"image":{"@id":"https:\/\/security.klbproductions.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/@infosec_hub"]},{"@type":"Person","@id":"https:\/\/security.klbproductions.org\/#\/schema\/person\/f5dec858fef5b00006e67ddc032c3820","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/392339b0add2557e08670db5436d015f9906a143214be7f5802cd0a9acc8a1a3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/392339b0add2557e08670db5436d015f9906a143214be7f5802cd0a9acc8a1a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/392339b0add2557e08670db5436d015f9906a143214be7f5802cd0a9acc8a1a3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/security.klbproductions.org"],"url":"https:\/\/security.klbproductions.org\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=\/wp\/v2\/posts\/118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=118"}],"version-history":[{"count":0,"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=\/wp\/v2\/posts\/118\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security.klbproductions.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}