Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Netzwerksicherheit Glossary

Firewall

A network security system that filters incoming and outgoing traffic based on defined rules at Layers 3 and 4 (IP, port, protocol). It protects network segments—unlike a WAF, which specifically secures web applications at Layer 7.

A firewall (literally: fire wall) is a network security system that controls incoming and outgoing data traffic based on configured security rules. It forms the foundation of nearly all network security architectures.

Firewall Generations

Generation 1 - Packet Filter: Checks IP addresses, ports, and protocols. Simple and fast, but blind to application context.

Generation 2 - Stateful Inspection: Tracks the connection state (e.g., TCP state machine). Blocks packets that do not belong to a known connection.

Generation 3 - Application Layer (Proxy Firewall): Understands application protocols (HTTP, SMTP, DNS) and can scan content for malware.

Next-Generation Firewall (NGFW): Combines all predecessors plus:

  • Deep Packet Inspection (DPI)
  • Intrusion Prevention System (IPS)
  • SSL/TLS inspection (decryption, inspection, re-encryption)
  • Application Awareness: Identification of applications regardless of port
  • User Identity: Rule-based on users instead of IP addresses

Web Application Firewall (WAF)

A WAF is specifically designed for HTTP/HTTPS and protects web applications from OWASP Top 10 attacks. It operates at Layer 7 and understands HTTP semantics. WAFs are not a substitute for secure development, but they are an important layer of protection.

Firewalls in a Zero-Trust Context

Traditional perimeter firewalls lose their central role in the zero-trust model: Since there is no implicit trust for internal traffic, control shifts to identity-based access decisions and microsegmentation. Firewalls remain relevant as part of a defense-in-depth strategy.