¿Do you know what types of firewall exist and what differences do they have between them?
The defense of computer systems is divided according to their different components. That is, there are different security measures that can be applied to each of the elements of a computer system. This way of approaching cybersecurity is known as layered defense and focuses on articulating techniques and tools to protect:
The network perimeter. The device. The application. The data.
In this hierarchy, the network perimeter is a fundamental element of the systems, since it serves as an access door to the devices, the software and user data. Therefore, in cybersecurity, It is essential to learn how a network works and what are the main methods to protect it from threats.
Some of the most well-known and used tools for network perimeter security are firewalls. In this post, we will talk about What are the main types of firewallbut first, we will do a brief review of the general concept.
What is a firewall?
A firewall It is a network device that is used to monitor all traffic in and out of a device. A firewall It is like a security guard who decides which requests and responses are allowed to access or exit the device connected to the network. In this way, malicious traffic and the large number of cyber attacks that it could entail are avoided.
The firewalls They allow you to monitor, modify, admit or reject each of the requests and responses exchanged with servers through the web. To understand this more in depth, below we will see what the different types firewall that exist.
3 types of firewall
Local firewall
He firewall local is the one that comes, by default, installed in the operating system of a device. This may vary depending on the brand of device and the system you use. However, most computer security experts and fans decide to turn off the firewall local to have greater freedom on the Internet or to replace it with more efficient ones.
The important thing is that it is a firewall basic that allows increasing the security of devices by controlling suspicious traffic that is attempted to be accessed.
UTM Firewall
A firewall UTM (Unified Threat Management), also known as unified threat management, is a set of tools that serve to increase the security of a network. It is one of the types of firewall most used for their good performance and effectiveness. The firewalls UTM contain security tools, such as:
Virtual Private Network (VPN) Management. Virtual private networks allow you to establish encrypted communication tunnels between computers to prevent the theft of confidential information by third parties.
Intrusion Detection System (IDS) and Intrusion Protection System (IPS). IDS and IPS systems serve to detect and eliminate threats in real time based on behavioral rules that can be customized, according to the company’s needs.
Monitoring based on behavioral rules. Monitoring is based on frequent testing based on behavioral rules to look for vulnerabilities or active threats in the system.
For all that, The unified threat management system is considered to be one of the best firewalls that can be applied to network security.
CORE Firewall
The firewalls CORE type are high-power firewalls that are usually used for large networks of multinational companies or state organizations. These firewalls They perform the same functions as traditional firewalls, but operate on a larger scale and, therefore, they need a hardware that corresponds to the power of these programs.
The firewalls CORE are not usually for individual use or for small and intermediate sized companies. That’s why, are not as common as firewalls local and UTM.
How to learn more?
We have already seen what the main types of firewall that exist. If you want to learn more about tools and other Blue Team techniquesAt you will find the Full Stack Cybersecurity Bootcamp, the intensive training in which, in just 7 months, you can become a specialist in this sector.
Join our bootcamp and have live classes, accompanied by expert teachers, on topics such as OSINT, information gathering, cryptography, data analysis. malware, pentesting, red team/blue team, hardening and much more. ¡Don’t keep waiting to change your life and sign up now!