A firewall is a network security device or application that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a predefined set of security rules. A firewall can be hardware, software, or both.

Firewalls are designed for both single computer and for a network. Host-based Firewall and Network-based Firewall. A host-based firewalls are inbuilt or third-party application installed on individual workstations or servers and monitors incoming and outgoing activities. A network-based firewall could be a hardware, application or both. A network-based firewall can be installed on the administrator’s system for monitoring incoming and outgoing activities between computers in the network.


                                     Types of Firewalls:

Types of firewalls are included:

Packet-filtering firewalls, Stateful inspection firewalls, Proxy firewalls, Unified threat management (UTM) firewall and next-generation firewalls (NGFW).

  • A packet-filtering firewall examines each every packet that passes in the network. Packet-filtering firewalls work at the Network layer of the OSI networking model. k. Packet-filtering firewall examines the packet headers that contain IP addresses and packet options and block or allow traffic depending on the set of rules in the firewall configuration.
  • A Stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening to the closing of a connection. Filtering and motioning is made based on a set of rules.
  • A proxy firewall works at the application layer of the Open Systems Interconnection (OSI) reference model.
  • Unified threat management (UTM) firewall. UTM Firewall is combined along with other security services in UTM Router. It provides multiple security features and services in a single device or service on the network, protecting users from security threats in a simplified way. UTM functions and services also include anti-virus, anti-spam, content filtering, and web filtering.
  • An NGFW uses a multilayered approach to integrate enterprise firewall capabilities with an intrusion prevention system. Most companies are deploying next-generation firewalls to block advanced threats like  malware and application-layer attacks.


Best Free Host and Network Firewall:

  1. Best Free Host-based Firewall

  2. Best Free Network-based Firewall

Both Host-base and network-based firewall configuration is necessary in a computer network. Check on network security for more information about firewall and other security mechanism necessary for securing an individual computer and the entire network.



Similar articles:

Anti-Virus Softwares

Anti-Spyware Softwares

Best Host-based Intrusion Detection Systems

Best Network-based Intrusion Detection Systems

Malware Attacks

Anti-Malware Softwares


Olalekan Admin

Cyber Security Engineer