Firewall Dynamics in Cybersecurity: Navigating Perception vs. Reality

Ahmed
9 min readMay 20, 2023

--

Table of Contents:

1- Introduction

2- Filtering Unwanted Intrusions: The Evolution of Firewalls

3- A Closer Look at the Firewall’s Super-heroic Abilities

4- Firewall Software: Fortifying Networks with Robust Cyber Protection

5- Beyond Traditional Boundaries: Firewall as an SDN Controller

6- Maximizing the Effectiveness of Firewalls: Addressing Poor Security Practices

7- Conclusion

1. Introduction

Once upon a time, it was our invincible fortress. A wall eventually formed out of it. Nowadays, it took the form of a virtual fence to protect our digital data. Today’s topic is about firewalls.

In the ever-evolving landscape of cybersecurity, one crucial line of defense stands tall: the firewall. It serves as the digital gatekeeper, protecting networks from unauthorized access and potential threats. Yet, amidst the constant barrage of cyber-attacks and the growing complexity of technology, the perception and reality of firewall dynamics often find themselves at odds.

This article discusses the:

  • Intricate interplay between perception and reality in the firewall technology field.
  • Challenges, misconceptions, and the importance of effectively navigating this critical aspect of cybersecurity.
  • Firewall dynamics and shed light on the significance of understanding the relation between perception and reality in digital security.

Since these technologies are accelerating at a rate never seen before, it is imperative that our privacy models keep up. Several technological methods and ideas, however, are immutable, no matter how much you try to alter them. In this article, I will do my best to clarify several fundamentals of firewalls that are often confused, overstated, understated, or taken as givens.

2. Filtering Unwanted Intrusions: The Evolution of Firewalls

Firewalls merely filter incoming and outgoing traffic based on their source, destination, and/or port.

The next-generation firewalls employ user-based screening. However, firewalls cannot prevent all threats to a network or issues with permitted access. In other words, traditional firewalls do not inspect or meddle with connections if they are allowed over a certain port, while next-generation firewalls do. Therefore, similar to an intrusion prevention system (IPS), a next-generation firewall analyzes all incoming traffic for malicious patterns or attack signatures. Even as software-defined networks (SDN) are taking their first baby steps, they are trying to reclaim their former position at the center of network security. Nevertheless,

Do we fully comprehend firewalls,

What they are ?

and what their function is ?

Everyone who works in the security business is confident in their knowledge of firewalls. However:

  • Some people do not even see it as a necessary part.
  • Some people just think about switching to software-based access restrictions.

These thoughts are coming without giving it any thought in terms of Internet-facing applications. These and other viewpoints are indicative of misunderstandings brought on by a lack of information and experience with firewalls. Those technologies have received a great deal of attention and investment from the security industry, firms, and specialists in recent years:

  • Software-defined networks (SDN)
  • Network Functions Virtualization (NFV)
  • Zero Trust
  • Serverless Architecture
  • Containers
  • Artificial Intelligence
  • Machine Learning

However, firewalls only guard against unauthorized entry or traffic on closed ports, not open ones. An unguarded port is the same as an unlocked gate, so extra security measures should be taken with caution now. Firmware flaws in firewalls are obviously outside the scope of this post.

3. A Closer Look at the Firewall’s Superheroic Abilities

While firewalls are useful for filtering, they can become a single point of failure if used as an IPS, DDoS protector, gateway antivirus, SSL VPN, or web proxy without any backup plans in place.

Once referred to as Unified Threat Management (UTM) systems, today’s iteration, defined as NGFW (next-generation firewall) systems, improves upon their predecessors in terms of functionality, productivity, and other metrics. A major company should not employ an NGFW to perform the duties of a security guard. There are additional solutions at the same layer that can be used for any other purpose; therefore, NGFWs should only be utilized for firewall-specific duties. However, if a robust backup plan is in place, a unified threat management (UTM) or next-generation firewall (NGFW) can serve the same purpose as several security technologies for a small or medium-sized business.

4. Firewall Software: Fortifying Networks with Robust Cyber Protection

Twelve different firewall programs exist solely in software form.

Software firewall is a firewall program that can be installed on any regular computer or host running any virtualization platform. Thus, a regular server can be converted into a firewall that operates similarly to hardware. However, physical firewalls cannot be replaced by software firewalls.

It is important to distinguish between the virtualized firewall idea used by cloud services and a software-firewall that is placed on a traditional server. Despite software firewalls, which rely on the server’s default settings, hardware firewalls contain their own dedicated networks, processing units, chips, RAM, storage, logic, and firmware. In addition, hardware firewalls have their settings fine-tuned to handle a connection to the best of their abilities. For instance, a processor type is a crucial part of hardware firewalls in order to delicately manage a connection. Nevertheless, a firewall relies on the hardware and software capabilities of the server that is where it is installed. Therefore, it is impossible to think of software firewalls in isolation from other server components. The effectiveness and security of firewalls are likewise impacted by this condition.

If you are in charge of an enterprise-level network, you should not rely on a software firewall but rather on a dedicated hardware firewall. In addition, you should never employ a software firewall solution to safeguard your network if you provide an internet-facing service. Knowing the capabilities and limitations of a cloud-based virtualized firewall system is essential before committing to its implementation. Moreover, its sole purpose is required to allow for individualization of firewalls.

5. Beyond Traditional Boundaries: Firewall as an SDN Controller

When discussing firewalls in a software-defined network (SDN), it is important to define SDN and explain what it is meant to accomplish.

  • Increased automation
  • Adaptability
  • Synchronization

Those features are made possible by a software-defined and software-controlled network architecture, such as that provided by SDN. OpenFlow is the primary protocol used, however others are additionally supported. Thus, the single most important aspect of SDN is the substitution of SDN switches or controllers for traditional firewalls. However, this is where we run into trouble. There is no way for an SDN firewall to act as a conventional firewall. The ‘stateful’ aspect of modern firewalls is an extremely important defining characteristic. The autonomous functionality is required regardless of whether it is not being used. In addition, the term “stateful firewall” can accurately describe modern firewalls.

A stateful firewall monitors and manages sessions by tracking data packets from their initial source all the way to their final destination. Throughout this end-to-end traffic management process, a state-driven firewall can perform some functionalities by tracking directions, routes, and the connection’s current state (synchronize, accessible, close, changed, create, recognize, etc.). With the purpose of enforcing security policies, it maintains a state table. All of these solutions operate on Layers 3–4 of the OSI stack, making ensuring that no unapproved, spoofed, or forged connections are made. Layer three (the network) must therefore be established as a rock-solid foundation for security.

By decoupling the network’s control and data planes, SDN creates a network architecture that runs entirely in software. Security services, including a firewall, are made more difficult by the split between the control and data planes. Because SDN routers can typically forward the first packet of an interaction to the controllers, relying on them to do packet inspection as part of a stateful firewall is problematic.

Image Credit: “SDFW: SDN-based Stateful Distributed Firewall

The delivery plane of the OpenFlow standard operates in a nearly stateless fashion, and the controller has very little access to packet-level data. This prevents it from functioning as a standalone connectivity analyzer apart from the controller. As a result, SDN firewalls have issues with stateful packet monitoring. That’s why the controller is overburdened, and more state must be stored among many controllers. In addition, OpenFlow employs connection states to formalize time-constrained flow principles. In other words, the entrance is left open while the specified time-out expires instead of engaging with the conventional session formation state. As a result, an adversary can complete an attack by waiting for the switches’ renewal timeout to expire.

SDN network firewalls, switches, and controllers typically use layers 4–7 of the OSI model. From a network security context, this means that you will likely see a loss of blocking capabilities at OSI Layer three. Considering they operate at a higher OSI layer, application layer and/or software control are going to become increasingly important.

Since not all SDN switches are stateful and many SDNs canoperate in a stateless fashion, they cannot offer the exact same type of security as a stateful firewall. Using the SDN regulations, service-chaining communication to a stateful packet analysis Network Functions Virtualization (NFV) firewall provides an extra layer of security. SDN systems require caution and a willingness to adapt security rules, guidelines, and procedures. It is the cutting edge!

6. Maximizing the Effectiveness of Firewalls: Addressing Poor Security Practices

Since firewalls are viewed as nothing more than a simple security instrument, configurations, regulations, and policies can easily be forgotten. This oversimplification is harmful to security in general. At the conclusion of the day, even the simplest regulation or strategy can prove to be a fatal flaw.

Therefore, here are a couple critical procedures to follow when managing firewalls:

6.1. ANY port rule. The absence of a “ANY port” rule from the rules is not a problem. If there is no firewall, then there is no protection of any kind. Loss of insight and an enlarged attack area can result, for instance, from applying an ANY port rule across several system subnets, IP addresses, and/or network interfaces.

6.2. ANY destination rule. Writing a rule that specifies “ANY destination” within a network requires extreme caution. If something is coming from “anywhere” it could do some serious damage wherever it goes. These kind of regulations ought to be maintained to a minimum, alongside additional security precautions serving as a check on their power.

6.3. Servers under the same IP segment and/or network. The firewall’s functionality is determined by its connection points. Up to 254 useable IPs (with CIDR “/24”) are associated with a network connection or segment. The firewall does not restrict communication between any of the computers or servers on this network.

Finally, micro-segmentation should be implemented to provide the finer-grained segmentation and visibility required in modern networks. This corrects the blind spot in the direction of monitoring within the identical network region.

7- Conclusion

As we conclude our exploration of firewall dynamics in cybersecurity, it becomes clear that perception and reality play pivotal roles in shaping our understanding and implementation of this crucial defense mechanism.

We have witnessed the challenges faced by organizations and individuals as they grapple with misconceptions and outdated notions surrounding firewalls, often leading to vulnerabilities and compromised security. It is imperative for cybersecurity professionals, decision-makers, and end-users alike to bridge the gap between perception and reality by staying informed, embracing technological advancements, and adopting a proactive approach to firewall management. By acknowledging the ever-evolving threat landscape, conducting regular risk assessments, and using next-generation firewall technologies, we can enhance our cybersecurity posture and effectively safeguard our digital assets. Additionally, education and awareness campaigns can help dispel common misconceptions, empowering users to make informed decisions and fostering a culture of cybersecurity vigilance.

Ultimately, the effectiveness of firewalls lies not only in their technical capabilities but also in our ability to perceive and understand their true dynamics. By aligning perception with reality, we can navigate the complex cybersecurity landscape with greater confidence, resilience, and the ability to adapt to emerging threats. Let us embrace the ongoing pursuit of knowledge, collaboration, and innovation to fortify our digital defenses and secure a safer digital future for all.

--

--

Ahmed
Ahmed

Written by Ahmed

I am interested in Data Science | Security Research | Cloud Computing https://mawgoud.medium.com/subscribe

Responses (2)