Please compare and contrast the role of an inbound firewall vs. an outbound firewall. In what ways does the role of each type of device affect how it should be configured?
Simply put, an inbound firewall protects the network against incoming traffic from the Internet or other network segments, namely disallowed connections, malware and denial-of-service attacks. An outbound firewall protects against outgoing traffic originating inside an enterprise network. Often a single firewall can serve both functions. The configuration of such firewalls is business, network and risk-specific so the configuration for, say, a manufacturing business's firewall will likely be a lot different than that of a cloud service provider's firewall. Traditional, customizable rules allow specific ports, services and IP addresses to connect in or out.
Ask the expert
Have a question about network security? Send it via email today! (All questions are anonymous.)
Sometimes a dedicated firewall appliance is used for outbound traffic because of the specialized filtering technologies needed. Such systems often perform specialized functions like content filtering for email or Web browsing. They tie into the business's directory service (e.g., Active Directory and Lightweight Directory Access Protocol) so they can provide access, filtering and reporting based on each user's network account. Other firewall systems look for outbound malware and security-related threats.
It's actually rare to see outbound firewalling take place because of the complexities that it introduces into the network. Oftentimes outbound firewalls interrupt application traffic, disrupt business workflows and get users upset unless close attention has been paid to configuring the firewall in just such a way to allow everything to work. However, in certain cases, businesses might need to filter outbound traffic. For example, outbound firewalling can be beneficial in very locked-down environments that control network behavior down to the host level. Alternately, certain data loss prevention technologies may need an outbound firewall to protect specific information on the host.
Be it inbound or outbound firewalling, you have to not only focus on the system configuration but also make sure you're monitoring for system anomalies. Even the most secure firewalls can only do so much.
Related Q&A from Kevin Beaver, Network Security
Employees who work on-the-go rely on Wi-Fi access to get work done, but are those connections secure? Expert Kevin Beaver explains how to achieve ...continue reading
The Pwn Phone can reportedly detect network vulnerabilities instantly, but its use in the enterprise is questionable. Kevin Beaver explains.continue reading
Recent data shows that more than 50% of all networking devices are aging or obsolete and pose a security risk to the enterprise. Expert Kevin Beaver ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.