BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.
NGFWs typically feature advanced functions including:
- application awareness;
- integrated intrusion prevention systems (IPS);
- identity awareness -- user and group control;
- bridged and routed modes; and
- the ability to use external intelligence sources.
Like the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.
Next-generation firewall features
NGFWs combine many of the capabilities of traditional firewalls -- including packet filtering, network address translation (NAT) and port address translation (PAT), URL blocking, and virtual private networks (VPNs) -- with quality of service (QoS) functionality and other features that are not found in traditional firewalls. These include intrusion prevention, SSL and SSH inspection, deep-packet inspection, and reputation-based malware detection, as well as application awareness.
These application-specific capabilities are meant to thwart the growing number of application attacks taking place at Layers 4-7 of the OSI network stack.
Benefits of next-generation firewalls
The different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.
NGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.
Next-generation firewall vs. traditional firewall
While both NGFW and traditional firewalls aim to serve the same purpose of protecting an organization's network and data assets, they also have several differences.
The main similarities include static packet filtering to block packets at the point of interface to network traffic. They also both have the capability to provide stateful packet inspection, network and port address translations, and both can set up VPN connections.
One of the most important differences between traditional and next-generation firewalls is that NGFWs offer a deep-packet inspection function that goes beyond simple port and protocol inspection by inspecting the data carried in network packets. Other key differences are that NGFWs add application-level inspection, intrusion prevention and the ability to act on data provided by threat intelligence services.
Furthermore, NGFWs extend the traditional firewall functionality of NAT, PAT and VPN support to operate both in routed mode -- in which the firewall behaves as a router -- and transparent mode -- in which the firewall behaves like a bump in the wire when it scans packets -- while also integrating new threat management technologies.
Continue Reading About next-generation firewall (NGFW)
- Innovating IT while reducing legacy complexity, with HPE SimpliVity –HPE
- Merge Old and New IT with Converged Infrastructure –Pure Storage
- See More
- Thwarting Sophisticated Attacks with Today’s Firewalls –SearchSecurity.com
- How the Basics of Network Security Have Evolved –Fortinet, Inc.