Next Generation-Firewalls

A next-generation firewall (NGFW) is a security appliance that processes network traffic and applies rules to block potentially dangerous traffic. NGFWs evolve and expand upon the capabilities of traditional firewalls. They do all that firewalls do, but more powerfully and with additional features.

Consider two airport security agencies. One check to ensure passengers are not on no-fly lists, that their identities match what is listed on their tickets, and that they are going to destinations the airport serves. In addition to checking no-fly lists, the second inspects what the passengers carry, ensuring they do not have dangerous or disallowed items. The first agency keeps airports secure from obvious threats; the second also identifies threats that may be less obvious.

An ordinary firewall is like the first security agency: it blocks or allows data (passengers) based on where it is going, whether or not it is part of a legitimate network connection, and where it comes from. An NGFW is more like the second security agency: it inspects data on a deeper level to identify and block threats that may be hidden in normal-seeming traffic.

What capabilities does an NGFW have?

NGFWs can do everything that regular firewalls can do. This includes:

  • Packet filtering: Inspecting each data packet and blocking dangerous or unexpected packets. Packet filtering is explained more below.
  • Stateful inspection: Look at packets in context to ensure they are part of a legitimate network connection.
  • VPN awareness: Firewalls can identify encrypted VPN traffic and allow it through.

NGFWs also add several capabilities that older firewalls do not have. NGFWs use deep packet inspection (DPI) in addition to packet filtering. And according to Gartner, a global research and advisory firm, an NGFW includes:

  • Application awareness and control
  • Intrusion prevention
  • Threat intelligence
  • Paths for upgrading to add future information feeds
  • Techniques to address evolving security threats

These capabilities are explained in detail below.

Most of these features are possible because, unlike regular firewalls, NGFWs can process traffic at several layers in the OSI model, not just layers 3 (the network layer) and 4 (the transport layer). NGFWs can look at layer 7 HTTP traffic and identify which applications are in use, for instance. This is an essential capability because layer 7 (the application layer) is increasingly used for attacks to get around the security policies applied at layers 3 and 4 by traditional firewalls.

(To learn more about the OSI layers, see What is the OSI model?)

What are packet filtering and deep packet inspection (DPI)?

Packet filtering

All data that traverses a network or the Internet is broken down into smaller pieces called packets. Because these packets contain the content that enters a network, firewalls inspect them and block or allow them to prevent malicious content (such as a malware attack) from getting through. All firewalls have this packet filtering capability.

Packet filtering works by inspecting the source and destination IP addressesports, and protocols associated with each packet — in other words, where each packet comes from, where it is going, and how it will get there. Based on this assessment, firewalls allow or block packets, filtering out the disallowed packets.

For example, attackers sometimes try to exploit vulnerabilities associated with the Remote Desktop Protocol (RDP) by sending specially crafted packets to the port used by this protocol, port 3389. However, a firewall can inspect a packet, see which port it is going to, and block all packets directed at that port — unless they are from a specifically allowed IP address. This involves inspecting network traffic at layers 3 (to see source and destination IP addresses) and 4 (to see the port).

Deep packet inspection (DPI)

NGFWs improve upon packet filtering by instead performing deep packet inspection (DPI). Like packet filtering, DPI inspects every packet to see the source and destination IP address, source and destination port, etc. This information is all contained in the layer 3 and layer 4 headers of a packet.

But DPI also inspects each packet’s body, not just the header. Specifically, DPI checks packet bodies for malware signatures and other potential threats. It compares the contents of each packet to the contents of known malicious attacks.

What is application awareness and control?

NGFWs block or allow packets based on which application they are going to. They do so by analyzing traffic at layer 7, the application layer. Traditional firewalls do not have this capability because they only analyze traffic at layers 3 and 4.

Application awareness allows administrators to block potentially risky applications. If an application’s data cannot get past the firewall, it cannot introduce threats into the network.

According to Gartner’s definitions of the terms, both this capability and intrusion prevention (described below) are elements of DPI.

What is intrusion prevention?

Intrusion prevention analyzes incoming traffic, identifies known and potential threats, and blocks those threats. Such a feature is often called an intrusion prevention system (IPS). NGFWs include IPSes as part of their DPI capabilities.

IPSes can use several methods to detect threats, including:

  • Signature detection: Scanning the information within incoming packets and comparing it to known threats
  • Statistical anomaly detection: Scanning traffic to detect unusual changes in behavior, as compared to a baseline
  • Stateful protocol analysis detection: Similar to statistical anomaly detection, but focused on the network protocols in use and comparing them to typical protocol usage

What is threat intelligence?

Threat intelligence is information about potential attacks. Because attack techniques and malware strains continually change, up-to-date threat intelligence is crucial for blocking those attacks. NGFWs can receive and act on threat intelligence feeds from external sources.

Threat intelligence keeps IPS signature detection effective by providing the latest malware signatures.

Threat intelligence can also supply IP reputation information. “IP reputation” identifies IP addresses where attacks (especially bot attacks) often come from. A feed of IP reputation threat intelligence provides the latest known bad IP addresses, which an NGFW can then block.

Are next-gen firewalls hardware-based or software-based?

Some NGFWs are hardware appliances designed to defend an internal private network. NGFWs can also be deployed as software but do not need to be software-based to be considered next-generation.

Finally, an NGFW can be deployed as a cloud service called a cloud firewall or firewall-as-a-service (FWaaS). FWaaS is a significant secure access service edge (SASE) networking model component.