Firewall | Network Traffic |
Security Rules | Packet-Filtering Firewalls |
Stateful Inspection Firewalls | Proxy Firewalls |
Rule ID | Source IP/Range |
Data packets flowing into and out of a network, which can be monitored and filtered for security purposes. | A network security device that monitors and controls incoming and outgoing traffic based on set security rules. |
These firewalls inspect packets transmitted between networks and use predefined rules to allow or block traffic based on IP addresses, ports, and protocols, providing a basic level of security. | Predefined criteria that determine how traffic is allowed or denied through a firewall. |
These firewalls act as intermediaries between users and the services they access, offering additional features like content filtering, logging, and anonymity through request and response management. | These firewalls keep track of active connections and analyze the state of packets within the context of these connections, allowing for more sophisticated filtering compared to simple packet-filtering. |
The originating IP address or range from which traffic is allowed or denied. | A unique identifier for each firewall rule. |
Regulatory Compliance | |
The adherence to laws, regulations, guidelines, and specifications relevant to an organization’s business processes. | |