Getting to know the terms and technical glossary for a feature in an app can help you better understand the feature.
Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Packet Filtering: A method used by firewalls to control network access by examining packets and allowing or blocking them based on source and destination IP addresses and port numbers.
Stateful Inspection: A firewall technology that keeps track of the state of active connections and makes decisions based on the context of the traffic.
Proxy Firewall: A type of firewall that acts as an intermediary between users and the internet, filtering requests and responses.
Next-Generation Firewall (NGFW): An advanced firewall that includes features like application awareness, intrusion prevention systems, and deep packet inspection.
Demilitarized Zone (DMZ): A physical or logical subnetwork that contains and exposes external-facing services to an untrusted network, typically the internet.
Intrusion Prevention System (IPS): A network security device that monitors network and system activities for malicious activities or policy violations and can take action to prevent them.
Virtual Private Network (VPN): A secure connection that encrypts data traveling over the internet, often used in conjunction with firewalls for remote access.
Application Layer Firewall: A firewall that filters traffic at the application layer (Layer 7 of the OSI model) and can inspect the content of the data packets.
Access Control List (ACL): A set of rules that determines which traffic can enter or exit a network, often used in firewall configurations.
NAT (Network Address Translation): A method that modifies network address information in packet headers while in transit, allowing multiple devices on a local network to share a single public IP address.
Zone-Based Firewall: A firewall architecture that segments the network into different zones, applying security policies to traffic between zones.
Logging and Monitoring: The process of recording and analyzing firewall activities to detect and respond to potential security threats.
Threat Intelligence: Information that helps organizations understand and respond to cyber threats, often used to enhance firewall effectiveness.
Bypass: A method of circumventing a firewall's security controls, often used by attackers to gain unauthorized access to networks.
False Positive: An alert generated by a firewall indicating a threat when there is none, which can lead to unnecessary investigation or action.
Policy Management: The process of defining, implementing, and enforcing rules and policies that govern firewall behavior and security.
High Availability (HA): A configuration that ensures a firewall system remains operational and accessible, even in the event of a failure.
Encryption: The process of encoding data to prevent unauthorized access, often used in conjunction with firewalls to secure communications.
Denial of Service (DoS): A type of cyberattack aimed at making a service unavailable by overwhelming it with traffic, which firewalls are often designed to mitigate.