Skip to main content
Glossary - Security Profiles: Firewall

Learn more about Firewall security profile technical terms.

Updated over a month ago

Getting to know the terms and technical glossary for a feature in an app can help you better understand the feature.

Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Packet Filtering: A method used by firewalls to control network access by examining packets and allowing or blocking them based on source and destination IP addresses and port numbers.

Stateful Inspection: A firewall technology that keeps track of the state of active connections and makes decisions based on the context of the traffic.

Proxy Firewall: A type of firewall that acts as an intermediary between users and the internet, filtering requests and responses.

Next-Generation Firewall (NGFW): An advanced firewall that includes features like application awareness, intrusion prevention systems, and deep packet inspection.

Demilitarized Zone (DMZ): A physical or logical subnetwork that contains and exposes external-facing services to an untrusted network, typically the internet.

Intrusion Prevention System (IPS): A network security device that monitors network and system activities for malicious activities or policy violations and can take action to prevent them.

Virtual Private Network (VPN): A secure connection that encrypts data traveling over the internet, often used in conjunction with firewalls for remote access.

Application Layer Firewall: A firewall that filters traffic at the application layer (Layer 7 of the OSI model) and can inspect the content of the data packets.

Access Control List (ACL): A set of rules that determines which traffic can enter or exit a network, often used in firewall configurations.

NAT (Network Address Translation): A method that modifies network address information in packet headers while in transit, allowing multiple devices on a local network to share a single public IP address.

Zone-Based Firewall: A firewall architecture that segments the network into different zones, applying security policies to traffic between zones.

Logging and Monitoring: The process of recording and analyzing firewall activities to detect and respond to potential security threats.

Threat Intelligence: Information that helps organizations understand and respond to cyber threats, often used to enhance firewall effectiveness.

Bypass: A method of circumventing a firewall's security controls, often used by attackers to gain unauthorized access to networks.

False Positive: An alert generated by a firewall indicating a threat when there is none, which can lead to unnecessary investigation or action.

Policy Management: The process of defining, implementing, and enforcing rules and policies that govern firewall behavior and security.

High Availability (HA): A configuration that ensures a firewall system remains operational and accessible, even in the event of a failure.

Encryption: The process of encoding data to prevent unauthorized access, often used in conjunction with firewalls to secure communications.

Denial of Service (DoS): A type of cyberattack aimed at making a service unavailable by overwhelming it with traffic, which firewalls are often designed to mitigate.

Did this answer your question?