To the network, a stealth firewall is part of the wire.īoth firewall types examine traffic moving in both directions (between the protected and the unprotected side of the network) and accept or reject packets based on user-defined sets of policies. Stealth firewalls have no presence on the network they are not assigned an IP address and cannot be addressed or seen by other devices on the network. Regular firewalls have a presence on the network they are assigned an IP address that allows them to be addressed as a device and seen by other devices on the network. The two basic types of firewalls are as follows:
A firewall can modify a packet before passing it through or send it through unaltered. When a firewall accepts a packet from one side (the Internet), it sends the packet through to the other side (the intranet). Understanding How Firewalls WorkĪ firewall forms a physical barrier between two parts of a network, for example, the Internet and an intranet. The firewall then allows or denies transmission of individual packets across its interfaces. All packets belonging to a particular connection must go through the same firewall. Configuring Stateful Firewall Connection Remappingįirewall load balancing allows you to scale firewall protection by distributing traffic across multiple firewalls on a per-connection basis.
Configuring Reverse-Sticky for Firewalls.Configuring Regular Firewall Load Balancing.