Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Firewall

A network security device or software that monitors and controls incoming and outgoing traffic based on predefined rules.

A firewall is a security mechanism that sits between trusted and untrusted networks, inspecting traffic and enforcing rules about what is allowed to pass through. Firewalls operate at various layers of the network stack, from simple packet filters that examine IP addresses and ports to sophisticated web application firewalls (WAFs) that analyze HTTP request content.

How It Works

Traditional network firewalls work at the transport layer, making allow or deny decisions based on source and destination IP addresses, ports, and protocols. A typical rule might allow inbound TCP traffic on port 443 (HTTPS) while blocking everything else. Stateful firewalls track active connections and make decisions based on the state of the traffic flow, not just individual packets.

Web Application Firewalls (WAFs) operate at the application layer, inspecting the content of HTTP requests and responses. They look for attack patterns like SQL injection payloads, cross-site scripting attempts, and path traversal sequences. WAFs use signature-based detection, behavioral analysis, and rule sets to identify malicious requests before they reach the application.

Cloud environments typically implement security groups and network access control lists that function as virtual firewalls. These define which resources can communicate with each other and which ports are exposed to the internet. Proper configuration requires understanding the principle of least privilege: only open what is strictly necessary.

Why It Matters

Firewalls are a critical layer of defense, but they are not a substitute for secure application code. WAFs can be bypassed through encoding tricks, payload fragmentation, and novel attack patterns that do not match existing signatures. During security assessments, testers often identify WAF bypass techniques that allow malicious payloads to reach the application.

Misconfigured firewalls are a frequent finding. Overly permissive rules, forgotten exceptions, and default-allow policies undermine the entire purpose of the firewall. Regular rule audits and the principle of least privilege are essential to maintaining effective firewall protection.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment