This article was automatically translated from the original Turkish version.
A firewall is a software and/or hardware-based security mechanism that monitors and controls incoming and outgoing network traffic according to a defined security policy. Its primary purpose is to protect a private network from unauthorized access, malicious software, and network attacks originating from the external world, such as the internet.
Firewalls operate by filtering data packets based on specific rules. These rules are configured according to characteristics such as the source IP address, destination IP address, port number, and protocol type. These controls are grounded in two fundamental security approaches:
In enterprise networks, these two approaches are often implemented in combination. Strict rules are applied to areas such as DMZ (Demilitarized Zone), while user internet access may be governed by more lenient rules.
Firewalls are classified according to the following technical architectures:
Filtering is performed solely based on header information such as IP address, port, and protocol. Previous connection states are not considered. It is simple and fast but weak in detecting attacks.
Decisions are made based on connection states. The firewall tracks whether a connection has been initiated and whether a session is still active. It is more secure but consumes more processor and memory resources.
Acts as an intermediary between client and server, inspecting traffic at the application level. Used for protocols such as HTTP, FTP, and SMTP. Provides content filtering and user authentication. Can operate in transparent or non-transparent modes.
Monitors TCP sessions without examining packet contents. SOCKS protocol is an example. Operates at the connection layer and provides low-level filtering.
Enhances privacy by preventing private IP addresses from being visible externally. Although primarily used for address management, it also contributes to security.
Modern firewalls are integrated with the following services:
The performance of firewalls should not be assessed solely by network parameters such as bandwidth or number of sessions, but also by their effectiveness in blocking malicious traffic. Filter coverage can be measured by integrating with independent blacklisting providers’ IP data. Additionally, effectiveness can be evaluated by deploying firewalls alongside multi-port IDS systems.
Firewalls must be configured in accordance with an organization’s access control policy. It must be clearly defined who can access which services, when, and in which direction. This is achieved through access control lists (ACLs), time-based rules, and user authentication mechanisms. Network security policies must be documented in writing and integrated with all system components.
Although firewalls form a strong defense line, they have certain limitations:
Firewalls are one of the fundamental security components in modern computer networks. These systems, which operate at different levels and through various methods, are indispensable for filtering network traffic, enforcing access control, and preserving system integrity. However, mere installation is insufficient for effective use; they must be supported by robust security policies, up-to-date threat intelligence, and continuous monitoring processes.
Working Principles and Approaches
Components and Types
Static Packet Filtering (Stateless Packet Filtering)
Dynamic Packet Filtering (Stateful Packet Filtering)
Application Layer Gateways (Application Proxy Firewalls)
Circuit-Level Gateways
NAT (Network Address Translation)
Integrated Services
Effectiveness and Performance Measurement
Alignment with Security Policies
Limitations