Logo Teldat
โ— Cybersecurity Glossary

What Is a Firewall?

A firewall is a network security device or software that monitors, filters, and controls incoming and outgoing network traffic based on predetermined security rules. Its primary purpose is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls inspect data packets in real time and determine whether to allow or block them, protecting organizations against unauthorized access, malware, and cyberattacks.

Firewall Definition

A firewall is a network security systemโ€”implemented as hardware, software, or bothโ€”that monitors and controls network traffic based on predefined security rules. It acts as a gatekeeper between an organization’s internal network and external networks, inspecting every data packet that attempts to enter or leave the network to determine whether it should be allowed through.

Organizations configure firewall rules to permit or deny traffic based on criteria such as source and destination IP addresses, port numbers, protocol type, and application identity. By enforcing these rules at the network perimeter and at internal segmentation points, firewalls prevent unauthorized access, block malicious traffic, and help contain threats that may have already breached outer defenses.

Key Fact: The global enterprise firewall market was valued at $13.45 billion in 2024 and is projected to reach $34.43 billion by 2033, growing at a CAGR of 11.01% (Straits Research, 2025). This growth reflects the critical role firewalls play as the cornerstone of modern cybersecurity strategy.

Firewalls are foundational to network security and form part of a broader defense-in-depth strategy that includes intrusion prevention systems (IPS), endpoint detection and response (EDR), secure web gateways (SWG), and extended detection and response (XDR) platforms. A firewall does not only protect against external threatsโ€”modern firewalls also regulate east-west traffic between internal network segments, preventing lateral movement by attackers who have gained initial access. This capability is essential for implementing zero trust network architectures.

How Does a Firewall Work?

Firewalls work by sitting at strategic points in the networkโ€”typically at the perimeter between a private network and the public internet, or between internal segmentsโ€”and inspecting all traffic that passes through. The inspection process involves several techniques, depending on the type and generation of the firewall.

Packet Filtering

The most basic firewall mechanism examines individual data packets and compares their header information (source IP, destination IP, port number, protocol) against a set of predefined rules. If a packet matches an allow rule, it passes through; if it matches a deny rule or no rule at all, it is dropped. Packet filtering is fast but limited because it does not track the state of connections or inspect packet contents.

Stateful Inspection

Stateful firewalls maintain a state table that tracks active connections and their characteristics. Rather than evaluating each packet in isolation, the firewall understands whether a packet belongs to an established, legitimate connection. This makes stateful inspection significantly more secure than simple packet filtering.

Deep Packet Inspection (DPI)

Advanced firewallsโ€”particularly NGFWsโ€”perform deep packet inspection, analyzing not just packet headers but the actual content (payload) of data packets. DPI can identify specific applications, detect malware signatures, discover encapsulated protocols, and block threats hidden within seemingly legitimate traffic. This layer-7 inspection capability is what distinguishes NGFWs from their predecessors.

Proxy-Based Filtering

Proxy firewalls act as intermediaries between internal users and external services. Instead of allowing direct connections, the proxy receives the request, inspects it at the application layer, and then initiates a separate connection to the destination on behalf of the user. This prevents direct contact between internal and external systems.

Types of Firewalls

Firewalls can be classified by their architecture, inspection method, and deployment model. Understanding the different types helps organizations choose the right firewall technology for their specific security needs.

1
Packet Filtering Firewall
Operates at layers 3-4 of the OSI model. Inspects individual packets against static rules based on IP addresses, ports, and protocols. Fast and efficient but cannot inspect packet content or track connection states.
2
Stateful Inspection Firewall
Tracks active network connections in a state table. Evaluates packets in the context of their connection, blocking traffic that does not belong to a legitimate session. Offers significantly stronger security than packet filtering.
3
Proxy Firewall (Application-Level Gateway)
Acts as an intermediary between users and external networks. Inspects traffic at the application layer (layer 7), providing deep content analysis. Prevents direct connections between internal and external systems.
4
Next-Generation Firewall (NGFW)
Combines stateful inspection with deep packet inspection, application awareness, integrated IPS, SSL/TLS decryption, sandboxing, and threat intelligence. Provides layer 3-7 visibility and control in a single platform. The NGFW market reached $5.82 billion in 2024 (Fortune Business Insights).
5
Cloud Firewall / Firewall as a Service (FWaaS)
Delivered as a cloud service, typically part of a SASE architecture. Provides NGFW-level inspection without on-premises hardware. The FWaaS market is projected to grow from $4.71B in 2025 to $28.89B by 2034 (Precedence Research).
6
Embedded / SD-WAN Firewall
NGFW capabilities integrated directly into SD-WAN network equipment. Traffic is inspected locally at each branch before reaching the internet, improving both performance and security without deploying separate appliances.

Evolution of Firewall Technology

Firewall technology has undergone continuous evolution since its inception in the late 1980s. Each generation has addressed the limitations of its predecessors while adapting to increasingly sophisticated threat landscapes.

1st Generation โ€” Packet Filtering (Late 1980s)

The earliest firewalls examined individual packets against static rules based on IP addresses, ports, and protocols. They provided basic access control but could not understand the context of network sessions or inspect packet payloads.

2nd Generation โ€” Stateful Inspection (Early 1990s)

Introduced by AT&T Bell Labs engineers, stateful firewalls tracked the state of active connections, allowing more intelligent decisions by understanding whether a packet belonged to an existing, legitimate sessionโ€”a major advance in accuracy and security.

3rd Generation โ€” Application-Layer Gateways (Mid-1990sโ€“2000s)

Proxy-based firewalls began inspecting traffic at layer 7 of the OSI model, allowing filtering based on application-specific protocols such as HTTP, FTP, and DNS. This provided deeper content analysis but often at the cost of throughput.

4th Generation โ€” Next-Generation Firewalls (2010s)

NGFWs combined stateful inspection with deep packet inspection (DPI), application awareness, integrated IPS, SSL/TLS decryption, and threat intelligence. This generation brought all critical security functions into a single platform.

5th Generation โ€” Cloud-Native & SASE-Integrated (2020sโ€“Present)

Modern firewalls are delivered as cloud services (FWaaS) within SASE platforms, embedded into SD-WAN equipment, and integrated with XDR and Zero Trust architectures. This generation addresses the shift to remote work, multi-cloud environments, and the dissolution of the traditional network perimeter.

Traditional Firewall vs. Next-Generation Firewall (NGFW)

While both firewall types share basic functionsโ€”stateful packet filtering, VPN support, and NATโ€”the differences are substantial.

Capability Traditional Firewall NGFW
OSI Layers Layers 3โ€“4 Layers 3โ€“7
Stateful Packet Filtering โœ“ โœ“ + DPI
Application Control โœ— โœ“ Layer 7
Integrated IPS/IDS โœ— Separate device โœ“ Native
TLS/SSL Inspection โœ— โœ“
User-Based Policies โœ— IP only โœ“ Active Directory
Virtual Patching โœ— โœ“
Antimalware Protection โœ— External solution โœ“ Integrated (AI/ML)
Threat Intelligence โœ— โœ“ Real-time feeds
Sandboxing โœ— โœ“

In summary: a traditional firewall checks where traffic goes; an NGFW also examines which application generates it, who sends it, what it contains, and whether it poses a risk. This comprehensive visibility is essential to protect corporate networks against current threats, where more than 80% of attacks occur at the upper layers of the OSI model.

Key Benefits of Firewalls

Deploying firewalls as part of an enterprise security strategy delivers measurable improvements in threat prevention, network visibility, and regulatory compliance:

1
Threat Prevention
Block malicious traffic before it reaches internal systemsโ€”viruses, phishing, ransomware, and DoS attacks. NGFWs extend protection to application-layer threats.
2
Network Visibility & Traffic Control
Granular visibility into traffic, identifying applications, users, and devices. Enables precise access policies and rapid anomaly detection.
3
Regulatory Compliance
Meet requirements under PCI DSS, HIPAA, GDPR, and NIS2 by controlling access to sensitive data, logging traffic, and enforcing security policies.
4
Network Segmentation & Zero Trust
Enable microsegmentation to contain breaches and prevent lateral movementโ€”a core principle of zero trust architectures where no user or device is implicitly trusted.
5
Secure Remote Access
VPN and ZTNA capabilities provide encrypted, authenticated access for remote workers without compromising the security perimeter.
6
AI-Enhanced Threat Detection
Machine learning and threat intelligence identify zero-day threats, encrypted malware, and unknown attack patterns in real time, continuously updating protection.

Teldat Firewall Solutions: be.Safe Pro

Teldat’s be.Safe Pro is a unified SASE platform that delivers Next-Generation Firewall (NGFW) capabilities across on-premises, cloud, and embedded deployments. Designed for distributed enterprise networks, it integrates security directly into Teldat’s SD-WAN equipment, providing a first line of defense at every branch without the need for separate security appliances.

Core NGFW Capabilities

Teldat’s NGFW engine implements traffic policies from layer 4 to layer 7 of the OSI model, enabling granular control over both internet-bound and inter-branch traffic. By integrating with Active Directory, be.Safe Pro enhances firewall rules with user identity awareness.

Secure Web Gateway (SWG)

be.Safe Pro includes an advanced Secure Web Gateway with 84 browsing categories and more than 4,000 application decoders. Web filtering, URL categorization, and application control work together to block malicious sites, phishing attempts, and unauthorized applications.

Intrusion Prevention System (IPS/IDS)

The integrated IPS/IDS engine monitors traffic in real time to detect and block exploits, brute-force attacks, SQL injections, XSS, and C2 communications. It leverages machine learning and threat intelligence to continuously update its databases.

Virtual Patching

be.Safe Pro provides virtual patching capabilities, protecting vulnerable systems through ad-hoc signatures even before a vendor security update is released. Essential for OT infrastructures and critical production servers.

Flexible Deployment Models

As an embedded NGFW, it integrates into Teldat SD-WAN routers (from small offices to 10+ Gbps data centers). As cloud-based SSE (FWaaS), be.Safe Pro SSE provides private cloud instances with no shared IPs. All managed through a single unified console with a “pay as you grow” model.

Security Certifications: Teldat’s router and firewall families are included in the CPSTIC catalog (Spain’s CCN). Solutions hold “Qualified” and “Approved” status in Perimeter Protection with the highest ENS category (Alta). Platforms are certified for all classification levels including NATO and National. Firewall solutions are approved for NATO Restricted and Difusiรณn Limitada classified information.

Frequently Asked Questions about Firewalls

โฏ What is a firewall in simple terms?

A firewall is a security system that acts as a barrier between your internal network and external threats like the internet. It monitors all incoming and outgoing traffic and decides whether to allow or block specific data packets based on predefined security rules. Think of it as a security guard checking every person entering or leaving a building.

โฏ What is the difference between a traditional firewall and an NGFW?

A traditional firewall operates at layers 3 and 4 of the OSI model, filtering traffic by ports, protocols, and IP addresses. An NGFW adds inspection up to layer 7 (application), enabling it to identify applications regardless of port, detect hidden threats using DPI, and apply granular policies based on user identity and application behavior.

โฏ Do I still need a firewall if I have antivirus software?

Yes. Antivirus detects malware on devices; firewalls prevent unauthorized traffic from entering or leaving the network. Modern security requires both, plus IPS, web filtering, and endpoint detection. Teldat’s be.Safe Pro integrates NGFW, IPS, and SWG in a single platform.

โฏ What are the main types of firewalls?

The main types include: Packet Filtering Firewalls, which inspect packets by IP and port; Stateful Inspection Firewalls, which track connections; Proxy Firewalls, which act as intermediaries; NGFWs, which combine DPI, IPS, and application control; and Cloud Firewalls (FWaaS) delivered as part of SASE architectures.

โฏ How has firewall technology evolved over time?

1st Generation (late 1980s): packet filtering. 2nd Generation (early 1990s): stateful inspection. 3rd Generation (2000s): application-layer gateways. 4th Generation (2010s): NGFWs with DPI, IPS, SSL decryption. Today: cloud-delivered FWaaS within SASE platforms, integrated with XDR and zero trust.

โฏ What is Firewall as a Service (FWaaS)?

FWaaS delivers NGFW capabilities as a cloud service without local hardware. Traffic is redirected to the cloud platform for inspection before reaching its destination. FWaaS is a fundamental SASE component, ideal for remote workers and distributed environments. Teldat’s be.Safe Pro SSE provides FWaaS with full NGFW capabilities.

โฏ Is a firewall sufficient to protect my organization?

No. Firewalls are foundational but should be part of a broader defense-in-depth strategy including EDR, XDR, SWG, ZTNA, and security awareness training. Teldat’s be.Safe ecosystem integrates these capabilities into a unified platform.

Protect Your Network with Teldat’s Firewall Solutions

Deploy a next-generation firewall with the performance and capabilities your organization needs. Teldat’s be.Safe Pro integrates NGFW, IPS, application control, and advanced threat protection in a single platform.