How to Troubleshoot a Firewall | Firewall Issues & Solutions

5 min. read

The most common firewall issues can range from minor misconfigurations to significant hardware failures.

The firewall troubleshooting process involves auditing the firewall to identify issues, determining traffic flow, and using troubleshooting tools to diagnose connectivity or performance problems.

Once identified, firewall issues are addressed, followed by ongoing maintenance for optimal operation.

What are the most common firewall issues?

The most common firewall issues include:

  • Misconfiguration errors
  • Software vulnerabilities
  • Hardware issues
  • Connectivity issues
  • Performance issues
  • Missing or inadequate firewall policies

Top common firewall issues

Fortunately, all firewall issues have solutions. By knowing how to recognize common problems and taking proactive measures, you can ensure your firewalls operate correctly and continue to provide proper network protection.

Let's dive into the details of both firewall issues and their solutions.

Misconfiguration errors

Common firewall misconfiguration mistakes

Misconfiguration is well known as the leading cause of firewall failures.

This can happen if firewall rules are not properly set, which leads to vulnerabilities, and eventually, unauthorized access.

Like this:

Firewall misconfiguration attack example

Allowing unnecessary services, not disabling unused ports, or misconfiguring IP addresses can also open your network to attacks.

Solution: To avoid these issues, always ensure that your firewall settings are correctly configured and regularly audited.

Software vulnerabilities

Like any software, firewalls can have vulnerabilities. Hackers can exploit these weaknesses to gain unauthorized access to your network.


Software vulnerabilities were behind the largest-scale attack campaigns in 2023, leading the charge in terms of ways attackers gain access.

In 11.5% of the incidents, insufficient patch management was a contributing factor.

-Palo Alto Networks Unit 42 Incident Response Report 2024


Needless to say, keeping your firewall software up to date with the latest patches and updates is crucial. It’s only a matter of time–unpatched vulnerabilities on internet-facing systems will be exploited.

Solution:

  • Measure and reduce your attack surface.
  • Regularly check for updates from your firewall vendor and apply them promptly to mitigate risks.

Hardware issues

Hardware problems affect firewall performance.

Firewalls running on outdated or overloaded hardware can cause network slowdowns and failures. Which means negatively impacted business operations.

Firewalls running on overloaded hardware, leading to a network slowdown

Solution: If your firewall hardware is underperforming, consider upgrading to higher-capacity devices.

Connectivity issues

Firewalls can sometimes block legitimate traffic, and that leads to connectivity issues.

A firewall block legitimate traffic due to excessively restrictive firewall rules, leading to connectivity issues

This can happen if firewall rules are too restrictive or improperly configured.

Solution:

  • Ensuring your firewall rules are well-defined and tested can prevent unnecessary connectivity problems.
  • Lean on firewall monitoring and analysis tools to identify and resolve these issues, such as:
    • Centralized management tools
    • Analytics and monitoring tools
    • Firewall policy optimizers

Performance issues

Performance issues can arise from complex firewall rules or high network traffic.

Solution:

  • Load balancing can help distribute network traffic more evenly, reducing the load on your firewall and enhancing overall network performance.
  • Simplifying firewall rules and optimizing network traffic can also improve performance.

    For example:

    This firewall rule has many conditions (e.g. multiple ports, specific subnets, etc). Which makes it difficult to manage, troubleshoot, and maintain.

    Allow TCP traffic 192.192.1.2/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.4/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.5/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.8/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.6/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.11/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.21/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.32/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.41/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    Allow TCP traffic 192.192.1.66/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
    with logging for every successful and failed connection attempt.


    Let’s simplify it, like so:

    Allow HTTP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 80 and 443, with logging for failed connection attempts.
    Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 8080 with logging for failed connection attempts.
    Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 8443 with logging for failed connection attempts.
    Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 8080 with logging for failed connection attempts.
    Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 9433 with logging for failed connection attempts.

    The updated rule focuses on the core requirement—allowing HTTP/HTTPS traffic between the two networks—and logs only the necessary information, with individual rules to troubleshoot. And that reduces complexity without sacrificing essential security or functionality.

Missing or inadequate firewall policies

Having clear and comprehensive firewall policies is key. Without proper policies, your firewall might not protect the network effectively.

Plus, missing or inadequate policies can lead to security breaches and non-compliance with industry regulations.

Solution: Ensure that your firewall policies are well-documented, regularly reviewed, and updated to reflect the latest security best practices.

Now that we’ve identified the main sorts of firewall issues you might come across, let’s move onto the actual firewall troubleshooting process.


Further reading: What Is Firewall Configuration? | How to Configure a Firewall


How to troubleshoot a firewall

How to troubleshoot firewall

Troubleshooting a firewall generally includes seven primary steps:

  1. Knowing your troubleshooting tools
  2. Auditing the firewall
  3. Identifying the issue
  4. Determining traffic flow
  5. Addressing connectivity issues
  6. Resolving performance issues
  7. Maintenance

Combined, firewall troubleshooting steps make up a systematic approach to identifying and resolving issues.

Let's walk through each.

Step 1: Know your troubleshooting tools

A good place to start when troubleshooting your firewall is simply being aware of the different diagnostic tools you have at your disposal.

With logs, monitoring tools, and network testing utilities, you can identify where issues may exist and use that information to guide the troubleshooting process.

Here are a few common tools and tactics that can assist in troubleshooting firewall issues:

  • Event logs: Event logs provide insights into what’s happening within your firewall.
  • Debugging tools: These can help identify specific issues and analyze the behavior of the firewall.
  • SNMP monitoring: Useful for performance issues and monitoring CPU usage.
  • Connectivity tests: Use ICMP or UDP packets to check network and internet connections.
  • Router & IP address verification: Ensure ARP tables and subnet configurations are accurate.

Knowing what you’ve got and relying on the right tools allows you to approach next steps with more insight and focus.

Step 2: Audit your firewall

Start by auditing both the hardware and software of your firewall (depending on the product you’re using). A thorough audit will help you understand the current state of your firewall and spot any discrepancies.

Make sure your firewall rules, software updates, and hardware settings are in line with security policies.

Strata Cloud Manager unified policy management

Policy management software can assist in ensuring that your security policies are comprehensive and up-to-date. Above is an example of the user experience provided by Strata Cloud Manager.

These sorts of tools allow network security admins to take a holistic look at security policies in the firewall auditing process.

Step 3: Identify the issue

Three categories of firewall problems

Pinpointing the exact issue is crucial.

Firewall problems generally fall into three categories:

  1. Access from external networks or devices to protected resources.
  2. Access from protected networks or resources to unprotected resources.
  3. Access to the firewall itself.

Knowing where the problem lies will allow you to target your troubleshooting efforts effectively.

Step 4: Determine traffic flow

Once the issue is identified, the next step is to determine whether the issue arises from traffic going to the firewall or passing through it.

  • Use traffic monitoring tools to monitor traffic and see where it’s being dropped or redirected.
  • Check if traffic is reaching the firewall but not being forwarded properly (e.g., misconfigured routing rules).
  • Analyze inbound and outbound traffic logs to see if data is moving as expected.

For example, here’s a scenario where a Telnet session failed from the source system, identified by using PAN-OS to take a packet capture.

Taking a custom packet capture in PAN-OS

Step 5: Address connectivity issues

Connectivity issues can usually be identified using network diagnostic tools.

These tools help verify whether an application is listening on the expected IP address and can aid in diagnosing network connectivity problems:

  • Connection monitoring tools: These tools help detect connectivity problems by showing active connections and listening ports.
  • Network management utilities: These are used to manage network connections and traffic, offering advanced functionality for troubleshooting connectivity issues on various operating systems.

Step 6: Resolve performance issues

Performance issues can be the result of high network traffic or complex firewall rules.

Here are a few tactics for improving performance:

  • Streamline network traffic: Ensure that outgoing traffic adheres to your company's policies. Identify and correct any internal servers sending incorrect requests.
  • Filter incoming traffic: Use standard access control list (ACL) filters to route and manage incoming traffic effectively.
  • Simplify firewall rules: Reduce the complexity of firewall rules by removing unused rules and objects. Simplified rules enhance performance and ease maintenance.

Rely on the network analytics and visibility tools or features at your disposal to get an overview of network activity and identify spikes in usage.

For instance:

Strata Cloud Manger Summary

The Strata Cloud Manager Summary view provides a comprehensive view of network performance. Here, users can see real-time traffic, threats, and user activity so that admins can quickly identify and resolve performance issues.

Step 7: Maintain your firewall

Though not an immediate part of the troubleshooting process, routine maintenance is definitely key to preventing future issues.

Regularly monitor network performance, review firewall rules, and stay updated with the latest security patches.

A proactive approach helps keep your firewall in optimal condition, and lessens the risk of future problems.


Note: The exact features of firewall troubleshooting tools vary depending on the vendor and solution.


Why firewall testing is critical and how to do it

How to test a firewall

Firewall testing is the proactive process of ensuring that your firewall is configured correctly and functions as expected to protect your network, before problems arise.

The firewall testing process involves:

  1. Reviewing firewall rules
  2. Assessing firewall policies
  3. Verifying access control lists
  4. Performing configuration audits
  5. Conducting performance testing
  6. Logging and monitoring traffic
  7. Validating rule effectiveness
  8. Checking for policy compliance

It’s worth noting:

Firewall testing is different from troubleshooting because it emphasizes proactively verifying the firewall’s configuration and performance rather than responding to an existing issue.

There are plenty of tools available for firewall testing. Some are proprietary and provided by firewall vendors, while others are open source and free to use.


Note: Firewall testing and penetration testing are distinct but related concepts. General firewall testing focuses on verifying that the firewall is properly configured and functioning as expected, while penetration testing aims to identify and exploit vulnerabilities within the firewall and network defenses.


Step 1: Review firewall rules

  • Objective: Ensure that firewall rules are correctly configured to allow legitimate traffic and block unauthorized access.
  • Action: Review each rule to confirm it aligns with your security policies.

For example:

This firewall rule is problematic because it’s too broad:

Allow all inbound traffic from 0.0.0.0/0 to 192.168.1.0/24 on ports 80, 443, 22.

Allowing traffic from any IP address (0.0.0.0/0) opens the network to unnecessary risk, as it permits access from any source without restrictions.

Also, the rule exposes port 22 (SSH), which is often a target for brute-force attacks or unauthorized access, to the entire internet.

Not to mention, the rule lacks the necessary restrictions to ensure only legitimate traffic reaches internal resources.

This updated rule addresses these deficiencies by restricting the source IP range to a trusted network (172.16.16.0/23), minimizing exposure to external threats:

Allow all inbound traffic from 0.0.0.0/0 to 192.168.1.0/24 on ports 80, 443

Allow all inbound traffic from 172.16.16.0/23 to 192.168.1.0/24 on ports 22

Now Port 22 (SSH) is only open to a specific, internal trusted VPN subnet (172.16.16.0/23), significantly reducing the risk of unauthorized access.

Step 2: Assess firewall policies

Firewall access policy rule sets

  • Objective: Ensure that firewall policies are comprehensive and effectively enforced.
  • Action: Check the policies for different network zones (e.g., internal, external) and ensure they comply with your security requirements.

Step 3: Verify access control lists (ACLs)

ACL configuration example

  • Objective: Confirm that ACLs are configured to permit only authorized users and devices.
  • Action: Review and update ACLs to ensure they accurately reflect current access permissions.

Step 4: Perform configuration audits

How to perform a firewall configuration audit

  • Objective: Regularly audit firewall configurations to ensure they meet organizational standards.
  • Action: Use configuration management tools to compare current settings against a baseline configuration, and check that no unauthorized changes have been made to firewall settings.

Step 5: Conduct performance testing

  • Objective: Ensure that the firewall is performing efficiently without causing network slowdowns.
  • Action: Test the firewall’s performance under typical and peak load conditions.

Step 6: Log and monitor traffic

  • Objective: Monitor firewall logs to detect any anomalies or unauthorized access attempts.
  • Action: Regularly review and analyze logs to identify potential security incidents. Set up alerts for unusual traffic patterns or repeated access attempts from unknown IP addresses.

For instance:

Let’s say you notice a sudden spike in outbound traffic from a server that typically only handles inbound requests. A web server, which usually only receives HTTP/HTTPS requests, is now sending large amounts of outbound traffic to multiple unknown external IP addresses on non-standard ports (e.g., port 6667 used for IRC).

This could indicate that the server has been compromised and is now part of a botnet, sending commands or data to external malicious entities. Such traffic patterns would be unusual for a web server and should trigger an alert for further investigation.

Step 7: Validate rule effectiveness

How to validate firewall rule effectiveness

  • Objective: Confirm that firewall rules are effectively preventing unauthorized access.
  • Action: Simulate typical network traffic to test rule enforcement.

Step 8: Check for policy compliance

Firewall compliance audit steps

  • Objective: Ensure that firewall configurations comply with organizational security policies and regulatory requirements.
  • Action: Conduct regular compliance checks and update configurations as necessary.

Further reading: Key Firewall Best Practices


Firewall troubleshooting tips, tricks, and best practices

Now that we’ve covered firewall issues and solutions top to bottom, let’s conclude with just a few firewall troubleshooting best practices worth mentioning.

Document all changes and updates

Keep a log of all configuration changes, updates, and troubleshooting actions. Having a history to reference is extremely helpful in diagnosing future issues and ensuring compliance.

Back up firewall configurations on the regular

Always have a backup of your firewall configuration before making changes or updates. That way, if something goes wrong, you can quickly revert to a known good state.

Monitor user activity on the firewall

Track who is making changes to the firewall rules and configurations. Accountability is key, plus it might highlight issues caused by human error.

Use layered security

Make sure firewalls are just one component of a layered network security strategy. Relying solely on firewalls can leave gaps in protection. This could involve integrating intrusion detection systems (IDS) or endpoint protection solutions, depending on your specific network security needs and objectives.

Always test after major network changes

If there are significant changes to the network (e.g., adding new services or infrastructure), perform a comprehensive test of the firewall rules to ensure everything is still functioning as expected.

Clean up firewall rules periodically

Clean up unused, redundant, or outdated firewall rules regularly. This will lessen complexity and minimize performance bottlenecks.

Establish a response plan for firewall failures

Prepare a documented, complete incident response plan specifically for firewall failures. It’s important that the team knows exactly what to do if the firewall goes down.


Further reading: What Is an Incident Response Plan? | Getting Started


Try Strata Cloud Manager free for 90 days.

Firewall issues FAQs

The primary firewall issues encountered are misconfiguration errors, software vulnerabilities, hardware issues, connectivity issues, performance issues, and missing or inadequate firewall policies.
The most common cause of firewall failure is misconfiguration.
Firewalls can go down due to hardware failures, software vulnerabilities, misconfigurations, or excessive traffic overwhelming the system.
To check for firewall issues, regularly review logs, audit the firewall configuration, and use network monitoring tools to identify connectivity or performance problems.
To run a firewall check, log into the firewall’s management interface and review the configuration, run a firewall test, and check logs for any unusual activity or misconfigurations.
To run a firewall test, use firewall testing tools to review rules, assess policies, check access control lists (ACLs), and perform performance testing to verify if the firewall is working as expected.
To determine whether a firewall is blocking, review the firewall logs or use diagnostic tools to verify if specific traffic is being allowed or blocked by the firewall.
To fix firewall restrictions, review the firewall rules and adjust them to allow legitimate traffic and block unauthorized access. Ensure the rules align with your organization’s security policies.
To diagnose firewall problems, audit the firewall configuration, check logs for errors, monitor traffic flow, and use diagnostic tools to identify and address issues with performance or connectivity.
Misconfiguration is the leading problem with firewalls, allowing unauthorized access due to improperly set rules or policies.
To determine whether your computer is behind a firewall, check the network settings or use firewall testing tools to verify if your traffic is passing through a firewall before reaching the internet.