What Are the Top Firewall Features? | Traditional & NGFWs

5 min. read

The main features of firewalls can be broken down into those found in traditional and next-generation firewall solutions, including:

  • Packet filtering
  • Stateful inspection
  • Network address translation (NAT)
  • Logging and monitoring
  • Access control
  • Advanced threat prevention
  • Advanced URL filtering
  • DNS security
  • IoT security
  • Next-generation CASB

These features work together to filter out unauthorized access and threats from external sources while managing and monitoring traffic. Using both foundational security measures and advanced capabilities, firewalls are able to operate as a crucial barrier against a wide array of cyber threats.

How do firewalls work?

How Does a Firewall Work?

Before diving into the main features found in today’s firewalls, it’s worth taking a moment to establish how firewalls actually function.

Firewalls are essentially gatekeepers for the network. They manage and monitor data flow between the network and the internet.

Here’s how a firewall works:

A firewall establishes a barrier at the network's entry points. This is where security policies determine whether traffic should be allowed or blocked. The process is vital for protecting networks from unauthorized access and cyber threats.

Firewall Process

Firewalls, whether hardware or software, work using three main methods:

  • Packet filtering: An access control mechanism that screens small data units (packets) against a predetermined rule set.
  • Proxy service: Here, the proxy firewall acts as an intermediary. Instead of permitting direct communication of data packets between the user and the internet, the proxy fetches the data for the user and then relays it, preventing direct system access.
  • Stateful inspection: Stateful inspection firewalls track outgoing packets and compare incoming responses to their database of active sessions. They approve only those that match a valid corresponding outbound packet.

At a basic level, firewalls use predetermined rules to inspect incoming and outgoing data packets.

Firewall rules can be based on:

  • Source and destination IP addresses
  • Domain names
  • Protocols
  • Ports
  • Specific content within the data packets

By applying these rules, firewalls effectively block harmful traffic while allowing legitimate communications to pass through.

Find out which software firewall is right for you.

What are the main traditional firewall features?

Traditional firewall features

Traditional firewall solution features are basically the backbone of network security. These are the functionalities found in early firewall solutions that are still important today.

Basic firewall features include:

  • Packet filtering
  • Stateful inspection
  • Network address translation (NAT)
  • Logging and monitoring
  • Access control

Together, these features create the network security foundation for ensuring that only authorized and safe communications are allowed through.

Packet filtering

Packet filtering is the process of evaluating data packets as they pass through a firewall. Based on predetermined criteria, like source and destination IP addresses or port numbers, the firewall decides whether to allow or block each packet.

Think of packet filtering like a network traffic checkpoint. Every data packet attempting to enter or leave the network has to pass through.

More specifically, the firewall scrutinizes each packet's header. The header contains important details such as IP addresses and port numbers. Which determines whether the packet should be allowed to continue to its destination or be rejected based on the rules defined in the firewall.

Here’s how:

How packet filtering works

For example: Let's say a packet shows up claiming to come from a trusted source, but the source IP has been flagged previously for suspicious activity. The firewall recognizes the discrepancy through its predefined security rules, and immediately identifies the packet as a spoof. It then drops the packet before it can penetrate the network.

Like this:

Packet filtering function prevents IP spoofing attack

While packet filtering is a basic form of firewall protection, it’s still essential even in modern network security strategies. It provides the first line of defense by eliminating packets that don't meet simple, yet crucial, criteria quickly.

However:

It's important to note that packet filtering alone isn’t a sufficient measure to take on more sophisticated threats. Which is why it's commonly integrated with other, more advanced types of firewall technologies like next-generation firewalls (NGFW) and intrusion prevention systems (IPS).


Further reading: What Is a Packet Filtering Firewall?


Stateful inspection

Stateful inspection is another fundamental feature of traditional firewalls. And it’s crucial for monitoring and managing the traffic that flows through a network.

Unlike simple packet filtering, stateful inspection tracks each connection's ongoing state and context. This makes the process more like a conversation versus isolated exchanges.

So, stateful inspection is a dynamic process. It tracks connections by logging various details such as source and destination IP addresses, port numbers, and the sequence and acknowledgment numbers involved in the communication.

This is what it looks like in practice:

Stateful packet inspection example

Stateful inspection is not unlike a vigilant receptionist that remembers the flow of visitors, checking each against a list of expected guests.

It examines every packet that attempts to enter the network, referencing a state table, such as this example below, that logs active connections:

Source address

Source port

Destination address

Destination port

Connection state

192.168.2.150

1042

198.51.100.25

80

Established

192.168.2.151

1045

203.0.113.45

443

Established

192.168.2.152

1049

192.0.2.55

25

Established

10.45.34.67

2035

198.51.100.30

80

Established

10.45.34.68

2040

203.0.113.50

8080

Established

172.16.84.90

2123

192.0.2.60

22

Established

172.16.84.91

2150

198.51.100.35

443

Established

10.10.30.45

2222

203.0.113.55

80

Established

If a packet belongs to an established connection, it passes through seamlessly. If it doesn't match or seems out of context, the firewall blocks it.

Why is this method so effective, even for today’s firewall products?

Well, by maintaining a connection context, stateful inspection can identify and block packets that don't belong. Even if they appear harmless on the surface. And that prevents unauthorized access and attacks that rely on forging or hijacking legitimate sessions.

Plus: Because it reduces the need to inspect every packet in detail once a connection is established as safe, it improves the network's performance and reduces latency.


Further reading: What Is a Stateful Inspection Firewall?


Network address translation (NAT)

Network address translation, or NAT, enhances network flexibility and security.

Essentially, NAT allows multiple devices on a private network to access the internet using a single public IP address. It’s important for conserving limited IP addresses while maintaining each device’s ability to reach online resources.

NAT works by modifying the IP address information in packet headers as they pass through a router or firewall. This adjustment allows outbound packets from a private network to appear as though they originate from a public IP address.

In return, responses from the internet are directed back to the appropriate device on the private network.

Network address translation between a private network and the Internet

NAT maximizes the efficient use of public IP addresses. But it also adds a layer of security by keeping internal network addresses hidden from the outside world. Basically, NAT acts as a buffer between internal networks and potential external

threats—making unauthorized access more challenging.

For businesses, NAT provides an easy, cost-effective solution to manage internal internet access without the need for multiple public IP addresses. The functionality is integrated within firewalls to ensure all data flows are appropriately handled.

Logging and monitoring

Logging and monitoring are essential firewall functions. Together, they provide insights into network activity and security threats. Essentially, logging and monitoring features act as a comprehensive record-keeping and observation system for network traffic.

Firewalls log data just about every packet that passes through, noting details like source and destination IP addresses, port numbers, timestamps, and whether the traffic was allowed or blocked based on existing security rules.

This creates a detailed record that admins can review to understand traffic patterns and identify potential security breaches or unusual activities.

A firewall log looks like this:

Firewall log example

Monitoring, on the other hand, involves the real-time analysis of this data.

It helps in detecting anomalies as they occur, allowing network admins to react swiftly to possible threats. And being able to respond immediately makes it a lot easier to minimize damage from attacks and maintain network integrity.

Using PAN-OS Application Command Center dashboard to review network activity

Here’s why logging and monitoring are so important.

Together, they provide a double-layered security approach. Logging offers a historical account that can be crucial for audits, forensic analysis, and compliance with security policies. And monitoring ensures ongoing vigilance against threats, helping admins stay a step ahead.

Not to mention: the dual approach also supports network performance optimization by analyzing traffic flow and user behavior.

Access control

Access control is another longstanding, fundamental firewall feature.

In keeping with the goal of many firewall functions, access control determines which traffic should be allowed or blocked based on predefined security rules. Controlling access supports the security of the network, and it also ensures that only legitimate users and data can flow in and out.

Access control in a firewall involves several steps:

First, the firewall examines each incoming and outgoing packet against a set of rules—these could include source and destination IP addresses, protocols, ports, and even time of day.

If a packet matches an allowed rule, it passes through the firewall. If not, it’s blocked.

ACL configuration example

Why is this important?

Because access control helps prevent attackers from exploiting vulnerabilities within the network. It ensures that sensitive areas of the network are only accessible to authorized users. And that significantly reduces the risk of data breaches.

Also, it allows network admins to enforce policies that align with organizational security standards. Which helps to maintain a secure, efficient network environment.

In practice, access control within firewalls is continuously refined and updated to adapt to new threats and changes within the network. It's a dynamic tool that provides a critical security layer.

What are the main next-generation firewall (NGFW) features?

NGFW features

The genesis of firewall technology is rooted in age-old methods of physical defense. All the way back when people first began building walls to stop intruders. The real history of firewalls began in the 1980s with basic packet filtering firewalls, continually evolving into the modern next generation firewall of today.

The History of Firewalls

As technology and business evolve, protection methods have to adapt.

It’s important to note that traditional firewalls do provide basic defense, but modern firewalls, or next-generation firewalls, including ML-powered NGFWs, reflect today's advanced digital threats. These firewalls blend proven, durable functionalities with new technologies for better, more effective network security.

NGFW products include modern firewall features ranging from application awareness and SSL inspection to threat intelligence and deep packet inspection (DPI).

The primary NGFW features include:

  • Advanced threat prevention
  • Advanced URL filtering
  • DNS security
  • IoT security
  • Next-generation CASB

Secure private clouds and virtual networks. Try VM-Series virtual firewalls free for 30 days.

Advanced threat prevention

Advanced threat prevention powered by Precision AI

Advanced threat prevention (ATP) is a key feature of NGFWs. ATP goes beyond traditional security measures with multiple layers of defense to detect, analyze, and block malicious activities before they can cause harm.

ATP incorporates modern technologies like machine learning and behavior analysis to identify and counteract malware that evades standard detection.

It works by scrutinizing network traffic and files in real-time. Then it applies a combination of signature-based, heuristic, and behavioral techniques to pinpoint suspicious patterns and activities.

The multifaceted approach allows ATP to provide comprehensive protection against both known and emerging threats.

This is significant because the threat actors of today evolve their tactics at a previously unthinkable rate. And traditional security solutions simply can’t keep up.

ATP addresses this gap by continuously updating detection mechanisms with the latest threat intelligence. This way, the firewall can adapt to new vulnerabilities and attack methods.

This dynamic capability is vital for protecting sensitive data and maintaining network integrity against complex attacks like ransomware, zero-day exploits, and advanced persistent threats (APTs).

Learn how Cloud-Delivered Security Services protect your network from the most advanced threats.

Advanced URL filtering

Advanced URL Filtering architecture

Advanced URL filtering in NGFWs is a critical security feature that blocks access to malicious websites.

It assesses URLs in real-time, using updated databases and dynamic analysis to categorize and evaluate web traffic. This process helps identify and prevent access to sites known for hosting malware, phishing, and other cyber threats.

Here’s how it works:

The system uses machine learning to adapt to emerging threats, analyzing new or unknown websites to detect harmful content swiftly. If a site poses a risk, the firewall restricts access—which protects the network from potential security breaches.

Advanced URL filtering is vital for enforcing safe web browsing practices. It also supports compliance with organizational policies, and protects sensitive data.

It also provides valuable insights into how web traffic moves through the network. These insights help admins manage web usage more effectively. And make it easier to identify and address potential issues before they escalate.


Further reading: What Is URL Filtering?


See how our Advanced URL Filtering solution can prevent unknown and sophisticated web-based threats in real time.

DNS security

The objective of DNS security is to secure the Domain Name System (DNS), which is fundamental to internet communication. DNS security ensures that the DNS infrastructure is reliable and efficient. Which prevents attacks that could redirect users to malicious sites or disrupt network services.

DNS security is so critical because DNS is a primary target for cyber attacks, mostly because of its essential role in network addressing. Which means that securing it helps prevent a wide range of attacks, including cache poisoning and denial of service (DoS).

DNS security uses predictive analytics and machine learning to thwart sophisticated attacks leveraging DNS. Its tight integration with the firewall automates protections, provides deeper insights into threats, and eliminates the need for separate tools.

DNS security as an integrated feature of an NGFW

DNS security works by monitoring DNS requests and responses. It uses advanced algorithms to detect anomalies and potential threats. By applying security measures like DNSSEC (Domain Name System Security Extensions), NGFWs can authenticate DNS responses. And that ensures their integrity and blocks forged information that could lead to phishing or malware infections.

Enhanced DNS security within NGFWs also includes filtering to prevent access to known malicious domains. Which reduces the risk of malware infections and data breaches.

Stop new DNS-layer attacks today. Get a 90-day DNS Security free trial.

IoT security

IoT security within NGFWs is a crucial feature designed to protect the vast array of interconnected devices within modern networks. As the Internet of Things (IoT) expands, so does the potential for security vulnerabilities. And that makes robust IoT security mechanisms indispensable.

Plus, with the proliferation of IoT devices in both corporate and consumer environments, the attack surface has significantly increased. Devices often have varying levels of security, making some highly vulnerable to attacks.

The attack surface of an IoT device

IoT security within NGFWs offers a robust Zero Trust security approach for IoT devices, combining visibility, prevention, and enforcement.

With the integration of machine learning, modern firewalls can segment networks based on context. This reduces risk and protects both IoT and IT devices from various threats.

Integrated IoT Security Framework within NGFW

NGFWs equipped with IoT security capabilities use advanced techniques to monitor and manage the traffic from these devices. This includes identifying device types, tracking behavior patterns, and ensuring that all communications adhere to established security policies.

This monitoring helps detect and prevent anomalous behavior that could indicate a security threat, such as unauthorized access or data exfiltration attempts. By implementing predefined security rules, NGFWs can automatically block suspicious activities, providing real-time threat prevention.


Further reading: What Is IoT Security?


Never leave IoT to its own devices. Get a 30-day Enterprise IoT Security free trial.

Next-generation CASB

A next-generation cloud access security broker (CASB) is an advanced NGFW feature designed to provide robust security across various cloud applications. This functionality is especially important because businesses are increasingly relying on SaaS applications that reside outside traditional security controls.

What exactly does a next-generation CASB do?

It acts as a gatekeeper between users and cloud services, monitoring all data traffic and enforcing security policies. Which prevents unauthorized access and data breaches (while ensuring compliance with internal policies and external regulations).

The CASB integrates seamlessly into the firewall to extend security measures beyond traditional network perimeters, directly into cloud environments.

Seamless integration of next-gen CASB with NGFW for enhanced SaaS security

The CASB continuously evaluates the risk levels of cloud services, providing real-time security postures and visibility across all cloud platforms.

This matters because organizations continue to adopt more cloud-based tools. And that means that the risk of data leaks and security breaches increases.

A next-generation CASB addresses these challenges by offering granular control over data access and usage across all cloud services. Including sanctioned and unsanctioned applications. So organizations can embrace the benefits of cloud computing and maintain stringent security controls.

Firewall features FAQs

The main features of firewalls include packet filtering, stateful inspection, network address translation (NAT), logging and monitoring, access control, advanced threat prevention, advanced URL filtering, DNS security, IoT security, and next-generation CASB.
The most important firewall features can be considered context-dependent, varying greatly based on the specific security requirements and the network architecture of an organization. However, when considering a broad application, the following features are generally critical across various setups: packet filtering, stateful inspection, and advanced threat prevention.
Basic firewall features generally include packet filtering, stateful inspection, and network address translation (NAT).
Advanced firewall features include but aren’t limited to advanced threat prevention, advanced URL filtering, DNS security, IoT security, and next-generation CASB.
The most common firewall features generally include but aren’t limited to packet filtering, stateful inspection, NAT, logging and monitoring, and access control.
Three main functions of a firewall are to filter traffic based on rules (access control), monitor and log traffic details for analysis (logging and monitoring), and prevent unauthorized access to network resources (security enforcement).
A firewall provides multiple features like traffic filtering, intrusion prevention, and enhanced security measures against various cyber threats through stateful inspection and advanced threat detection techniques.
Features of a network firewall include packet filtering, stateful inspection, NAT, and logging activities for real-time monitoring and threat mitigation, enhancing overall network security and management.