Firewalls and Virtual Private Networks form the foundation of network perimeter security, controlling traffic flow and establishing encrypted communication channels across untrusted networks. Firewalls inspect and filter traffic based on configurable policies, while VPNs create secure tunnels that protect data confidentiality and integrity between remote endpoints. Understanding both packet filtering rules and encryption protocols is critical: a misconfigured firewall rule can expose internal resources, while weak VPN encryption or authentication can compromise entire remote access infrastructures—making proper configuration of both technologies essential for maintaining secure network boundaries in modern distributed environments.
What This Cheat Sheet Covers
This topic spans 14 focused tables and 103 indexed concepts. Below is a complete table-by-table outline of this topic, spanning foundational concepts through advanced details.
Table 1: Firewall Types
| Type | Example | Description |
|---|---|---|
iptables -A INPUT -s 192.168.1.0/24 -j ACCEPT | • Examines each packet independently based on header information only (source/destination IP, port, protocol) • no connection tracking • faster but less secure. | |
Session tracking TCP 3-way handshake | • Maintains a state table of active connections, tracking session context (SYN/ACK sequences, connection state) • validates packets belong to established sessions. | |
Palo Alto application-aware filtering | Combines stateful inspection with application identification, deep packet inspection (DPI), IPS/IDS, user identity integration, and threat intelligence. | |
HTTP proxy filtering requests | • Operates at Layer 7 (application layer) • inspects application-specific protocols • acts as intermediary between client and server • can decrypt/inspect SSL/TLS. |