firewall is your network’s gatekeeper / controlling exactly which data flows in and out. By defining rules, an administrator can allow or block traffic based on criteria such as:
Source: Is the packet coming from an approved IP or network?
Destination: Is it headed to a permitted host or subnet?
Port: Does it target an authorized service port (e.g., 80 for HTTP)?
Protocol: Is it using TCP, UDP, ICMP, or another protocol your policy allows?

| Type | Description |
|---|---|
| Network‑Based | Dedicated hardware or virtual appliances placed at network chokepoints (data center, edge). |
| Host‑Based | Software installed on individual servers or workstations (Windows Firewall, iptables). |
| Cloud‑Native | Built into cloud platforms (AWS Security Groups, Azure Firewall). |
| Next‑Gen (NGFW) | Adds application awareness, intrusion prevention, and user identity to traditional stateful. |