Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

8.5.1. Firewalls, IPS, and Next-Gen Detection

💡 First Principle: Firewalls enforce network access policy by filtering traffic based on defined rules. The evolution from stateless packet filtering to next-generation firewalls (NGFWs) reflects the reality that attackers have moved up the protocol stack — blocking by IP and port is insufficient when malicious payloads travel inside legitimate HTTPS sessions to approved cloud services. Modern detection must inspect application-layer content, decrypt TLS traffic, and incorporate threat intelligence to identify sophisticated attacks.

Firewall evolution and capabilities:
GenerationInspectsDecides Based OnLimitation
Stateless packet filterIndividual packetsSource/dest IP, port, protocolNo session awareness; easily evaded by fragmentation
Stateful inspectionConnection statePacket context within established sessionsCannot inspect encrypted traffic or application content
Application proxyFull application dataApplication-layer protocol compliancePerformance bottleneck; limited protocol support
NGFWApplication + user + contentApp identification, user identity, threat signatures, TLS decryptionRequires TLS decryption (privacy/legal implications); high cost
IDS/IPS deployment considerations:
FactorIDSIPS
PlacementPassive (span port or tap)Inline (traffic passes through)
Action on detectionAlert onlyBlock, drop, or reset connection
False positive impactAnalyst investigates unnecessary alertLegitimate traffic blocked — potential outage
Best forBroad visibility; environments where blocking risk is too highCritical choke points; known-bad signature blocking
Detection methods:
MethodHow It WorksStrengthWeakness
Signature-basedMatches traffic against known-bad patternsVery low false positives for known threatsCannot detect novel attacks (zero-days)
Anomaly-basedEstablishes behavioral baseline; alerts on deviationsCan detect unknown threatsHigh false positive rate; requires training period
HeuristicApplies rules about suspicious behavior patternsDetects attack categories rather than specific signaturesMust be tuned; generic rules generate noise
Web Application Firewalls (WAF):

WAFs operate at Layer 7, inspecting HTTP/HTTPS traffic for application-layer attacks: SQL injection, cross-site scripting, command injection, and OWASP Top 10 categories. Unlike network firewalls, WAFs understand the application protocol and can block requests that contain malicious payloads within apparently normal web traffic. WAFs can also provide virtual patching — blocking exploitation of a known vulnerability while the application team develops and tests a permanent code fix.

⚠️ Exam Trap: SSL/TLS inspection (decrypting encrypted traffic for inspection, then re-encrypting) enables NGFWs and IPS to inspect traffic that would otherwise be opaque. However, it raises significant privacy and legal concerns: the organization is performing a man-in-the-middle on employee communications. Legal review is required, and certain categories of traffic (banking, healthcare portals) are typically excluded from decryption policies.

Reflection Question: An organization deploys IPS inline at the internet perimeter and experiences a production outage when the IPS blocks legitimate API traffic from a cloud vendor due to a signature false positive. The network team proposes removing the IPS and replacing it with IDS-only monitoring. As the security architect, what is your response — and what alternative architecture would balance the need for inline blocking with the risk of false-positive disruption?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications