SecuritySecurity+CISSP

Network Security Controls (Firewalls, IDS/IPS, Proxies) Explained for Security+

Perimeter security works by placing gatekeepers between your network and everything outside it. Firewalls decide which traffic is allowed. Intrusion detection systems watch for attack patterns and raise alerts. Intrusion prevention systems do the same but also block the traffic in real time. Proxies sit in the path of connections and inspect or redirect them. Security+ tests these controls precisely: the most common wrong answer confuses IDS (which only alerts) with IPS (which blocks). Know where each device sits in the network, what it can see, and what action it takes.

8 min
3 sections · 7 exam key points

Firewall types

A stateless (packet filtering) firewall inspects each packet in isolation against a set of rules based on source IP, destination IP, port, and protocol. It has no memory of previous packets. This means it cannot distinguish a legitimate response packet from an attack packet targeting the same port. Stateless firewalls are fast but easy to evade with crafted packets that look like responses.

A stateful firewall maintains a state table that tracks active connections. When a packet arrives, the firewall checks whether it belongs to an existing approved connection. If an external packet arrives claiming to be a response but no corresponding outbound connection exists in the state table, it is blocked. Stateful firewalls are the baseline for any modern network.

Next-Generation Firewalls (NGFWs) go beyond port and IP with Layer 7 application awareness, integrated IPS, SSL/TLS inspection, and user identity-based policy. An NGFW can identify and block Tor traffic or BitTorrent regardless of what port it uses, because it can identify the application protocol even when it masquerades as legitimate web traffic.

Web Application Firewalls (WAFs) specifically protect web applications by inspecting HTTP and HTTPS traffic for OWASP Top 10 attack patterns: SQL injection, cross-site scripting, CSRF. WAFs operate at Layer 7 and sit in front of web application servers.

IDS and IPS

An IDS (Intrusion Detection System) monitors traffic and generates alerts when it detects suspicious patterns. It is passive: it does not sit in the traffic path and does not block anything. Traffic flows through regardless of what the IDS sees. A false positive generates an unnecessary alert that wastes analyst time. A false negative misses an actual attack.

An IPS (Intrusion Prevention System) is inline: traffic flows through it and it can block or drop suspicious traffic in real time. False positives now have a real cost because legitimate traffic gets blocked. This is why IPS tuning matters: an aggressively configured IPS can disrupt normal business operations.

Detection methods matter for exam questions. Signature-based detection matches traffic against a database of known attack patterns. It is fast, accurate for known threats, and produces low false positives, but it misses novel attacks and zero-days that do not match any existing signature. Anomaly-based (behavioral) detection establishes a baseline of normal traffic and alerts when behavior deviates. It can detect zero-days but generates more false positives because normal traffic occasionally looks abnormal.

Honeypots are decoy systems placed in the network with no legitimate users or legitimate purpose. Any connection to a honeypot is by definition suspicious. They attract attackers, waste their time, and provide intelligence about attack techniques and tools without exposing real systems.

Proxies and how to choose the correct answer

A forward proxy sits between internal clients and the internet. Clients send requests to the proxy, which forwards them externally. The external server sees the proxy's IP, not the client's. Uses: content filtering, caching, URL inspection, anonymization. A forward proxy is configured on the client side.

A reverse proxy sits in front of internal servers and receives connections from external clients. External clients connect to the reverse proxy, which forwards to backend servers. Uses: load balancing, SSL termination, DDoS protection, hiding server topology. Clients never know the actual server addresses.

IDS vs IPS: detects and alerts only = IDS (passive, out of band). Detects and blocks = IPS (active, inline). Stateless vs stateful: stateless checks each packet individually. Stateful tracks connection state. NGFW vs WAF: NGFW = general network traffic. WAF = HTTP/HTTPS web application traffic specifically.

Honeypot: any activity on it is suspicious. All connections are potential threats. Used for threat intelligence and early warning of attackers inside the network.

IDS vs IPS comparison

AttributeIDSIPS
PlacementOut of band, passive monitorInline, in the traffic path
Action on detectionAlert onlyAlert and block/reject traffic
False positive impactUnnecessary alert, analyst time wastedLegitimate traffic blocked
False negative impactAttack missed, no detectionAttack missed, no detection
Performance riskNone, does not touch trafficCan add latency if inline processing is slow

Key exam facts — Security+ / CISSP

  • IDS: passive, out of band, detects and alerts only. Does not block.
  • IPS: inline, in traffic path, detects and blocks. False positives block legitimate traffic.
  • Stateful firewall tracks connection state. Stateless inspects each packet independently.
  • NGFW: Layer 7 application awareness, user identity policy, integrated IPS.
  • WAF: HTTP/HTTPS only, OWASP Top 10 protection for web applications.
  • Signature detection: fast, known attacks. Anomaly detection: finds novel attacks, more false positives.
  • Honeypot: decoy system. All activity is suspicious. No legitimate users.

Common exam traps

An IDS blocks malicious traffic.

An IDS only detects and alerts. It is passive and never touches the traffic flow. An IPS is the inline variant that actively blocks. The difference between detection and prevention is the most important distinction in this topic area.

A stateless firewall is just as secure as a stateful one.

A stateless firewall inspects packets in isolation and cannot understand connection context. It cannot tell whether an inbound packet is a legitimate response or an unsolicited probe. Stateful firewalls understand the flow of connections and block packets that do not belong to established, authorized sessions.

Anomaly-based detection is always superior because it can detect zero-days.

Anomaly-based detection generates more false positives because normal traffic can look abnormal. In high-volume environments, excessive false positives lead to alert fatigue and missed real incidents. Production environments use both: signature detection for efficiency on known threats, anomaly detection for novel attack patterns.

Practice this topic

Test yourself on Network Security Controls

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics