If the firewall implementation is not configured to control the flow of information within the network based on organization-defined information flow control policies, malicious or otherwise unauthorized access can occur. Controlling the flow of network traffic within a network is as important as controlling the flow of network traffic between networks and is part of the practice of defense-in-depth.
A firewall is a network security tool, implemented either as software or in hardware, which controls the flow of incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on an applied rule set. This rule set or Access Control List (ACL) is an ordered list of rules that defines access control policies and allows or denies access to information system resources such as applications, services, or devices. |