(a) Packet Filtering Firewalls:
These security devices regulate network traffic using predefined rules. They inspect packet headers (source/destination IP, port, protocol) at the network layer, allowing or blocking packets. While efficient and fast, they offer basic security as they don't examine packet content or connection states, primarily serving as a barrier between trusted and untrusted networks. (b) Stateful Inspection Firewalls:
These firewalls build upon packet filtering by tracking active connection states. They monitor the entire network session context (e.g., TCP handshake, data flow) rather than individual packets. This enables them to identify legitimate connection packets versus unsolicited, potentially malicious ones. Stateful firewalls can block packets that deviate from the expected state, offering superior protection against attacks compared to simple packet filtering.
(c) Application-Level Gateways (Proxy Firewalls):
Operating at the application layer, these act as intermediaries. They receive client requests, inspect them, and then forward them to the server. These firewalls examine the data payload and enforce policies for application-specific protocols (HTTP, FTP, SMTP). They offer robust security through detailed filtering, user authentication, and content filtering, but their comprehensive inspection can lead to latency and increased processing demands.