What is a Firewall
A Firewall is a network security method that filters incoming and outgoing network by their IP, port, domain, or other. Firewalls must be previously configured by the network manager to say what is allowed through and what isn’t.

The above picture gives a very simplified explanation of a network with a firewall in it. A LAN (Local Area Network) has a router which is its connection to the WAN (Wide Area Network), also known as the cloud. The firewall is inside the router, and it will scan all incoming and outgoing signals to see if they pass the filter.
Risk 1 – Firewall is too easy to gain access to
A big risk that of firewalls are that they must be configured to block unwanted signals. So if a person is trying to break into your network, and they are blocked by the firewall, they might try to see if they can gain access to the configuration of the firewall and let their signals in. No matter how well the firewall secures your network, if someone gains access to it it’s useless. One might be able to break into the firewall by getting the authentication to it, like the password.
This security risk can be helped by increasing the security of gaining access to the firewall itself. This can be done by making the password stronger, or keeping the firewall software up-to-date. This can also be done by increasing the amount of steps or credentials needed to gain access to the firewall, like making so configuring it requires a code that you get from an e-mail or a phone text.
Risk 2 – Firewall does not have secure enough inspection
The second risk is when the configuration of the firewall itself is too easy to get around. For example, traditional firewalls only check the packet of data’s origin and destination; two things which can easily be masked or spoofed. Or, the configuration simply does not block the unwanted data packet.
To get around this, you may add Layer 7 (“deep packet”) inspection to your firewall, which looks at multiple things about the packet itself, which can be measured to see if it’s bad and is harder to spoof (‘spoofing’ is the practice of masking parts of the signal, like where it came from). You can also make it so the firewall blocks signals by default, and instead you have to construct a list of what’s allowed in and out of your network. Although, that solution will require higher levels of knowledge in what you want in and out of your network.

A diagram demonstrating Deep Packet inspection.
Risk 3 – Insider attacks
The last type of risk comes from bypassing the firewall itself. The network might have multiple ways to get in, and the firewall is useless if the person trying to break in is already past it. Or, the person is intentionally or unintentionally already allowed into the network, and they are able to access it.
This risk can be mitigated by adding more firewalls, like at every connection in and out of the network or inside the network itself. Having security inside your network, although it can slow the network down, is never a bad idea. Another way to prevent insider attacks is simply by trusting less people with the higher level parts of your network. You can’t receive an insider attack if there’s no one on the inside.
SOURCES USED
5 Firewall Threats and Vulnerabilities (compuquip.com)
Top Firewall Vulnerabilities (trustnetinc.com)



