CIO: Jimmy, I was at a conference last week and the common theme at the conference is that firewalls are a things of the past. Trends are suggesting that we should start looking at a Next-Gen Firewall to replace what we have.
Engineer: Sir, we just added a UTM solution into our network a month ago???
CIO: I understand Jimmy. However, the threat landscape is getting serious and I need to make sure that our network is as secure as possible. I need some recommendations for a Next-Gen Firewall by the end of the week.
The exchange above resonates of a situation that seems all too common in the IT workspace these days. As IT engineers, we tend to speak our own jargon of acronyms and catchy phrases. We’ve become so accustom to it that at times we tend to forget our audience and just assume that everyone knows what it is we’re talking about. It even happens amongst ourselves from time to time. However, the business side of the house usually has their own set of definitions for things. Most of them fueled by third party organizations like Gartner. In this particular case of the misunderstanding pertaining to the firewall discussion between the CIO and Engineer we are presented with an opportunity to clear some of these misunderstandings about the firewall. Since a vast amount of upper management in organizations tends to lend a significant amount of weight to Gartner’s Magic Quadrant we’ll use their definitions to help compare and contrast what a Firewall, Next-Gen Firewall, and Unified Threat Management really are.
“A firewall is an application or an entire computer (e.g., an Internet gateway server) that controls access to the network and monitors the flow of network traffic. A firewall can screen and keep out unwanted network traffic and ward off outside intrusion into a private network. This is particularly important when a local network connects to the Internet. Firewalls have become critical applications as use of the Internet has increased.” -Gartner 2013
According to Gartner a firewall is just an “application or an entire computer that controls access to the network”. While technically correct it lacks a good amount of clarity. When most IT engineers think of a firewall on a network they don’t typically think of a software application or a desktop PC/server as the device that is going to be used to control access in and out of their network. What comes to mind (at least mine) is a dedicated appliance that has a number of ASIC’s (Application Specific Integrated Circuits) that are designed to process network traffic while comparing it against definitive set of rules at Layer 3 and 4 of the OSI model, stateful sessions, and provide some sort of NAT (Network Address Translation). Sure, there are other services that seem to be common on a lot of firewalls such as the various types of VPN (Virtual Private Networking) technologies but the truth of the matter is that not every firewall supports VPN technologies. Similarly, IPS/IDS (Intrusion Prevention/Intrusion Detection Systems) are also common services that are found on a number of firewalls and like VPN there are a number of firewalls that do not support these technologies. So the question becomes, if these are services that aren’t standard on a firewall and when added they enhance the level of security that a firewall can provide couldn’t that make firewalls that do provides these services a “Next-Generation” firewall? After all, the definition of the term “Next-Generation” according to Dictionary.com is “pertaining to the next generation in a family; also, pertaining to the next stage of development or version of a product, service, or technology
(Dictionary.com, 2014)” one could easily
deduce that having VPN and integrated IPS/IDS as part of a firewall would be
the next stage of development in the firewall family product line and thereby
should be a “Next-Generation Firewall”. Or so one would think but alas we would be
wrong in our assumption because Gartner has coined the Next-Generation Firewall phrase with a different meaning.
“Next-generation firewalls (NGFWs) are deep-packet inspection firewalls that move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall. An NGFW should not be confused with a stand-alone network intrusion prevention system (IPS), which includes a commodity or nonenterprise firewall, or a firewall and IPS in the same appliance that are not closely integrated.” -Gartner 2013
To me, this definition sounds a lot like what was just discussed prior. However, there are a couple of key requirements in this definition order for a firewall to be coined “Next-Generation”. Application-level inspection being the first, and bringing intelligence from outside the firewall being the second, are the two additional requirements that Gartner has added to this definition in order for one to coin their box as a “Next-Generation Firewall”. So what is application-level inspection? Simply put it’s going to be the firewalls ability to classify traffic such as Facebook, Outlook, Adobe Flash, etc. at the firewall level and write policies based on these classifications. The next requirement is quite vague because “bringing intelligence from outside the firewall” could technically be any sort of service not originating from inside the firewall. One could argue that a firewall downloading IPS/IDS signatures could be considered “bringing intelligence from outside the firewall”. What I find troubling about this is that some time ago there was a situation in which a particular vendor met all of Gartner’s requirements as per the definition but wasn’t allowed to compete in the Magic Quadrant because the product was already a leader in the UTM (Unified Threat Management) category and exceeded the requirements of the Gartner definition
(Tam, et al., 2012). There are, however, a number of other
products that exceed the required capabilities as per the definition, but these
products still appear in the Magic Quadrant.
For example, in the definition stated above there is no mention about
offering VPN services and yet there is a plethora of devices in the quadrant
Unified Threat Management
“Unified threat management (UTM) is a converged platform of point security products, particularly suited to small and midsize businesses (SMBs). Typical feature sets fall into three main subsets, all within the UTM: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail AV).” -Gartner 2013
When we look at this definition provided by Gartner for Unified Threat Management, there are a few additional features that a UTM provides. In addition to the requirements laid out for the Next-Generation Firewall, UTM provides VPN technologies, Web filtering, Web antivirus, anti-spam, and e-mail AV. Let’s not forget that these services have to be offered from on the same box. However, you will note that there isn’t any mention made in regards to the UTM having to bring any intelligence into the platform from an outside source.
The waters have been tremendously muddied thanks to third parties such as Gartner making up their own definitions for these platforms. At the end of the day, they’re all just firewalls. Firewalls with enhanced feature sets. Unfortunately, the reality is that because many key people tend to follow Gartner quite religiously it becomes necessary to understand their definitions as well as knowing how a manufacturer views their product in order to try to ensure that there isn’t that communication breakdown.
Dictionary.com. (2014). next-generation. Retrieved from Dictionary.com: http://dictionary.reference.com/browse/next-generation
Gartner. (2013). IT Glossary. Retrieved from gartner.com: http://www.gartner.com/it-glossary/
Tam, K., Salvador, M. H., McAlpine, K., Basile, R., Matsugu, B., & More, J. (2012). UTM Security with Fortinet. Waltam, MA: Synergess.