{"id":204,"date":"2011-11-22T23:38:33","date_gmt":"2011-11-22T23:38:33","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=204"},"modified":"2018-09-06T23:09:34","modified_gmt":"2018-09-06T23:09:34","slug":"routers-vs-firewalls","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=204","title":{"rendered":"Routers vs. Firewalls"},"content":{"rendered":"<h3>Review of the Basics<\/h3>\n<p>We&#8217;re often asked at SmallNetBuilder what the advantages are of using a &#8220;high-end&#8221; or &#8220;enterprise&#8221; grade <a id=\"itxthook0\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">firewall<\/a>,  such as a Cisco PIX, Juniper Netscreen, etc., over a consumer-grade  router. To get a good start on the subject, let&#8217;s review a few basics,  the first being NAT.<\/p>\n<p>I&#8217;m sure many of you know what <strong>NAT<\/strong> (Network Address  Translation) is, since it&#8217;s a standard feature of routers these days.   While sharing your connection to several <a id=\"itxthook1\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">computers<\/a>, it also serves as the first line of defense for your LAN from Internet-based exploits.<\/p>\n<p>From the Internet, traffic originating at any of your LAN computers  appears to come from the WAN IP address of your router, hiding\/masking  your internal network.  When the  requested data is sent back to the  originator (your WAN IP address), it is forwarded from the router itself  to the LAN client that actually made the request.<\/p>\n<p>NAT  is a sufficiently secure method, if you&#8217;re not using port  forwarding.  NAT creates what&#8217;s known as a &#8220;Black Hole&#8221; blocking all  inbound requests (Pings, tracerts) as if the IP address didn&#8217;t exist.   So port scanners and other applications that troll for responses from  unsecured services don&#8217;t get any indication that there is anyone home,  and go on to rattle the next doorknob.<\/p>\n<p>But if you&#8217;re forwarding ports using NAT, you then have a path to that <a id=\"itxthook2\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">computer<\/a>,  which effectively puts you back at square one.  To prevent problems  here, you then have to install &#8220;firewall&#8221; software on the PC itself to  protect it (or enable Windows&#8217; built-in firewall if you&#8217;re using that  OS).<\/p>\n<p><strong>SPI<\/strong> (Stateful Packet Inspection), also known as a &#8220;Stateful  Firewall&#8221;, would be the next step up in router security.  This is  something you now see on virtually every consumer and mid-range router  these days, giving you a bit more protection than basic NAT itself.  SPI  functions by &#8220;looking inside&#8221; all inbound packets for specific kinds of  undesired activity. This adds another layer of protection to people  that need to forward ports, because at least <em>some<\/em> exploits can be detected and blocked.<\/p>\n<p>However, SPI  has its drawbacks.  Depending on the version, a major one would be its distaste for Microsoft Vista, which uses <a href=\"http:\/\/en.wikipedia.org\/wiki\/TCP_window_scale_option\" target=\"_blank\">TCP-Window Scaling<\/a> for all connections except HTTP.  The other major drawback is the  limited nature of the SPI actually performed in consumer and mid-grade  routers. It  typically is very basic and not very up-to-date on the  latest exploits.<\/p>\n<p>The next step up in security would  be <strong>Deep Packet Inspection<\/strong> (DPI).  DPI, however, covers many different things, as not only is it a  type of security; it can also be a kind of eavesdropping.  DPI from a  security standpoint combines <strong>Intrusion Prevention Service<\/strong> (IPS) and <strong>Intrusion Detection System<\/strong> (IDS), which improve upon the SPI <a id=\"itxthook3\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">technology<\/a>.   DPI, however, isn&#8217;t really seen on home\/SOHO routers. You have to move  up to at least low-end &#8220;enterprise&#8221; firewalls or &#8220;security appliances&#8221;  to get DPI.<\/p>\n<p>Moving on to <strong>firewalls<\/strong>, the first consideration is software  vs. hardware. This is subject of major debate, with pros and cons on  both sides.  A software firewall is a program that runs on your  computer, which, at the very least, monitors <em>all<\/em> network traffic, both inbound and outbound.<\/p>\n<p>The main downside of <strong>software firewalls<\/strong> has been experienced  by most people who have enabled the Windows Firewall, and then attempted  to access networked services on their LAN, such as media, file and  print servers. Firewalls usually have to be &#8220;trained&#8221; or otherwise  configured to pass <em>desired<\/em> services. This is often done by a  pop-up asking whether it&#8217;s ok to allow a particular communication to  occur. Since many users don&#8217;t know how to answer the question, they run  the risk of allowing a &#8220;bad&#8221; application access to their computer, or  blocking a legitimate application from working.<\/p>\n<p>The other downside of software firewalls is that <em>all<\/em> (unfiltered) network traffic reaches your computer.  So if an exploit is  smart enough, it may be able to avoid or disable the firewall that is  running as an application or service and do its dirty deed.<\/p>\n<p>A <strong>hardware firewall<\/strong>, on the other hand, is a physical box that  sits between your network and the Internet.  So the &#8220;bad&#8221; traffic it  filters never even touches the reaches the network, let alone the actual  computers.    There is also no software to slow down your computer,  giving you better system performance.<\/p>\n<p>A hardware firewall also won&#8217;t interfere with LAN traffic.  Its only  concern is  with the traffic passing through it. Depending on the  firewall, however, you could possibly see a reduction in Internet  throughput.<\/p>\n<p>So now we get down to the nitty-gritty, why a Firewall over a Router?  The biggest advantage is how outgoing traffic is handled in a firewall  vs. a low-end router. In routers, it&#8217;s assumed that any Internet-bound  traffic is ok by default, and it&#8217;s freely passed. But in <a id=\"itxthook1\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">firewalls<\/a>, traffic in both directions is <em>blocked<\/em> by default and must be specifically enabled.<\/p>\n<div><ins><ins id=\"aswift_0_anchor\"><\/ins><\/ins><\/div>\n<p>This  is a big thing for security, because the &#8220;allow-by-default&#8221; approach  taken by consumer routers allows anything on the LAN to communicate to  anything on the &#8216;net. And worms, &#8216;bots and other nasties depend on that  unrestricted access.<\/p>\n<p>One of the biggest security risks when it comes to outgoing  connections is Key Loggers (hardcore gamers, take note).  One of my  recent addictions was to a MMORPG that has a key logger scare one or two  times a month.  Many people have lost accounts, characters, gear,  money, and most of all, time.  All of this could have been prevented  with a good <a id=\"itxthook2\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">firewall<\/a> filtering outgoing traffic.<\/p>\n<p>For  small business owners, the &#8220;deny-by-default&#8221; approach of  firewalls also prevents people from doing things they shouldn&#8217;t, which  could be a security risk.  I deal with HIPAA on a daily basis, and so  our work network remains locked down, as does my home network.  If  for  some reason confidential data were transmitted without us knowing, or  our allowing it, major fines would apply.<\/p>\n<p>So while you might be concerned about undesired traffic getting <em>into<\/em> your network,  you should also seriously think about controlling  outgoing traffic.  This doesn&#8217;t necessarily mean that you need to  upgrade to an expensive hardware firewall. Because you can control  outbound traffic easily by controlling access to ports using the <strong>port filtering<\/strong> feature built into virtually all consumer-grade routers.<\/p>\n<p>Say you don&#8217;t want <a id=\"itxthook3\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/lanwan\/lanwan-basics\/30336-routers-vs-firewalls#\">computers<\/a> 1-5 browsing the web, concerned about slacking.  You can add filters  blocking port 80 completely, or just allow the computers you want,  specific access out over those ports.  Even the most basic consumer  routers can do this.<\/p>\n<p>But, unfortunately, the feature is known by different names. For  example, on the D-Link DGL-4100, 4300 &#8220;Gamer&#8221; routers, it&#8217;s found in the  <strong>Advanced<\/strong> admin section under &#8220;<strong>Access Control<\/strong>&#8220;. But on the Linksys WRT54G, port filtering is found in the <strong>Access Rescrictions<\/strong> section. Both do the same thing, but with different user interfaces.<\/p>\n<h3>Making the Choice<\/h3>\n<p>So should you get an enterprise-grade firewall, or a consumer router?  Well, if you opt for the firewall, you actually might also need a  separate router. Enterprise firewalls like the Cisco PIX or  Juniper  NetScreen series aren&#8217;t  full-featured routers.   They can handle basic  routing, but that is not their primary purpose.<\/p>\n<p>You also have to think about ease of use.  Ease of use is probably  the most important factor that makes or breaks products like this for  SOHO\/Small Business.  Cisco has been fine-tuning its PIX GUI for awhile  now, but with no major leaps forward in making it easier to set up.<\/p>\n<p>Firewalls tend to be designed for networking professionals, often  with training for the specific product. Most small businesses  can&#8217;t  afford to have people working full-time setting up an infrastructure for  three computers, or even to hire &#8220;certified&#8221; consultants to do it.<\/p>\n<p>Now by saying this, I don&#8217;t want to scare people off of buying  products like PIXes and NetScreens. But unlike consumer routers, they  won&#8217;t work out of the box, at least in the sense of plug and play.  If  you want out, you have to open the ports.   It&#8217;s all doable, it just  takes time and know-how.<\/p>\n<p>I recently purchased a <strong>Cisco ASA 5505<\/strong> for my home network.   For some, this would be overkill, but I really value my security.  I  mainly wanted a security device that allowed good control over outgoing  port use.  I chose Cisco over Juniper because that&#8217;s what I know.  And I  chose the ASA because of the features it offers over the PIX. (The ASA  is built on the PIX system, but with newer security upgrades, as well as  a complete VPN overhaul.)<\/p>\n<p><strong>To recap:<\/strong><\/p>\n<ul>\n<li>A normal everyday router, where you just want to be able to share an  Internet connection will work perfectly.  Just keep your router  settings locked down, don&#8217;t open any ports and you&#8217;ll be fine.<\/li>\n<li>For a network that hosts servers that need to be accessed from the  Internet (port forwarding) a router with a built-in SPI+NAT-firewall  would be better for you. SPI+NAT is available in virtually all consumer  routers, so you don&#8217;t need to jump up to an &#8220;enterprise&#8221; router \/  firewall to get it.<\/li>\n<li>Small businesses and  really paranoid security types, should  definitely consider  a low-end &#8220;enterprise-grade&#8221; firewall for the  additional security provided by good outgoing traffic controls.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Review of the Basics We&#8217;re often asked at SmallNetBuilder what the advantages are of using a &#8220;high-end&#8221; or &#8220;enterprise&#8221; grade firewall, such as a Cisco PIX, Juniper Netscreen, etc., over a consumer-grade router. To get a good start on the subject, let&#8217;s review a few basics, the first being NAT. I&#8217;m sure many of you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-204","post","type-post","status-publish","format-standard","hentry","category-networking-stuff"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=204"}],"version-history":[{"count":3,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/204\/revisions"}],"predecessor-version":[{"id":505,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/204\/revisions\/505"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}