CISSP · · 5 min read

Firewalls, Proxies, and Network Gateways: Choosing the Right Gatekeeper for the Job

Not all firewalls are created equal. Learn how packet filtering, stateful, and application gateways differ and where proxies and WAFs fit into a layered network security design.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Most enterprises own several kinds of firewalls and gateways. If you cannot explain what each one does, where it sits, and what risks it addresses, you will struggle to design effective controls or answer Domain 4 questions with confidence.

Core concept explained simply

Gateways are chokepoints that control how traffic flows between networks. Firewalls, proxies, and specialized gateways all act as gatekeepers with different levels of understanding about the traffic they see.

Types of firewalls

Firewalls have evolved over time. Understanding the types helps you pick the right tool and interpret exam scenarios.

The more application aware a firewall is, the deeper it can inspect, but the more processing and configuration it requires.

Network Address Translation (NAT)

NAT modifies IP address information in packet headers as they pass through a firewall or router. Common uses include:

It is important to remember that NAT is primarily an addressing function. It can obscure internal structure but should not be treated as a primary security control. Attackers can still reach services that are forwarded or exposed.

Proxies and web gateways

Proxies act as intermediaries between clients and servers. Key varieties include:

Proxies operate at higher layers than traditional packet filters, which allows them to make decisions based on URLs, domains, and content.

Web application firewalls (WAFs)

A WAF is a specialized gateway that focuses on HTTP and HTTPS traffic to web applications.

WAFs complement network firewalls. They protect the application layer, while network firewalls protect the underlying network and transport layers.

Other specialized gateways

Enterprise networks also rely on:

Each type addresses specific risk patterns. Together, they form a layered gateway architecture.

Placement patterns

Typical placements include:

Good designs minimize the number of parallel gateways in a single path while using enough layers to cover different risks.

CISSP lens

For Domain 4, expect questions that require you to:

When reading a scenario, ask which layer the described control operates at and whether that matches the risk being addressed.

Real-world scenario

A company relied on a stateful perimeter firewall that allowed outbound traffic on ports 80 and 443. Users could browse the web freely, and internal servers could make outbound connections as needed.

Attackers compromised a user through a phishing email and installed malware that used encrypted command and control over HTTPS. Since outbound 443 was allowed to almost anywhere, the firewall saw this traffic as ordinary web browsing.

The malware slowly exfiltrated data to a cloud storage provider over HTTPS. No one noticed until an internal audit revealed unusual data transfers.

The company responded by:

This change introduced more complexity and required careful rollout, but it significantly increased the ability to detect and block malicious outbound traffic.

Common mistakes and misconceptions

Typical errors with firewalls and gateways include:

A CISSP should be able to spot when a design puts too much trust in a single gateway or uses the wrong type of control for the problem.

Actionable checklist

To improve your firewall and gateway posture:

Key takeaways

Optional exam-style reflection question

A security architect wants to prevent users from accessing known malicious websites while still allowing general web browsing. Which control is most appropriate?

Answer: A secure web gateway or web proxy with URL filtering and reputation services is the best option. It can inspect HTTP and HTTPS requests, compare destinations against threat intelligence, and block access to known malicious sites while allowing legitimate traffic.

Read next

© 2025 Threat On The Wire. All rights reserved.