Network security controls are the technical tools that implement security policies at the network and application layer. For the CISSP exam, these controls are tested at the conceptual level: what does each control do, what are its limitations, where is it deployed, and which control is most appropriate for a given scenario. Domain 7 covers these controls in the context of security operations — how they are managed and monitored, not how they are configured.

Firewall Generations

Firewalls have evolved significantly over time. Understanding the generations and what each can and cannot do is a consistent exam topic.

First generation – Packet filter firewalls examine individual IP packets and make allow/deny decisions based on source IP address, destination IP address, source port, destination port, and protocol. Packet filters are fast and scalable but stateless — they examine each packet in isolation without awareness of connection context. They cannot distinguish between a packet that is part of an established, legitimate connection and a packet that is part of an attack exploiting the same ports. A TCP packet with just the ACK flag set could be passed by a packet filter even though no SYN was seen, allowing attackers to bypass rules.

Second generation – Stateful inspection firewalls track the state of network connections in a state table. A stateful firewall knows which connections have been established (completed the TCP three-way handshake) and allows packets only when they match a known connection state. This prevents the bypasses possible against packet filters. Stateful inspection became the standard for perimeter firewalls.

Third generation – Application layer firewalls (proxy firewalls) understand application-layer protocols and can inspect application content. An HTTP proxy firewall can see the HTTP request method, URL, and payload — not just the TCP port. This allows detection of application-layer attacks (SQL injection embedded in an HTTP parameter) that packet filter and stateful inspection firewalls cannot see. Application layer firewalls operate as proxies, terminating the client connection and initiating a new connection to the server.