{"id":8754,"date":"2018-02-02T15:26:30","date_gmt":"2018-02-02T15:26:30","guid":{"rendered":"https:\/\/www.apen.es\/?page_id=8754"},"modified":"2025-07-14T11:02:01","modified_gmt":"2025-07-14T11:02:01","slug":"firewall","status":"publish","type":"page","link":"https:\/\/www.apen.es\/en\/computer-glossary\/firewall\/","title":{"rendered":"Firewall"},"content":{"rendered":"<h2 class=\"wp-block-heading\">WHAT IS A FIREWALL?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg\" alt=\"\" class=\"wp-image-8756\" title=\"Image of a firewall. What is a firewall?\" srcset=\"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg 300w, https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-768x512.jpg 768w, https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-800x535.jpg 800w, https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL.jpg 960w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p>It is a tool responsible for analyzing connections and controlling traffic between a local area network (LAN) and external internet connections, commonly known as wide area networks (WAN). It manages the information entering and leaving the network to ensure a secure network, thus preventing unauthorized access.<\/p>\n\n\n\n<p><strong>Firewall history<\/strong><\/p>\n\n\n\n<p>It emerged in 1980, shortly after the advent of the internet, with the aim of protecting user data. The number of individuals using computers with internet connections was steadily increasing; at that time, routers themselves kept networks separate from one another. In the late 1980s, the internet community experienced security breaches by some users. Clifford Stoll discovered how to manipulate the German espionage system. Another attack was the Morris worm, the first large-scale internet security attack, affecting six thousand servers and constituting the first violation of the Computer Fraud and Abuse Act, impacting approximately 101,000 connected computers.<\/p>\n\n\n\n<p>It&#039;s a filter that regulates the flow of information between networks. There are thousands of ports, each with its specific function. Ports that allow a connection are said to be open, and ports that don&#039;t are said to be closed. Firewall parameters are automatically preset by the computer itself, but they can be modified and defined by the user.<\/p>\n\n\n\n<p><strong>How firewalls work<\/strong><\/p>\n\n\n\n<p>The firewall is typically located at the junction between two networks. Between a public and a private network, if the traffic complies with the rules configured in the firewall, information can enter or leave the network. If it does not comply with the firewall&#039;s rules, the information will be blocked and unable to reach its destination.<\/p>\n\n\n\n<p>Content filtering allows administrators to easily block certain types of web content without having to manually block each individual URL. Inappropriate websites and social media sites can be blocked quickly and easily.<\/p>\n\n\n\n<p>Examine the header of a packet to see the source and destination. From there, depending on how the rules are defined, the firewall will act in one way or another, either deleting or forwarding the file.<\/p>\n\n\n\n<p><strong>Firewalls can be:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hardware firewall: <\/strong>These devices are placed between the router and the internet connection independently; nowadays, broadband routers already have them built in. They help provide strong protection against potential attacks such as viruses, worms, and Trojans. These devices require some technical knowledge for their installation, configuration, and daily monitoring.<\/li>\n\n\n\n<li><strong>Software firewall: <\/strong>There are two types, the free one and the paid one.<\/li>\n<\/ul>\n\n\n\n<p>It&#039;s the more common of the two software options due to its easy installation and lower price. It can come pre-installed or be installed manually. It protects your computer from unauthorized access attempts and even viruses.<\/p>\n\n\n\n<p><strong>Types of firewalls<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Firewall proxy<\/strong>: Network security system, which in addition to selecting which traffic is allowed and which is not, uses technology to deeply analyze packets to look for signs of attack.<\/li>\n\n\n\n<li><strong>Stateful inspection firewall<\/strong>It allows blocking traffic based on criteria such as state, port, and protocol. It tracks activity from the opening of a connection until it is closed. Filtering is based on restrictions defined by the administrator.<\/li>\n\n\n\n<li><strong>Firewall for unified threat management (UTM)<\/strong>This firewall focuses on simplicity and ease of use. Intrusion prevention and antivirus protection, it also includes additional services such as cloud management.<\/li>\n\n\n\n<li><strong>Next-generation firewall: <\/strong>An advanced firewall that performs more functions than simple filtering, allowing: application detection and control to block applications that may pose risks<\/li>\n<\/ul>\n\n\n\n<p><strong>NGFW focused on threats<\/strong>It offers more advanced threat detection. This type of firewall allows for: a complete overview, enabling you to see the highest-risk sectors; automated security with faster response times; and unified policies that provide protection during an attack.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfQUE \u00c9S UN FIREWALL? Es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN) y conexiones externas de internet com\u00fanmente llamado (WAN). Gestionando la informaci\u00f3n que entra y sale de la red, para garantizar una red segura, evitando as\u00ed que no ocurran accesos no autorizados. Historia firewall Surge&#8230;<\/p>","protected":false},"author":4,"featured_media":0,"parent":6185,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-landing-glosario.php","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-8754","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Firewall - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"\u00bfQue es un firewall? Un firewall es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN). L\u00edderes en Barcelona.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/computer-glossary\/firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Firewall - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"\u00bfQue es un firewall? Un firewall es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN). L\u00edderes en Barcelona.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/computer-glossary\/firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T11:02:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/\",\"name\":\"Firewall - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/APEN-FIREWALL-300x200.jpg\",\"datePublished\":\"2018-02-02T15:26:30+00:00\",\"dateModified\":\"2025-07-14T11:02:01+00:00\",\"description\":\"\u00bfQue es un firewall? Un firewall es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN). L\u00edderes en Barcelona.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/APEN-FIREWALL-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/APEN-FIREWALL-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glosario de inform\u00e1tica\",\"item\":\"https:\\\/\\\/www.apen.es\\\/glosario-de-informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Firewall - Apen Inform\u00e1tica","description":"\u00bfQue es un firewall? Un firewall es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN). L\u00edderes en Barcelona.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/computer-glossary\/firewall\/","og_locale":"en_US","og_type":"article","og_title":"Firewall - Apen Inform\u00e1tica","og_description":"\u00bfQue es un firewall? Un firewall es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN). L\u00edderes en Barcelona.","og_url":"https:\/\/www.apen.es\/en\/computer-glossary\/firewall\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_modified_time":"2025-07-14T11:02:01+00:00","og_image":[{"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/","url":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/","name":"Firewall - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg","datePublished":"2018-02-02T15:26:30+00:00","dateModified":"2025-07-14T11:02:01+00:00","description":"\u00bfQue es un firewall? Un firewall es una herramienta encargada de analizar las conexiones y controlar el tr\u00e1fico entre una red local (LAN). L\u00edderes en Barcelona.","breadcrumb":{"@id":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/APEN-FIREWALL-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/glosario-de-informatica\/firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Glosario de inform\u00e1tica","item":"https:\/\/www.apen.es\/glosario-de-informatica\/"},{"@type":"ListItem","position":3,"name":"Firewall"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/8754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=8754"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/8754\/revisions"}],"predecessor-version":[{"id":56556,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/8754\/revisions\/56556"}],"up":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/pages\/6185"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=8754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}