{"id":54,"date":"2019-03-04T22:51:17","date_gmt":"2019-03-04T20:51:17","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=54"},"modified":"2020-05-31T01:38:37","modified_gmt":"2020-05-30T23:38:37","slug":"what-is-network-firewall-security-and-how-works","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/","title":{"rendered":"What is Network Firewall Security and how works"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Network Firewall: Definition<\/strong><\/p>\n<p style=\"text-align: justify;\">A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination of the two.<\/p>\n<p style=\"text-align: justify;\">Network firewalls\u00a0are responsible for protecting an internal computer network against malicious access from the outside, such as vulnerable open network ports or malware-infested websites.\u00a0Network firewalls\u00a0can be found in schools, businesses, intranets, and homes. It is also possible to configure a\u00a0network firewall\u00a0to limit the access of internal users to outside connections, for instance, in the case of workplace locks or parental controls.<\/p>\n<p style=\"text-align: justify;\"><strong>Forms of\u00a0Network Firewalls<\/strong><\/p>\n<p style=\"text-align: justify;\">Network administrators are provided with a wide range of approaches when choosing and configuring protection for the networks they oversee. The different types of firewalls include:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Next-generation firewall (NGFW)<\/strong>: Employs a multilayered approach to integrate enterprise firewall capabilities with an intrusion prevention system (IPS) and application control.<\/li>\n<li><strong>Packet-filtering firewall:<\/strong>\u00a0Studies packets in isolation and does not know the packet&#8217;s context.<\/li>\n<li><strong>Firewall:<\/strong>\u00a0Checks packets at the application layer of the Open Systems Interconnection (OSI) reference model.<\/li>\n<li><strong>Inspection firewall:<\/strong>\u00a0Studies network traffic to determine whether one packet is related to another packet.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>Network Firewalls\u00a0vs. Computer Firewalls<\/strong><\/p>\n<p style=\"text-align: justify;\">It is possible for you to install a few software\u00a0firewall\u00a0programs directly onto the hard drive of a computer that needs it. Some antivirus programs are also available with inbuilt firewalls. In the case of a\u00a0network firewall, you will be able to disable a computer-based firewall. However, these firewalls protect only the computers that run them. In contrast,\u00a0network firewalls\u00a0are capable of protecting the whole network and are usually installed at the network gateway.<\/p>\n<p style=\"text-align: justify;\"><strong>How a Firewall Works<\/strong><\/p>\n<p style=\"text-align: justify;\">When your computer is equipped with firewall protection, every single thing that goes in and out of it is monitored. \u00a0The firewall has the potential to monitor all this information traffic in order to allow \u2018good data\u2019 in and block \u2018bad data\u2019 from entering your system.<\/p>\n<p style=\"text-align: justify;\">A firewall differs from a simple traffic analyzer, however, in that a\u00a0<strong>network administrator<\/strong>\u00a0can actually take action to control that traffic. A few firewalls can even be employed for blocking everything except users and actions that are specifically allowed by you. This granular approach allows you to block all activity on a network so that you will be able to manually set up safeguards against network-related threats.<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Proxy service:<\/strong>\u00a0A firewall proxy server is an application that functions as an intermediary between systems. Information from the internet is saved by the firewall and then transmitted to the requesting system and vice versa.\u00a0<strong>Firewall<\/strong>\u00a0proxy servers are capable of operating at the application layer of the firewall, where both ends of a connection are made to conduct the session via the proxy. They work by developing and running a process on the firewall that mirrors a service as if it were actually running on the end host, thus consolidating all data transfer for a specific activity to the firewall for scanning.<\/li>\n<li><strong>Stateful inspection:<\/strong>\u00a0This is considered to be a modern method of firewall scanning, that does not depend on the memory-intensive examination of all information packets. \u00a0A \u2018stateful\u2019 firewall holds vital attributes of each connection in a database of reliable information, for the duration of the session. These attributes, together known as the \u2018state\u2019 of the connection, could include details like the IP addresses and ports involved in the connection and the sequence numbers of the packets that get transferred. The firewall compares data being transferred to the copy applicable to that transfer held in the database. The information is allowed only if the comparison yields a positive match otherwise it is denied.<\/li>\n<li><strong>Packet filtering:<\/strong>\u00a0This is the most elementary form of firewall software that employs pre-determined security rules to develop filters &#8211; if an incoming packet of information gets flagged by the filters, it is not allowed through. Packets that succeed in making it through the filters are sent to the requesting system whereas the others are rejected.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>Firewall Security\u00a0<\/strong><\/p>\n<p style=\"text-align: justify;\">The constant increase in cybercrime continues to become a threat to businesses all over the world. You are indeed completely aware of the fact that your organization needs\u00a0firewall security\u00a0and you may already have a firewall management program in place. However, it is always essential to have adequate knowledge about what exactly is\u00a0firewall security\u00a0and what are the benefits provided by\u00a0<strong>effective\u00a0firewall security\u00a0software<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Originally, the word firewall literally referred to a wall, which was built to stop the spread of a fire. In the field of computer firewall protection, a firewall is actually a network device that has the potential to block specific types of network traffic, developing a barrier between an untrusted network and a trusted network. It is similar to a physical firewall referring to the fact that\u00a0firewall security\u00a0tries to block the spread of computer attacks.<\/p>\n<p style=\"text-align: justify;\"><strong>Firewall security\u00a0is important as it has the following benefits:<\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\">Blocks unwanted content<\/li>\n<li style=\"text-align: justify;\">Prevents ransomware from gaining traction<\/li>\n<li style=\"text-align: justify;\">Protects your computer from unauthorized access<\/li>\n<li style=\"text-align: justify;\">Helps keep your private data such as social security number or online banking credentials safe<\/li>\n<li style=\"text-align: justify;\">Develops a secure network for multi-person interaction, such as online video games<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Network Firewall: Definition A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination of the two. Network firewalls\u00a0are responsible for protecting an internal computer network against malicious access from the outside, such as vulnerable open network ports or malware-infested websites.\u00a0Network firewalls\u00a0can be found in schools, businesses, intranets, and homes. It is also possible to configure a\u00a0network firewall\u00a0to limit the access of internal users to outside connections, for instance, in the case of workplace locks or parental controls. Forms of\u00a0Network Firewalls Network administrators are provided with a wide\u2026<\/p>\n","protected":false},"author":3,"featured_media":55,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-54","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Network Firewall Security and how works - MozDomains Blog<\/title>\n<meta name=\"description\" content=\"A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Network Firewall Security and how works - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-04T20:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:38:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/firewall_thinkstock-100583207-large.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"580\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"What is Network Firewall Security and how works\",\"datePublished\":\"2019-03-04T20:51:17+00:00\",\"dateModified\":\"2020-05-30T23:38:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/\"},\"wordCount\":868,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/firewall_thinkstock-100583207-large.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/\",\"name\":\"What is Network Firewall Security and how works - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/firewall_thinkstock-100583207-large.jpg\",\"datePublished\":\"2019-03-04T20:51:17+00:00\",\"dateModified\":\"2020-05-30T23:38:37+00:00\",\"description\":\"A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/firewall_thinkstock-100583207-large.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/firewall_thinkstock-100583207-large.jpg\",\"width\":580,\"height\":385},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-network-firewall-security-and-how-works\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Network Firewall Security and how works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Network Firewall Security and how works - MozDomains Blog","description":"A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/","og_locale":"en_US","og_type":"article","og_title":"What is Network Firewall Security and how works - MozDomains Blog","og_description":"A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination...","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-04T20:51:17+00:00","article_modified_time":"2020-05-30T23:38:37+00:00","og_image":[{"width":580,"height":385,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/firewall_thinkstock-100583207-large.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"What is Network Firewall Security and how works","datePublished":"2019-03-04T20:51:17+00:00","dateModified":"2020-05-30T23:38:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/"},"wordCount":868,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/firewall_thinkstock-100583207-large.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/","name":"What is Network Firewall Security and how works - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/firewall_thinkstock-100583207-large.jpg","datePublished":"2019-03-04T20:51:17+00:00","dateModified":"2020-05-30T23:38:37+00:00","description":"A\u00a0network firewall\u00a0shields a computer network from unauthorized access. It could take the form of a software program, a hardware device, or a combination...","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/firewall_thinkstock-100583207-large.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/firewall_thinkstock-100583207-large.jpg","width":580,"height":385},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-network-firewall-security-and-how-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is Network Firewall Security and how works"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/54\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/55"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}