Why Should I Update My Firewall? | Edge Threat Management - Arista (2024)

Staying up to date with your network security appliance is absolutely necessary. For the same reasons we regularly update our phones, browsers, and desktop operating systems, it’s even more important to update a network firewall.

Why Should I Update My Firewall? | Edge Threat Management - Arista (1)

Software vulnerabilities and the security technologies to protect against them evolve daily. At Untangle, we stay on top of these changes to ensure that our NG Firewall incorporates the latest threat prevention and network management capabilities. Once a new build is tested and ready, it can be applied automatically to your deployment without any human interaction. Learn more about automatic upgrades on the Untangle Wiki.

Bug Fixes

Each release includes dozens of bug fixes to address issues that often arise from changes in external software. These fixes ensure smooth operation and continuous Internet access for your networked devices.

Security Updates

The table below outlines some of the core components that receive security updates with most releases.

Operating SystemThe system kernel and bundled services include hundreds of updates in every release. These updates include fixes to bugs, vulnerabilities, device drivers, security certificates and more.
AntivirusThe antivirus scanning engine is often updated to maintain compatibility with the operating system and signature database. In some cases older versions of the scanning engine become obsolete, and it is necessary to update NG Firewall to continue receiving the latest malware signatures.
Intrusion PreventionThe intrusion prevention system and signature database frequently requires updates to be able to identify and block the latest types of network intrusions and exploits.
Application ControlFile sharing and anonymizing software change regularly to evade content filters. To continue to accurately identify these types of applications, the Application Control signature database updates with each release.
Virtual Private NetworkingUntangle NG Firewall supports industry standard remote connectivity via IPsec VPN and OpenVPN. These technologies frequently require updates to maintain the latest encryption standards and tunneling protocols used by mobile devices and third party VPN gateways.
Operating SystemThe system kernel and bundled services include hundreds of updates in every release. These updates include fixes to bugs, vulnerabilities, device drivers, security certificates and more.
AntivirusThe antivirus scanning engine is often updated to maintain compatibility with the operating system and signature database. In some cases older versions of the scanning engine become obsolete, and it is necessary to update NG Firewall to continue receiving the latest malware signatures.
Intrusion PreventionThe intrusion prevention system and signature database frequently requires updates to be able to identify and block the latest types of network intrusions and exploits.
Application ControlFile sharing and anonymizing software change regularly to evade content filters. To continue to accurately identify these types of applications, the Application Control signature database updates with each release.
Virtual Private NetworkingUntangle NG Firewall supports industry standard remote connectivity via IPsec VPN and OpenVPN. These technologies frequently require updates to maintain the latest encryption standards and tunneling protocols used by mobile devices and third party VPN gateways.

Network Management & Connectivity Enhancements

The following rollup outlines some of the recent and noteworthy enhancements to Untangle NG Firewall. Customers with a valid subscription and automatic upgrades can take full advantage of these recent additions.

Command CenterCommand Center is a cloud-based service for managing your Untangle appliances.
With Command Center you can:
  • Perform configuration backups
  • Create configuration templates
  • Synchronize configuration to multiple appliances
  • Remotely access any of your appliances through a single account

Command Center requires version 12.2 and higher.

WiFiSpecific hardware versions of NG Firewall include a wireless network interface that can be used either as a WAN interface for wireless internet connectivity, or it can be used as an access point to securely connect wireless devices on the local network.
Amazon Web Services DeploymentYou can move your on-premises installation of NG Firewall to Amazon Web Services. This type of deployment is suitable for organizations that operate their networking environment virtually in AWS.
Tunnel VPNTunnel VPN enables you to route internet traffic through a VPN tunnel. This is suited for remote networks that need to route through a central or cloud-based firewall to consolidate access policies and content filtering.
Captive Portal Single Sign-on AuthenticationOrganizations using G-Suite, Office365, and other types of OAuth providers can authenticate users against these services. For guest access, you can authenticate users against Facebook.
IPsec IKEv2Devices can remotely connect using the IKEv2 protocol over IPsec. This enables VPN tunnelling using the native capabilities built into modern desktop, mobile, and tablet devices. IKEv2 improves on IKEv1 by enabling multiple VPN tunnels on networks that use network address translation.
UPnP supportBy supporting Universal Plug and Play, NG Firewall enables network devices to seamlessly discover each other’s presence on the network and establish functional network services for data sharing, communications, and entertainment.
GeolocationSessions are visualized on a world map so you can see exactly where your traffic is going. Configure rules to block access to or from specific countries. View reports to see how much of your network traffic comes from other countries.
DashboardThe Dashboard feature simplifies network management by giving the administrator a single view of all important activities and notifications.
VRRPVirtual Router Redundancy Protocol improves network availability and business continuity by allowing you to set up two Untangle NG Firewalls to failover if one of them becomes unavailable.
Command CenterCommand Center is a cloud-based service for managing your Untangle appliances.
With Command Center you can:
  • Perform configuration backups
  • Create configuration templates
  • Synchronize configuration to multiple appliances
  • Remotely access any of your appliances through a single account

Command Center requires version 12.2 and higher.

WiFiSpecific hardware versions of NG Firewall include a wireless network interface that can be used either as a WAN interface for wireless internet connectivity, or it can be used as an access point to securely connect wireless devices on the local network.
Amazon Web Services DeploymentYou can move your on-premises installation of NG Firewall to Amazon Web Services. This type of deployment is suitable for organizations that operate their networking environment virtually in AWS.
Tunnel VPNTunnel VPN enables you to route internet traffic through a VPN tunnel. This is suited for remote networks that need to route through a central or cloud-based firewall to consolidate access policies and content filtering.
Captive Portal Single Sign-on AuthenticationOrganizations using G-Suite, Office365, and other types of OAuth providers can authenticate users against these services. For guest access, you can authenticate users against Facebook.
IPsec IKEv2Devices can remotely connect using the IKEv2 protocol over IPsec. This enables VPN tunnelling using the native capabilities built into modern desktop, mobile, and tablet devices. IKEv2 improves on IKEv1 by enabling multiple VPN tunnels on networks that use network address translation.
UPnP supportBy supporting Universal Plug and Play, NG Firewall enables network devices to seamlessly discover each other’s presence on the network and establish functional network services for data sharing, communications, and entertainment.
GeolocationSessions are visualized on a world map so you can see exactly where your traffic is going. Configure rules to block access to or from specific countries. View reports to see how much of your network traffic comes from other countries.
DashboardThe Dashboard feature simplifies network management by giving the administrator a single view of all important activities and notifications.
VRRPVirtual Router Redundancy Protocol improves network availability and business continuity by allowing you to set up two Untangle NG Firewalls to failover if one of them becomes unavailable.
Why Should I Update My Firewall? | Edge Threat Management - Arista (2024)

FAQs

Why Should I Update My Firewall? | Edge Threat Management - Arista? ›

Security Updates

What are some possible reasons you may need to make firewall changes? ›

Improper firewall configuration can result in attackers gaining unauthorized access to protected internal networks and resources. As a result, cyber criminals are constantly on the lookout for networks that have outdated software or servers and are not protected.

Why upgrade to ngfw? ›

NGFWs provide greater protection against new and emerging cybersecurity threats due to advanced features such as intrusion prevention, application control and deep packet inspection.

What is the purpose of a software firewall and why this should be installed on a personal device? ›

The main functions of a software firewall include: Applying security rules to screen incoming and outgoing traffic. Blocking malicious programs and traffic that seek to gain access to network resources. Allowing authorized users to connect quickly and easily.

How should a firewall administrator guard against new risks? ›

It is important for administrators and IT security staff to carry out regular security audits to ensure no unauthorized changes have taken place. This will also keep you updated on the necessary changes made to the firewall and warn you against any potential risks created by these changes.

Why is it important to update your firewall? ›

Updated firewalls support the latest security protocols and access permissions (IAM), which are essential for safeguarding your network against modern threats. Moreover, regular updates optimize network performance, providing improved visibility and control over network traffic.

Why is a firewall modification a good idea? ›

Implementing a change management strategy for firewall rule changes requires a structured process to enable secure and fast modifications. This strategy reduces the danger of illegal or disruptive changes, improves overall firewall performance, and simplifies post-incident analysis and compliance adherence.

Why is it necessary to constantly be updated rules and packages on a firewall? ›

The cyber threat landscape is always changing. Therefore, you must regularly review the firewall rules to ensure they provide optimal security against threats.

What is the difference between NGFW and unified threat management? ›

With a UTM solution, you get what may be an adequate, comprehensive solution out of the box. If it covers many different kinds of threats, it may suffice. With an NGFW, you get the best performance only after making some adjustments, tuning your solution to suit the needs of your organization.

What is the lifespan of a firewall? ›

When a firewall is working, it's the last thing on your mind. But, did you know that most firewalls have a lifespan of three to five years? There are many signs that it's time for a new firewall. Your current product may lag or be reaching the end of its support life.

What are the pros and cons of firewalls? ›

The advantage of software firewalls is their ability to control the specific network behavior of individual applications on a system. A significant disadvantage of a software firewall is that it is typically located on the same system that is being protected.

Why is firewall important in cyber security? ›

Prevents hacking

With the rise of data theft and criminals holding systems hostage, firewalls have become even more important, as they prevent hackers from gaining unauthorized access to your data, emails, systems, and more. A firewall can stop a hacker completely or deter them to choose an easier target.

What are the two primary purposes of a firewall? ›

The primary use of a firewall in networking is to secure the network from cyberattacks. For example, a firewall prevents malicious and unwanted content from entering your environment. As well, a firewall protects vulnerable systems and private data in the network from unauthorized access–such as hackers or insiders.

Why is firewall management important? ›

Firewall management helps organisations meet data protection, privacy, and security standards by controlling access to sensitive information, monitoring data traffic, and maintaining audit logs.

What is the first rule in a firewall? ›

The first rule in a firewall, often considered the most fundamental rule, is the "default deny" or "implicit deny" rule. This rule blocks all traffic by default and only allows traffic that is explicitly permitted by subsequent rules.

What threats does a firewall not protect you against? ›

For example, a firewall cannot prevent someone from utilizing an authenticated Telnet connection to infiltrate your internal computers, or from tunneling an unauthorized protocol via another, approved protocol. A firewall can only limit connections that pass through it.

Why would you need a firewall? ›

What do firewalls do? Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet.

What problems can a firewall cause? ›

Top Firewall Vulnerabilities and Threats
  • Lax Password. ...
  • Outdated Firewall Software. ...
  • Failure to Activate Controls. ...
  • Firewall Access May Be Too Lax. ...
  • Lack of Documentation. ...
  • Vulnerability to Insider Attacks. ...
  • Inspection Protocols Are Too Basic. ...
  • Penetration Testing Services.

What is the biggest problem with a firewall? ›

Drawbacks of a firewall system are as follows: A firewall cannot defend a network from internal threats such as backdoors. For example, a disgruntled employee colludes with an external attacker. If all connections flow through the firewall, a bottleneck may arise.

How do I improve my firewall? ›

How to Improve Your Firewall Security?
  1. Limit VPN Access.
  2. Monitor User Access.
  3. Shut Off Unused Network Services.
  4. Update Firewall Software.
  5. Automate the process of firewall updating.
  6. Buy New Security Hardware.
  7. Secure Wireless Access.

Top Articles
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6496

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.