PracticeBlogFlashcardsEspañol

Firewalls, IDS, IPS, Security Zones, and Screened Subnets

Key Takeaways

  • Stateful firewalls track connection state, while stateless filters evaluate packets against rules without session awareness.
  • NGFW platforms add application awareness, identity-aware policy, content inspection, and threat intelligence features.
  • IDS detects and alerts; IPS can block, reset, or drop traffic inline.
  • Proxy servers and load balancers can improve control, visibility, availability, and traffic steering when placed correctly.
  • Security zones and screened subnets separate public, internal, management, and partner traffic by trust level.
Last updated: April 2026

Security Devices and Zone Design

Network+ expects security controls to be placed for a reason. A firewall rule, IDS sensor, IPS device, proxy, or load balancer is useful only when it sees the right traffic and enforces the right policy. The exam often describes a business need, a traffic path, or a symptom, then asks which device or design best fits.

Firewall Types

Firewall typeHow it decidesCommon useLimitation
Stateless firewallEvaluates each packet against rules such as source, destination, port, and protocolSimple router ACLs, high-speed edge filteringDoes not understand whether traffic belongs to an established session
Stateful firewallTracks sessions and connection statePerimeter, internal segmentation, data center zonesNeeds state table capacity and correct asymmetric routing design
NGFWAdds application awareness, user identity, URL filtering, malware inspection, and threat intelligenceUser Internet edge, data center, cloud perimeterMore complex policy and higher resource cost
Host-based firewallRuns on an endpoint or serverProtects a host even when it moves networksMust be managed consistently across devices

Stateless filtering is still useful. For example, a router ACL can drop obviously unwanted inbound traffic before it reaches a stateful firewall. Stateful firewalls are usually better for policy between zones because they can allow return traffic for established sessions without opening broad inbound access.

Proxy, IDS, IPS, and Load Balancer Roles

ControlTraffic positionPrimary function
Forward proxyBetween clients and external servicesControls and logs outbound user access
Reverse proxyIn front of internal web applicationsPublishes applications and hides internal server details
IDSOut of band or passive tap/SPANDetects suspicious traffic and alerts
IPSInlineDetects and blocks or resets suspicious traffic
Load balancerIn front of service poolDistributes client traffic and supports availability

An IDS can be safer to deploy because it does not sit inline, but it cannot directly block traffic. An IPS can block traffic, but poor tuning can interrupt legitimate service. A load balancer is not automatically a firewall, but it can terminate TLS, perform health checks, support persistence, and send traffic only to healthy application nodes.

Security Zones

Security zones group systems by trust level and policy. A common design uses an untrusted Internet zone, a screened subnet for public services, an internal user zone, a server zone, a management zone, and sometimes partner or guest zones.

ZoneTypical contentsPolicy idea
UntrustedInternet or external networksNever trusted by default
Screened subnetPublic web, VPN, reverse proxy, mail relay, DNS servicesPermit limited inbound flows from Internet and limited outbound flows to internal services
Internal userManaged laptops and desktopsPermit business services, restrict direct server administration
ServerApplication, database, directory, file servicesPermit required app flows, deny unnecessary user access
ManagementAdmin workstations, jump hosts, monitoring, backupHighly restricted access to management interfaces
GuestVisitor devicesInternet access only, no internal access

A screened subnet, sometimes called a DMZ, reduces exposure by preventing public-facing systems from sitting directly on the internal LAN. If a public web server is compromised, the attacker should still face firewall policy before reaching database, directory, management, or user systems.

Placement Examples

RequirementGood placement
Block malicious inbound traffic before it reaches web serversIPS or NGFW inline before screened subnet services
Alert on suspicious east-west traffic without risking outageIDS sensor on a tap or SPAN port near internal server traffic
Control employee web browsingForward proxy or NGFW egress policy at the Internet edge
Publish internal web app to the InternetReverse proxy or load balancer in the screened subnet
Restrict administration of routers and switchesManagement zone with firewall rules and named admin access

Common Traps

  • A firewall rule that allows any source to any destination is not meaningful segmentation.
  • A stateless ACL may block return traffic unless explicit rules are included.
  • An IDS alert is not the same as prevention.
  • An IPS must be tuned to avoid blocking legitimate business traffic.
  • A screened subnet should have limited paths to internal systems, not unrestricted access.
  • A load balancer improves service distribution, but it does not replace zone policy.
Test Your Knowledge

A company wants to publish a public web application while limiting direct exposure of the internal application servers. Which placement best fits?

A
B
C
D
Test Your Knowledge

Which device can detect suspicious traffic but normally cannot block it because it is deployed out of band?

A
B
C
D
Test Your KnowledgeMatching

Match each control to the most accurate description.

Match each item on the left with the correct item on the right

1
Stateful firewall
2
Stateless ACL
3
Forward proxy
4
Screened subnet