Natsar Cybersecurity Insights

Diagram of a simple company network architecture showing traffic flow from the internet through a firewall, intrusion prevention system (IPS), and web application firewall (WAF) to internal servers, with sandboxing and endpoint devices connected.

  • Feb 17, 2025

Network Security Fundamentals: Firewalls, IDPS, and Zero Trust

Learn the fundamentals of network security, including firewalls, IDPS, and Zero Trust, to build a layered defense and reduce cyber risk.

Subscribe To Get Notified of New Content!

Your information stays with Natsar—we never sell it or share it.

Intended Audience: Beginner cybersecurity professionals, IT leaders, and anyone seeking to understand key network security controls and best practices.


Network security is the backbone of a strong cybersecurity posture. Without proper controls in place, attackers can move laterally, access sensitive data, and exploit vulnerabilities across an organization. Yet, too often, security teams rely on a single layer of defense, assuming that firewalls alone will keep them safe.

In reality, effective network security requires multiple layers, each serving a distinct purpose in blocking, detecting, and responding to threats. This is the principle behind Defense in Depth (see my overview here), and in this post we will look at three specific parts:

  • Firewalls – The gatekeepers that control what traffic enters and exits your network.

  • Intrusion Detection and Prevention Systems (IDPS) – The surveillance system that monitors for suspicious activity and potential intrusions.

  • Zero Trust Network Access (ZTNA) – A security model that assumes no user or device should be trusted by default, even if they are inside the network.

Let’s break down each of these pillars and explore how they work together to create a robust defense.



Firewalls: The First Line of Network Defense

Firewalls act as the bouncers of the network, controlling inbound and outbound traffic based on security rules. They analyze network packets, decide whether to allow or block them, and serve as the first layer of defense against unauthorized access.

Types of Firewalls and Their Roles

1. Traditional Firewalls (Packet Filtering)

  • The most basic type of firewall, analyzing packet headers (source/destination IP, port numbers, protocols) to allow or block traffic.

  • Fast and efficient but lacks deep inspection capabilities.

2. Stateful Inspection Firewalls

  • Keep track of active connections and contextually analyze packet flow.

  • More secure than packet filtering firewalls but require more resources.

3. Next-Generation Firewalls (NGFWs)

  • Combine traditional firewall functions with deep packet inspection, application awareness, intrusion prevention, and threat intelligence integration.

  • Critical for defending against advanced threats such as malware, zero-day exploits, and encrypted attacks.

4. Web Application Firewalls (WAFs)

  • Specifically designed to protect web applications from attacks like SQL injection, cross-site scripting (XSS), and API exploitation.

  • Essential for businesses that rely on customer-facing applications.

Firewall Best Practices

  • Implement a default deny policy: Only allow explicitly approved traffic.

  • Regularly review firewall rules and remove outdated ones.

  • Enable logging and monitoring to detect suspicious traffic.

  • Ensure firewalls are updated to patch vulnerabilities and apply new threat intelligence.

While firewalls provide a critical barrier, they are not enough on their own. Attackers constantly evolve, and relying solely on perimeter security leaves organizations vulnerable. This is where Intrusion Detection and Prevention Systems (IDPS) come into play.


Intrusion Detection and Prevention Systems (IDS/IPS)

Firewalls control access, but IDPS serve as security cameras for your network, analyzing traffic to detect anomalies, malicious activity, and known attack patterns. Some organizations will implement just an intrusion detection system (IDS) to only alert on anomalous traffic where others will implement an intrusion detection and prevention system (IDPS) which not only identifies and alerts on traffic, but also blocks it depending on how it is configured.

Key Differences Between IDS and IPS

While both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) play a critical role in network security, they serve distinct functions. Here’s a breakdown of their key differences:

  • Function

    • IDS: Monitors network traffic and alerts security teams about suspicious activity but does not take action to block threats.

    • IPS: Actively blocks or mitigates threats by automatically taking action when malicious activity is detected.

  • Placement

    • IDS: Typically placed out-of-band, meaning it passively monitors traffic without impacting network flow.

    • IPS: Positioned inline, directly in the traffic path to inspect and filter packets in real time.

  • Response to Threats

    • IDS: Generates alerts and logs events for security teams to investigate and respond manually.

    • IPS: Takes automatic action, such as dropping malicious packets, resetting connections, or blocking IP addresses and still generates alerts and logs.

  • Impact on Network Traffic

    • IDS: Does not disrupt network traffic, making it useful for monitoring without introducing latency.

    • IPS: Can potentially introduce slight latency since it must inspect, analyze, and act on packets in real time. It can also cause network problems when false positives or other issues occur that in which the IPS begins to block legitimate traffic.

IDPS Best Practices

  • Use signature-based detection for known threats and behavior-based detection for unknown anomalies (if your IDPS allows for this).

  • Regularly tune IDS/IPS rules to reduce false positives and negatives.

  • Deploy multiple sensors across different network segments to monitor traffic comprehensively.

  • Integrate with Security Information and Event Management (SIEM) solutions to enhance threat visibility.

IDPS Challenges and Limitations

While Intrusion Detection and Prevention Systems (IDPS) are essential for identifying and mitigating cyber threats, they are not without limitations. Understanding these challenges can help organizations design a more effective and realistic security strategy.

Encrypted Traffic Challenges

One of the biggest hurdles for IDPS solutions is the increasing use of encrypted traffic across networks. Many modern applications, websites, and services use TLS/SSL encryption to protect data in transit. While encryption enhances security, it also prevents traditional IDPS from inspecting the contents of network packets.

Without deep visibility into encrypted traffic, malicious activity can go undetected, allowing attackers to bypass security measures. Threats that leverage encrypted channels include:

  • Malware delivery through encrypted web traffic

  • Command and control (C2) communication between compromised hosts and attackers

  • Data exfiltration via encrypted tunnels

Deep Packet Inspection (DPI) Considerations

Organizations looking to inspect encrypted traffic may turn to Deep Packet Inspection (DPI), which allows security tools to analyze packet contents beyond just headers. However, DPI comes with significant challenges:

  • Performance Overhead – DPI is computationally expensive, often leading to increased latency and potential bottlenecks.

  • Legal and Privacy Issues – Decrypting network traffic raises ethical and regulatory concerns, particularly in industries dealing with sensitive or personal data.

  • Infrastructure Maturity – Effective DPI requires a well-managed PKI (Public Key Infrastructure), strong key management policies, and advanced security personnel capable of maintaining and troubleshooting decryption technologies.

Because of these factors, many organizations take a selective approach to decryption, applying it only in high-risk areas, such as inspecting outbound traffic for data exfiltration or scanning inbound traffic from untrusted sources.

False Positives and Alert Fatigue

IDPS solutions generate a large volume of alerts, many of which turn out to be false positives. Over time, security teams may experience alert fatigue, where the high volume of warnings leads to missed or delayed responses to real threats. This is particularly challenging for signature-based detection, which relies on predefined attack patterns but struggles to identify new or evolving threats.

To reduce false positives:

  • Fine-tune rules and signatures to better fit the organization’s environment.

  • Use behavioral-based detection alongside signature-based methods to identify anomalous activity whenever possible.

  • Implement SIEM solutions (Security Information and Event Management) to correlate alerts and prioritize real threats.

Evasion Techniques Used by Attackers

Cybercriminals actively develop techniques to bypass IDPS systems, including:

  • Traffic Fragmentation – Breaking attack payloads into small packets to evade detection.

  • Polymorphic Malware – Modifying malware signatures to avoid known detection rules.

  • Tunneling Attacks – Embedding malicious payloads inside seemingly legitimate traffic (e.g., DNS tunneling, ICMP tunneling).

  • SSL/TLS Encrypted Payloads – Using encryption to conceal malicious activity.

Organizations must regularly update their IDPS rules, conduct red team testing, and leverage threat intelligence to stay ahead of adversary tactics.

While IDS/IPS helps mitigate network-based threats, modern cyberattacks often originate from inside the network. This is why organizations need Zero Trust Network Access (ZTNA) to eliminate implicit trust and enforce strict access controls.


Zero Trust: Shifting from Implicit Trust to Verified Access

Traditional network security operates on an outdated assumption: “If you’re inside the network, you must be trusted.”

Zero Trust challenges this mindset by enforcing the “Never Trust, Always Verify” principle. Instead of assuming internal users and devices are safe, Zero Trust requires continuous verification, strict access controls, and segmentation. The name “Zero Trust” isn’t great, it is more of a mindset than it is a technology - it really is “Zero Implicit Trust”.

Zero Trust Key Principles

Least Privilege Access

  • Users and devices only get access to the specific resources they need—nothing more.

  • Limits lateral movement within a network, preventing attackers from accessing sensitive data.

Microsegmentation

  • Instead of one big “flat” network, Zero Trust divides resources into secure zones with strict access controls.

  • Prevents an attacker from compromising an entire network if they breach one segment.

Continuous Authentication and Monitoring

  • Access is not granted indefinitely—users must reauthenticate periodically.

  • Behavioral analytics detect anomalies and enforce risk-based authentication.

Implementing Zero Trust in Your Network

You cannot simply ask a vendor “I’ll take your ZTNA solution, please.” As mentioned before, this is more a mindset than a technology and it requires a lot of administrative and technical policies and controls to implement. At a high-level, you can start on your ZTNA journey with these initial steps:

  • Enforce multi-factor authentication (MFA) for all users, even inside the network.

  • Use role-based access control (RBAC) to define permissions based on job functions.

  • Continuously monitor user activity and revoke access if suspicious behavior is detected.

  • Deploy software-defined perimeters (SDP) to dynamically grant access based on trust level.

Zero Trust significantly reduces the risk of insider threats, credential theft, and lateral movement, making it a key strategy in modern cybersecurity frameworks.


Bottom Line

Firewalls, IDPS, and Zero Trust are fundamental building blocks of network security. A firewall acts as the gatekeeper, IDS/IPS provide real-time monitoring and threat prevention, and Zero Trust ensures that only authorized users and devices can access critical resources. By implementing these security layers together, organizations can reduce attack surfaces, prevent unauthorized access, and detect threats before they escalate.


Learn More About Defense in Depth and Earn a Continuing Education Certificate

For a deeper dive into implementing Defense in Depth strategies, watch our no-cost training video, Introduction to Defense in Depth, available on YouTube or through Natsar’s website. Completing the training on Natsar’s website allows you to earn a certification for Continuing Professional Education (CPE) credits—ideal for cybersecurity professionals looking to enhance their expertise.


How Natsar Can Help

Natsar provides expert-led training and consulting services to help organizations implement Defense in Depth strategies effectively. Whether you need assistance with network security, zero trust, endpoint protection, or compliance, we offer customized solutions to strengthen your security posture.

Visit Natsar’s website to explore our training, cybersecurity assessments, and risk management solutions.

0 comments

Sign upor login to leave a comment