The most common firewall issues can range from minor misconfigurations to significant hardware failures.
The firewall troubleshooting process involves auditing the firewall to identify issues, determining traffic flow, and using troubleshooting tools to diagnose connectivity or performance problems.
Once identified, firewall issues are addressed, followed by ongoing maintenance for optimal operation.
The most common firewall issues include:
Fortunately, all firewall issues have solutions. By knowing how to recognize common problems and taking proactive measures, you can ensure your firewalls operate correctly and continue to provide proper network protection.
Let's dive into the details of both firewall issues and their solutions.
Misconfiguration is well known as the leading cause of firewall failures.
This can happen if firewall rules are not properly set, which leads to vulnerabilities, and eventually, unauthorized access.
Like this:
Allowing unnecessary services, not disabling unused ports, or misconfiguring IP addresses can also open your network to attacks.
Solution: To avoid these issues, always ensure that your firewall settings are correctly configured and regularly audited.
Like any software, firewalls can have vulnerabilities. Hackers can exploit these weaknesses to gain unauthorized access to your network.
Software vulnerabilities were behind the largest-scale attack campaigns in 2023, leading the charge in terms of ways attackers gain access.
In 11.5% of the incidents, insufficient patch management was a contributing factor.
-Palo Alto Networks Unit 42 Incident Response Report 2024
Needless to say, keeping your firewall software up to date with the latest patches and updates is crucial. It’s only a matter of time–unpatched vulnerabilities on internet-facing systems will be exploited.
Solution:
Hardware problems affect firewall performance.
Firewalls running on outdated or overloaded hardware can cause network slowdowns and failures. Which means negatively impacted business operations.
Solution: If your firewall hardware is underperforming, consider upgrading to higher-capacity devices.
Firewalls can sometimes block legitimate traffic, and that leads to connectivity issues.
This can happen if firewall rules are too restrictive or improperly configured.
Solution:
Performance issues can arise from complex firewall rules or high network traffic.
Solution:
Allow TCP traffic 192.192.1.2/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.4/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.5/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.8/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.6/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.11/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.21/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.32/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.41/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
Allow TCP traffic 192.192.1.66/32 to 172.16.0.0/16 on ports 80, 443, 8080, 8443, 9000, 9443
with logging for every successful and failed connection attempt.
Let’s simplify it, like so:
Allow HTTP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 80 and 443, with logging for failed connection attempts.
Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 8080 with logging for failed connection attempts.
Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 8443 with logging for failed connection attempts.
Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 8080 with logging for failed connection attempts.
Allow TCP traffic from 192.168.1.0/24 to 172.16.0.0/16 on ports 9433 with logging for failed connection attempts.
Having clear and comprehensive firewall policies is key. Without proper policies, your firewall might not protect the network effectively.
Plus, missing or inadequate policies can lead to security breaches and non-compliance with industry regulations.
Solution: Ensure that your firewall policies are well-documented, regularly reviewed, and updated to reflect the latest security best practices.
Now that we’ve identified the main sorts of firewall issues you might come across, let’s move onto the actual firewall troubleshooting process.
Further reading: What Is Firewall Configuration? | How to Configure a Firewall
Troubleshooting a firewall generally includes seven primary steps:
Combined, firewall troubleshooting steps make up a systematic approach to identifying and resolving issues.
Let's walk through each.
A good place to start when troubleshooting your firewall is simply being aware of the different diagnostic tools you have at your disposal.
With logs, monitoring tools, and network testing utilities, you can identify where issues may exist and use that information to guide the troubleshooting process.
Here are a few common tools and tactics that can assist in troubleshooting firewall issues:
Knowing what you’ve got and relying on the right tools allows you to approach next steps with more insight and focus.
Start by auditing both the hardware and software of your firewall (depending on the product you’re using). A thorough audit will help you understand the current state of your firewall and spot any discrepancies.
Make sure your firewall rules, software updates, and hardware settings are in line with security policies.
Policy management software can assist in ensuring that your security policies are comprehensive and up-to-date. Above is an example of the user experience provided by Strata Cloud Manager.
These sorts of tools allow network security admins to take a holistic look at security policies in the firewall auditing process.
Pinpointing the exact issue is crucial.
Firewall problems generally fall into three categories:
Knowing where the problem lies will allow you to target your troubleshooting efforts effectively.
Once the issue is identified, the next step is to determine whether the issue arises from traffic going to the firewall or passing through it.
For example, here’s a scenario where a Telnet session failed from the source system, identified by using PAN-OS to take a packet capture.
Connectivity issues can usually be identified using network diagnostic tools.
These tools help verify whether an application is listening on the expected IP address and can aid in diagnosing network connectivity problems:
Performance issues can be the result of high network traffic or complex firewall rules.
Here are a few tactics for improving performance:
Rely on the network analytics and visibility tools or features at your disposal to get an overview of network activity and identify spikes in usage.
For instance:
The Strata Cloud Manager Summary view provides a comprehensive view of network performance. Here, users can see real-time traffic, threats, and user activity so that admins can quickly identify and resolve performance issues.
Though not an immediate part of the troubleshooting process, routine maintenance is definitely key to preventing future issues.
Regularly monitor network performance, review firewall rules, and stay updated with the latest security patches.
A proactive approach helps keep your firewall in optimal condition, and lessens the risk of future problems.
Note: The exact features of firewall troubleshooting tools vary depending on the vendor and solution.
Firewall testing is the proactive process of ensuring that your firewall is configured correctly and functions as expected to protect your network, before problems arise.
The firewall testing process involves:
It’s worth noting:
Firewall testing is different from troubleshooting because it emphasizes proactively verifying the firewall’s configuration and performance rather than responding to an existing issue.
There are plenty of tools available for firewall testing. Some are proprietary and provided by firewall vendors, while others are open source and free to use.
Note: Firewall testing and penetration testing are distinct but related concepts. General firewall testing focuses on verifying that the firewall is properly configured and functioning as expected, while penetration testing aims to identify and exploit vulnerabilities within the firewall and network defenses.
For example:
This firewall rule is problematic because it’s too broad:
Allow all inbound traffic from 0.0.0.0/0 to 192.168.1.0/24 on ports 80, 443, 22.
Allowing traffic from any IP address (0.0.0.0/0) opens the network to unnecessary risk, as it permits access from any source without restrictions.
Also, the rule exposes port 22 (SSH), which is often a target for brute-force attacks or unauthorized access, to the entire internet.
Not to mention, the rule lacks the necessary restrictions to ensure only legitimate traffic reaches internal resources.
This updated rule addresses these deficiencies by restricting the source IP range to a trusted network (172.16.16.0/23), minimizing exposure to external threats:
Allow all inbound traffic from 0.0.0.0/0 to 192.168.1.0/24 on ports 80, 443
Allow all inbound traffic from 172.16.16.0/23 to 192.168.1.0/24 on ports 22
Now Port 22 (SSH) is only open to a specific, internal trusted VPN subnet (172.16.16.0/23), significantly reducing the risk of unauthorized access.
For instance:
Let’s say you notice a sudden spike in outbound traffic from a server that typically only handles inbound requests. A web server, which usually only receives HTTP/HTTPS requests, is now sending large amounts of outbound traffic to multiple unknown external IP addresses on non-standard ports (e.g., port 6667 used for IRC).
This could indicate that the server has been compromised and is now part of a botnet, sending commands or data to external malicious entities. Such traffic patterns would be unusual for a web server and should trigger an alert for further investigation.
Further reading: Key Firewall Best Practices
Now that we’ve covered firewall issues and solutions top to bottom, let’s conclude with just a few firewall troubleshooting best practices worth mentioning.
Keep a log of all configuration changes, updates, and troubleshooting actions. Having a history to reference is extremely helpful in diagnosing future issues and ensuring compliance.
Always have a backup of your firewall configuration before making changes or updates. That way, if something goes wrong, you can quickly revert to a known good state.
Track who is making changes to the firewall rules and configurations. Accountability is key, plus it might highlight issues caused by human error.
Make sure firewalls are just one component of a layered network security strategy. Relying solely on firewalls can leave gaps in protection. This could involve integrating intrusion detection systems (IDS) or endpoint protection solutions, depending on your specific network security needs and objectives.
If there are significant changes to the network (e.g., adding new services or infrastructure), perform a comprehensive test of the firewall rules to ensure everything is still functioning as expected.
Clean up unused, redundant, or outdated firewall rules regularly. This will lessen complexity and minimize performance bottlenecks.
Prepare a documented, complete incident response plan specifically for firewall failures. It’s important that the team knows exactly what to do if the firewall goes down.
Further reading: What Is an Incident Response Plan? | Getting Started