{"id":7950,"date":"2026-05-11T08:00:00","date_gmt":"2026-05-11T08:00:00","guid":{"rendered":"https:\/\/techmonarch.com\/in\/?post_type=blog&#038;p=7950"},"modified":"2026-05-03T18:56:03","modified_gmt":"2026-05-03T18:56:03","slug":"what-is-a-firewall-actually-blocking-and-how-does-it-decide","status":"publish","type":"blog","link":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/","title":{"rendered":"What Is a Firewall Actually Blocking and How Does It Decide?"},"content":{"rendered":"\n<p>Ask most business owners what a firewall does and you&#8217;ll get some version of &#8220;it protects us from hackers.&#8221; And that&#8217;s not wrong \u2014 but it&#8217;s a bit like saying a hospital &#8220;helps sick people.&#8221; True, technically. But it doesn&#8217;t tell you much about what&#8217;s actually happening inside.<\/p>\n\n\n\n<p>Firewalls are one of the most fundamental pieces of any<a href=\"https:\/\/techmonarch.com\/in\/manage-it-services\/\"> IT security setup.<\/a> Whether you&#8217;re running a five-person operation out of a shared office in Ahmedabad or managing a 200-seat enterprise with multiple branches, a firewall is sitting at the edge of your network, quietly making thousands of decisions every single day. And yet, most people don&#8217;t really know how it decides what to allow and what to block.<\/p>\n\n\n\n<p>Let&#8217;s fix that. In this article, we&#8217;re going to break down exactly what a firewall does, what it&#8217;s actually blocking, and the logic it uses to make those calls. No jargon overload \u2014 just a clear, honest explanation that helps you make better decisions about your business&#8217;s security.<\/p>\n\n\n\n<p><strong>1. First Things First: What Exactly Is a Firewall?<\/strong><\/p>\n\n\n\n<p>A firewall is like a guard. It stops the outside world (the internet and other networks) from getting to your internal network (your computers, servers, printers, and everything else on your side). The firewall checks every piece of data that tries to get in or out of your network and decides whether to let it through or stop it.<\/p>\n\n\n\n<p>The word &#8220;firewall&#8221; comes from the idea of building walls between parts of a building that are fireproof to keep fire from spreading. In IT, the idea is the same: keep threats contained so they can&#8217;t move freely through your systems.<\/p>\n\n\n\n<p>Firewalls can be hardware (physical boxes in your server room), software that runs on a computer or server, or, more and more, cloud-based services. Most modern businesses use a mix of all three. According to Statista, the global firewall market was worth about $5.3 billion in 2023 and is still growing. This shows how important this technology is for keeping computers safe.<\/p>\n\n\n\n<p><strong>2 What Is It Actually Blocking? The Real Answer.<\/strong><\/p>\n\n\n\n<p>This is where it gets interesting. A firewall isn&#8217;t blocking &#8220;hackers&#8221; in some abstract, cinematic sense. It&#8217;s blocking specific types of network traffic based on defined rules. Let&#8217;s look at the main categories of things a firewall stops:<\/p>\n\n\n\n<p><strong>Unauthorised inbound connections<\/strong><\/p>\n\n\n\n<p>Someone from the internet trying to connect directly to your internal systems \u2014 a server, a shared drive, a device \u2014 without permission. Without a firewall, those systems are essentially open doors.<\/p>\n\n\n\n<p><strong>Traffic on suspicious or unneeded ports<\/strong><\/p>\n\n\n\n<p>Every type of network communication uses a &#8220;port&#8221; \u2014 a numbered channel. A firewall can be configured to block traffic coming through ports that your business doesn&#8217;t use, reducing the number of potential entry points for attackers.<\/p>\n\n\n\n<p><strong>Traffic from known malicious IP addresses<\/strong><\/p>\n\n\n\n<p>Firewalls can be updated with threat intelligence feeds that identify IP addresses associated with cybercriminal activity, botnets, or known attack infrastructure. Traffic from these sources gets blocked outright.<\/p>\n\n\n\n<p><strong>Outbound traffic to dangerous or restricted destinations<\/strong><\/p>\n\n\n\n<p>Modern firewalls don&#8217;t just watch what comes in; they also watch what goes out. If a computer on your network is infected and tries to connect to a command-and-control server run by hackers, a well-configured firewall can stop that connection.<\/p>\n\n\n\n<p><strong>Data that violates your policies<\/strong><\/p>\n\n\n\n<p>Next-generation firewalls (NGFWs) can look at the content of traffic, not just where it comes from. This means that even if the source looks fine on the surface, they can block certain apps, websites, or types of file transfers.<\/p>\n\n\n\n<p><strong>3. How Does a Firewall Decide? The Logic Behind the Rules<\/strong><\/p>\n\n\n\n<p>Most people don&#8217;t think about this: a firewall doesn&#8217;t make decisions based on instinct. It follows a ruleset, which is a structured list of conditions and actions that go with them. The firewall checks each packet of data against these rules in order, from top to bottom, until it finds one that matches. Then it does what the rule says: allow, deny, or log.<\/p>\n\n\n\n<p>Firewall rules are typically built around five key attributes:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Attribute<\/strong><\/td><td><strong>What It Checks<\/strong><\/td><\/tr><tr><td>Source IP Address<\/td><td>Where is the traffic coming from? A specific device, a subnet, or the entire internet?<\/td><\/tr><tr><td>Destination IP Address<\/td><td>Where is it trying to go? Your web server, an internal database, a specific workstation?<\/td><\/tr><tr><td>Port Number<\/td><td>What type of communication is this? Web traffic (port 80\/443), email (port 25), remote desktop (port 3389)?<\/td><\/tr><tr><td>Protocol<\/td><td>Is this TCP, UDP, ICMP \u2014 and is that the right protocol for the claimed purpose?<\/td><\/tr><tr><td>Direction<\/td><td>Is the traffic coming inbound (into your network) or outbound (leaving your network)?<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Based on these attributes, a typical rule might read something like: &#8220;Block all inbound TCP traffic on port 3389 from any source outside our corporate VPN range.&#8221; That&#8217;s a real-world example \u2014 port 3389 is used by Remote Desktop Protocol (RDP), which is one of the most commonly exploited entry points in ransomware attacks.<\/p>\n\n\n\n<p>According to Microsoft&#8217;s Digital Defense Report 2023, RDP remains one of the top attack vectors for ransomware deployment globally. A single well-written firewall rule blocking external RDP access can eliminate an enormous category of risk.<\/p>\n\n\n\n<p><strong>4. The Evolution: From Packet Filters to Next-Gen Firewalls<\/strong><\/p>\n\n\n\n<p>Not all firewalls are created equal. The technology has evolved significantly over the decades, and understanding the differences matters when you&#8217;re choosing the right protection for your business.<\/p>\n\n\n\n<p><strong>Packet Filtering Firewalls (1st Generation)<\/strong><\/p>\n\n\n\n<p>The original. These look at individual packets of data and check source\/destination IP and port. Fast and lightweight, but they can&#8217;t see inside a packet \u2014 so they can be fooled by attackers who know how to disguise their traffic.<\/p>\n\n\n\n<p><strong>Stateful Inspection Firewalls (2nd Generation)<\/strong><\/p>\n\n\n\n<p>Instead of just looking at packets one at a time, they keep track of the &#8220;state&#8221; of a connection. They can tell if a packet is part of a legitimate session or if it&#8217;s a suspicious lone wolf trying to get in.<\/p>\n\n\n\n<p><strong>Application Layer \/ Proxy Firewalls (3rd Generation)<\/strong><\/p>\n\n\n\n<p>These look at traffic at the application level, so they can tell what an HTTP request is really asking for, not just that it came in on port 80. They are more powerful but also use more resources.<\/p>\n\n\n\n<p><strong>Next-Generation Firewalls (NGFW) \u2014 Current Standard<\/strong><\/p>\n\n\n\n<p>The modern standard for businesses. NGFWs combine traditional firewall capabilities with deep packet inspection, intrusion detection and prevention (IDS\/IPS), application awareness, SSL\/TLS decryption, and integration with threat intelligence. They can identify and block specific applications (like TikTok or BitTorrent) regardless of what port they&#8217;re using.<\/p>\n\n\n\n<p>For most businesses operating today, a Next-Generation Firewall is the appropriate baseline. The older generations, while still in use in some environments, simply don&#8217;t have the visibility required to deal with modern threats.<\/p>\n\n\n\n<p><strong>5. What a Firewall Can&#8217;t Do (and People Often Assume It Can)<\/strong><\/p>\n\n\n\n<p>This is the section that matters most for business owners, honestly. There&#8217;s a dangerous misconception that having a firewall means you&#8217;re &#8220;covered.&#8221; You&#8217;re not \u2014 at least not entirely. Here&#8217;s what a firewall does not protect you from:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing emails that trick an employee into handing over their credentials \u2014 the firewall lets that email through because it looks like normal traffic<\/li>\n\n\n\n<li>Threats that originate from inside the network \u2014 a compromised device or a malicious insider bypasses perimeter controls entirely<\/li>\n\n\n\n<li>Encrypted malware hidden inside legitimate HTTPS traffic (unless your NGFW has SSL inspection enabled)<\/li>\n\n\n\n<li>Zero-day exploits \u2014 attacks that use previously unknown vulnerabilities that haven&#8217;t yet been added to threat intelligence databases<\/li>\n\n\n\n<li>Social engineering attacks \u2014 no technology stops a person being deceived<\/li>\n<\/ul>\n\n\n\n<p>This is why cybersecurity professionals talk about a &#8220;layered&#8221; or &#8220;defence-in-depth&#8221; approach. A firewall is a critical layer \u2014 but it&#8217;s one layer among many. You still need endpoint protection, email security, user training, access controls, and regular security assessments working alongside it.<\/p>\n\n\n\n<p>Verizon&#8217;s 2023 Data Breach Investigations Report found that 74% of data breaches involved a human element \u2014 meaning the attack got through not because the firewall failed, but because a person was manipulated or made a mistake. Technology has limits. People are often the real vulnerability.<\/p>\n\n\n\n<p><strong>6. Firewall Configuration: Where It Usually Goes Wrong<\/strong><\/p>\n\n\n\n<p>Here&#8217;s something we see regularly in our work with businesses across Ahmedabad: companies that have firewalls but haven&#8217;t configured them properly. Having a firewall and having a properly configured firewall are two very different things.<\/p>\n\n\n\n<p>Common configuration mistakes include:<\/p>\n\n\n\n<p><strong>Using default settings<\/strong><\/p>\n\n\n\n<p>Out-of-the-box firewall settings are designed to be permissive so the device works immediately. They are not designed to be secure. Default rules need to be replaced with rules tailored to your specific environment.<\/p>\n\n\n\n<p><strong>Overly broad &#8220;allow all&#8221; rules<\/strong><\/p>\n\n\n\n<p>Rules like &#8220;allow all outbound traffic&#8221; might be convenient but they defeat the purpose of having a firewall. Every rule should have a specific, documented reason.<\/p>\n\n\n\n<p><strong>Never updating rules<\/strong><\/p>\n\n\n\n<p>Your business changes. New applications get added, old ones are retired, staff roles evolve. Your firewall rules should be reviewed and updated regularly to reflect the current reality of your network.<\/p>\n\n\n\n<p><strong>No logging or monitoring<\/strong><\/p>\n\n\n\n<p>A firewall that isn&#8217;t logging its activity is a firewall you can&#8217;t learn from. Firewall logs are invaluable for identifying attack patterns, spotting unusual behaviour, and investigating incidents after the fact.<\/p>\n\n\n\n<p><strong>Ignoring firmware updates<\/strong><\/p>\n\n\n\n<p>Firewalls themselves have vulnerabilities. Keeping firmware up to date is non-negotiable. Attackers actively exploit known vulnerabilities in outdated firewall firmware \u2014 sometimes before businesses even know the update exists.<\/p>\n\n\n\n<p><strong>7. What Good Firewall Management Actually Looks Like<\/strong><\/p>\n\n\n\n<p>A firewall that is well-managed isn&#8217;t something you set up once and forget about. It&#8217;s a part of your security system that needs to be watched over all the time. Here&#8217;s what proper firewall management looks like in practice:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regular rule audits \u2014 at minimum quarterly \u2014 to remove outdated rules and tighten permissions<\/li>\n\n\n\n<li>Firmware and software updates applied promptly, ideally within days of release for critical patches<\/li>\n\n\n\n<li>Firewall logs reviewed regularly for anomalies, blocked connection attempts, and unusual outbound traffic<\/li>\n\n\n\n<li>Integration with your broader security monitoring \u2014 firewall alerts should feed into a centralised view of your security posture<\/li>\n\n\n\n<li>Documentation of every rule \u2014 who created it, why, and when it should be reviewed<\/li>\n\n\n\n<li>Penetration testing to verify that your firewall rules are actually working as intended<\/li>\n<\/ul>\n\n\n\n<p>For many businesses, managing all of this in-house isn&#8217;t realistic. Your core team has a business to run. That&#8217;s where a Managed IT Services provider becomes genuinely valuable \u2014 not just as a support desk, but as a proactive partner keeping your security infrastructure in shape.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/techmonarch.com\/in\/manage-it-services\/\"><img loading=\"lazy\" decoding=\"async\" width=\"621\" height=\"181\" src=\"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2025\/12\/IT-Infra-01-1.png\" alt=\"\" class=\"wp-image-7862\" style=\"width:840px;height:auto\" srcset=\"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2025\/12\/IT-Infra-01-1.png 621w, https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2025\/12\/IT-Infra-01-1-300x87.png 300w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/a><\/figure>\n\n\n\n<p><strong>The Bottom Line<\/strong><\/p>\n\n\n\n<p>A firewall isn&#8217;t magic. It&#8217;s a tool that makes rule-based decisions about what traffic can cross the border of your network. It&#8217;s a powerful and necessary one. It makes up the most important outer layer of your business&#8217;s cyber defense when it&#8217;s set up right, kept up to date, and watched over.<\/p>\n\n\n\n<p>When it&#8217;s not? It creates a false sense of security that might actually be more dangerous than having no firewall at all \u2014 because you think you&#8217;re protected when you&#8217;re not.<\/p>\n\n\n\n<p>Understanding what your firewall is actually doing \u2014 and how it&#8217;s making decisions \u2014 is the first step toward making sure it&#8217;s doing its job properly. And if you&#8217;re not entirely sure whether your current firewall setup is up to scratch, that uncertainty itself is a signal worth paying attention to.<\/p>\n\n\n\n<p><em>At TechMonarch, firewall configuration, management, and auditing are a core part of what we do for businesses across Ahmedabad. If you want a straightforward assessment of where your network security stands \u2014 no sales pitch, just honest answers \u2014 reach out and let&#8217;s talk.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ask most business owners what a firewall does and you&#8217;ll get some version of &#8220;it protects us from hackers.&#8221; And that&#8217;s not wrong \u2014 but it&#8217;s a bit like saying&#8230;<\/p>\n","protected":false},"featured_media":7951,"comment_status":"open","ping_status":"closed","template":"","blog_category":[],"class_list":["post-7950","blog","type-blog","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is a Firewall Actually Blocking and How Does It Decide? - techmonarch\/in<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Firewall Actually Blocking and How Does It Decide? - techmonarch\/in\" \/>\n<meta property=\"og:description\" content=\"Ask most business owners what a firewall does and you&#8217;ll get some version of &#8220;it protects us from hackers.&#8221; And that&#8217;s not wrong \u2014 but it&#8217;s a bit like saying...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/\" \/>\n<meta property=\"og:site_name\" content=\"techmonarch\/in\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2026\/05\/03_Firewall.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/\",\"url\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/\",\"name\":\"What Is a Firewall Actually Blocking and How Does It Decide? - techmonarch\\\/in\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/03_Firewall.png\",\"datePublished\":\"2026-05-11T08:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/03_Firewall.png\",\"contentUrl\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/03_Firewall.png\",\"width\":1344,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is a Firewall Actually Blocking and How Does It Decide?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/#website\",\"url\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/\",\"name\":\"techmonarch\\\/in\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/techmonarch.com\\\/in\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Firewall Actually Blocking and How Does It Decide? - techmonarch\/in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/","og_locale":"en_US","og_type":"article","og_title":"What Is a Firewall Actually Blocking and How Does It Decide? - techmonarch\/in","og_description":"Ask most business owners what a firewall does and you&#8217;ll get some version of &#8220;it protects us from hackers.&#8221; And that&#8217;s not wrong \u2014 but it&#8217;s a bit like saying...","og_url":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/","og_site_name":"techmonarch\/in","og_image":[{"width":1344,"height":768,"url":"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2026\/05\/03_Firewall.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/","url":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/","name":"What Is a Firewall Actually Blocking and How Does It Decide? - techmonarch\/in","isPartOf":{"@id":"https:\/\/techmonarch.com\/in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/#primaryimage"},"image":{"@id":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/#primaryimage"},"thumbnailUrl":"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2026\/05\/03_Firewall.png","datePublished":"2026-05-11T08:00:00+00:00","breadcrumb":{"@id":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/#primaryimage","url":"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2026\/05\/03_Firewall.png","contentUrl":"https:\/\/techmonarch.com\/in\/wp-content\/uploads\/2026\/05\/03_Firewall.png","width":1344,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/techmonarch.com\/in\/blog\/what-is-a-firewall-actually-blocking-and-how-does-it-decide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techmonarch.com\/in\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/techmonarch.com\/in\/blog\/"},{"@type":"ListItem","position":3,"name":"What Is a Firewall Actually Blocking and How Does It Decide?"}]},{"@type":"WebSite","@id":"https:\/\/techmonarch.com\/in\/#website","url":"https:\/\/techmonarch.com\/in\/","name":"techmonarch\/in","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techmonarch.com\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/blog\/7950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/types\/blog"}],"replies":[{"embeddable":true,"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/comments?post=7950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/media\/7951"}],"wp:attachment":[{"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/media?parent=7950"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/techmonarch.com\/in\/wp-json\/wp\/v2\/blog_category?post=7950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}