Sequentur Blog

Helping you stay ahead of IT challenges

Real-world IT knowledge from engineers solving problems every day.

Practical IT knowledge for businesses that can’t afford downtime

Business firewall explained: what it does and why you need one

Cybersecurity,Concept.,Prioritizing,User,Privacy,,Encryption,,And,Secure,Internet,Access.

Most small businesses already have a firewall. It is the box from the internet provider, sitting under a desk, blinking, doing some unspecified amount of work. Whether it is actually protecting the business is a separate question. The label “firewall” covers everything from the basic packet filter built into a $99 home router to a $5,000 next-generation appliance with full traffic inspection, intrusion prevention, and application control. They share a name, but they do not do the same job.

This matters because the threats a small business actually faces in 2026 are not the threats a 2005 firewall was designed to stop. Phishing emails carrying malware, ransomware reaching out from inside the network to download payloads, attackers brute-forcing exposed remote desktop, employees clicking links to look-alike Microsoft 365 login pages, command-and-control traffic hidden inside HTTPS – none of this is what a basic firewall sees. A firewall that was adequate ten years ago is, at this point, mostly an optimistic decoration.

This article covers what a firewall actually does, the real difference between a home router firewall and a business-grade next-generation firewall, what NGFWs add on top, common SMB firewall vendors, and what managed firewall services include. It is written for owners, office managers, and IT generalists who are deciding whether the firewall they have is enough or whether it is time for a serious upgrade. Firewall management is one of the largest line items inside a broader managed network services engagement.

Short answer: do you need a business firewall

If you are running a business with employees, sensitive data (any), regulatory obligations (any), customer payment processing, remote workers, or VoIP – yes, you need a real business firewall. The internet provider’s router is not one. A consumer router with a “firewall” checkbox is not one. A real business firewall does stateful inspection at minimum, and a real next-generation business firewall does intrusion prevention, application control, DNS filtering, SSL inspection, and integrated logging. The price difference is real (a few hundred dollars a year vs $1,500 to $5,000 for the appliance plus subscriptions), but the protection difference is also real, and the cost of being underprotected has gone up dramatically since 2020.

What a firewall actually does

Strip away the marketing and a firewall has one job: decide what traffic is allowed in and out of your network. Different generations of firewall make that decision differently.

Packet filtering (1990s technology, still in many home routers)

The simplest firewall looks at each packet and matches it against a list of rules: allow traffic from this IP, deny traffic from that port, drop everything else. It does not remember what came before, does not understand what application the traffic belongs to, does not look inside the packet. It just decides yes/no and moves on.

This is what the firewall in a $99 home router is doing. It is not nothing – it stops random scanning traffic from reaching your internal devices – but it is also not enough on its own anymore. Attackers stopped trying to brute-force unprotected ports as their primary tactic years ago.

Stateful inspection (the minimum bar for “business firewall”)

A stateful firewall remembers active connections. When your laptop initiates a connection to Microsoft 365, the firewall logs that connection and allows the response traffic back. Unsolicited inbound traffic that does not match an active connection gets dropped. This is the minimum bar for what should reasonably be called a business firewall in 2026.

Stateful inspection prevents a category of attack that pure packet filtering cannot – attackers cannot just spoof traffic to look like a response. The firewall knows there is no outgoing connection waiting for that response, so it drops it.

Application-aware (next-generation firewall, NGFW)

A next-generation firewall does everything a stateful firewall does, plus it understands what application or service the traffic belongs to. It can tell the difference between Microsoft Teams traffic and a peer-to-peer file sharing application even if both are using HTTPS over port 443. It can recognize known malware command-and-control servers. It can block specific application categories (gambling, file sharing, social media) by name rather than by IP address.

This is what “next-generation” actually means – the firewall has been taught what the traffic is, not just where it is going. Most modern attacks hide inside ordinary-looking HTTPS connections. A stateful firewall sees encrypted traffic to an unfamiliar IP and shrugs. An NGFW with the right subscriptions sees the same traffic, recognizes the destination as a known threat, and blocks it.

Home router firewall vs business firewall at a glance

CapabilityHome router firewallBusiness stateful firewallNext-gen business firewall
Stateful inspectionSometimesYesYes
Application awarenessNoNoYes
Intrusion detection/prevention (IDS/IPS)NoLimitedYes
DNS filteringVendor-dependentOptionalBuilt-in or integrated
SSL/TLS inspectionNoNoYes
Site-to-site VPNLimitedYesYes
Remote access VPNLimitedYesYes
Centralized managementNoOptionalYes
Logging and alertingMinimalYesYes, with retention
Threat intelligence updatesNoOptionalSubscription-based, continuous
Geo-blockingLimitedYesYes, granular
HA / failover supportNoOptionalYes
Vendor support and warranty1 year, replacement only3-5 years, advanced replacement3-5 years, 24/7 support contract
Typical lifespan3-4 years5-7 years5-7 years
Typical cost$100-$300 once$400-$1,500 plus subscriptions$1,500-$5,000+ plus subscriptions

The price difference looks larger than it is when you amortize the appliance over its useful life. A $3,000 NGFW with $1,500/year in subscriptions over five years is $10,500 total – around $175 a month. For a 25-person business, that is less than $7 per user per month for the perimeter security layer. A single ransomware event without it averages well into the six figures.

Why “the ISP gave us a firewall” is not enough

This deserves its own section because it is the most common SMB misunderstanding. The router provided by your ISP is not a business firewall in any meaningful sense.

  • It does basic packet filtering or, at best, basic stateful inspection
  • It does not see application-level traffic
  • It does not detect or prevent intrusion attempts
  • It does not have current threat intelligence
  • It does not log anything that an investigator would need post-incident
  • It is administered by the ISP, not by you, and you have no control over its rules
  • Its firmware is updated when the ISP gets around to it
  • It is a known target – attackers actively scan for vulnerable ISP-provided routers

The ISP gateway is internet-connection equipment with a security checkbox. It is not the security layer.

What a next-gen firewall adds on top of stateful

Most of the value of moving from a basic stateful firewall to an NGFW lives in five capabilities. Each is a category of attack that a basic firewall simply does not see.

1. Intrusion detection and prevention (IDS/IPS)

The firewall watches traffic for patterns that match known attack signatures – SQL injection attempts, exploit attempts against unpatched services, lateral movement techniques. With prevention enabled, it blocks the matching traffic in real time. With detection only, it logs and alerts.

This is the layer that catches “known bad things happening to your network” that pure stateful inspection has no visibility into. The signatures get updated continuously as new attack patterns are documented – which is one of the things the subscription pays for.

2. DNS filtering

DNS filtering blocks DNS lookups for malicious domains before a connection is ever made. If an employee clicks a link in a phishing email that points to a known malware site, DNS filtering refuses to resolve the domain and the connection never happens. This is one of the highest-leverage controls in a small business security stack because most attacks start with a DNS lookup somewhere.

The depth on this is in DNS filtering for small business: what it is and why it matters, but the short version is: DNS filtering catches a lot of things that nothing else in the stack will see.

3. Application control

Allow or block specific applications by name, not just by port or IP. Block BitTorrent across the entire network. Allow Microsoft Teams but block consumer messaging applications during business hours. Block remote desktop applications except from approved sources. Block file-sharing applications that exfiltrate data.

Application control is what makes a business firewall enforceable in a world where everything runs over HTTPS. Without it, the firewall sees encrypted traffic to a cloud provider and cannot tell whether it is sanctioned business activity or shadow IT.

4. SSL/TLS inspection

A growing share of malware traffic is encrypted. Without SSL inspection, the firewall sees that there is encrypted traffic going somewhere, but cannot examine the content for threats. With SSL inspection, the firewall decrypts the traffic, inspects it, and re-encrypts it before sending it on. This catches a lot of attacks that would otherwise be invisible.

SSL inspection has tradeoffs – it requires distributing a CA certificate to client devices, has a performance impact, and you need to exclude categories like banking and healthcare for legal and privacy reasons. It is worth doing thoughtfully, but it is increasingly necessary as more threats hide inside encrypted traffic.

5. Logging, alerting, and integrated threat intelligence

NGFWs log everything they see and alert on the things that matter. They integrate with threat intelligence feeds that get updated continuously – new malicious IPs, new command-and-control infrastructure, new phishing sites. They can integrate with a SIEM or managed detection and response platform to correlate firewall events with endpoint and identity events.

This is what makes the firewall a participant in the broader security program, not just a perimeter device. The article on endpoint detection and response covers the endpoint side of this picture and how the two layers work together.

Common SMB firewall vendors

Without endorsing any specific brand, the honest market shape for SMB-appropriate NGFWs in 2026 looks like this. All of them ship hardware appliances and most have a cloud-managed control plane.

VendorProduct lineWhere it fitsNotes
FortinetFortiGateStrong all-rounder for SMB and mid-marketWide model range, strong throughput per dollar, deep integration with FortiSwitch managed switches and FortiAP
SonicWallTZ and NSa seriesCommon in 25-200 person SMBsLong history in the SMB space, broad MSP partner network
SophosXGS seriesSMB-friendly, integrates with Sophos endpointSynchronized security between firewall and endpoints is the differentiator
WatchGuardFirebox T and M seriesCommon SMB choiceStrong logging and reporting story
CiscoMeraki MXCloud-managed, integrates with Meraki ecosystemSubscription-heavy pricing model, strong central management
Palo Alto NetworksPA-400 seriesHigher-end SMB and mid-marketEnterprise pedigree, premium pricing
UbiquitiUniFi UDM Pro / GatewayBudget-friendly, prosumer-leaningGood for very small businesses, lighter on enterprise security features
pfSense / OPNsenseNetgate appliances or self-builtOpen-source optionPowerful for technical IT owners, requires expertise to manage well

There is no single right vendor. The right vendor depends on the size of the business, what other tooling is already in place, whether you have someone who can manage it, what your MSP standardizes on, and what your budget allows. An MSP with a strong opinion on this is usually pointing at the platform their team has the deepest expertise in – which is a feature, not a bug, as long as the platform is reasonable for your size.

Sizing a firewall for your business

The marketing throughput numbers on a firewall datasheet rarely match real-world numbers with all the security features turned on. The honest sizing rule is: assume the firewall delivers about 30 to 50 percent of the marketing throughput when IPS, application control, and SSL inspection are all enabled. Plan accordingly.

Business sizeInternet circuitRecommended firewall scale
1-10 users100-300 MbpsEntry-level NGFW (under $1,000 list)
10-25 users300-500 MbpsLower mid-range NGFW ($1,000-$2,000)
25-75 users500 Mbps – 1 GbpsMid-range NGFW ($2,000-$4,000)
75-200 users1-2 GbpsUpper mid-range NGFW ($4,000-$7,500)
200+ users2+ GbpsEnterprise-grade or HA pair

Multi-site businesses usually go with a smaller appliance per site plus a more capable appliance at the headquarters or hub site. Failover (HA) pairs are worth considering when an hour of internet downtime would cost more than the cost of a second firewall. For multi-site businesses with three or more locations, the question often becomes whether to manage each firewall independently or move to a centrally-managed SD-WAN fabric – that comparison is in SD-WAN for small business: is it worth it.

Once the appliance is sized and ordered, the deployment work itself – the configuration baseline, the network design, the rule set, and the cutover – is its own discipline. The walkthrough is in how to set up a business firewall for a small office.

What managed firewall services include

Most SMBs do not have someone in-house to administer a business firewall well. Managed firewall services from an MSP or MSSP cover the parts that go wrong when nobody is watching.

  • Initial deployment and tuning. The default firewall configuration out of the box is generic. Tuning for your actual application mix, your VPN needs, and your traffic patterns is the difference between a firewall that protects and a firewall that frustrates users into asking for exceptions.
  • Firmware and signature updates. Firewalls only protect against known threats if their threat intelligence feeds are current. Behind-on-firmware firewalls are a documented breach pattern, and end-of-life firewalls that no longer receive firmware at all are one of the most-exploited attack surfaces at SMB scale – the broader equipment-lifecycle context is in when to replace your business network equipment.
  • Rule reviews and cleanup. Firewall rule sets accumulate over time. Old rules for departed vendors, exception rules that were supposed to be temporary, conflicting rules that mask each other. Periodic review keeps the rule set defensible.
  • 24/7 monitoring and alerting. Logging is only useful if someone is looking. Managed monitoring catches the alerts that matter and triages out the noise.
  • Incident response. When the firewall flags a real incident, someone with the authority and expertise to respond. Most SMB firewalls fail not because they did not see something, but because nobody was watching when they did.
  • Reporting and compliance. Monthly or quarterly reports for leadership and auditors. For regulated industries (HIPAA, CMMC, SOC 2), the firewall logs and reports are evidence that controls are operating.
  • Hardware replacement and lifecycle management. When the appliance ages out or fails, replacement is part of the service rather than an emergency procurement event.

Common firewall mistakes

Even when SMBs invest in a real firewall, there are predictable ways to underuse it.

  1. Buying the appliance and skipping the subscriptions. The hardware is a fraction of the value. The IPS signatures, threat intelligence feeds, application control databases, and DNS filtering data are what make the firewall useful. Letting subscriptions lapse turns an NGFW back into a stateful firewall.
  1. Leaving default credentials in place. A firewall accessible from the internet on a default username/password is a documented breach in waiting. Change the credentials at install. Disable WAN-side admin access if it is not strictly required. Use MFA on the admin interface.
  1. No outbound filtering. Most SMB firewall configurations allow all outbound traffic by default. This is what lets ransomware reach out to its command-and-control infrastructure. Outbound filtering – even at the level of “block known-bad destinations and require explicit allow for unusual outbound traffic” – prevents a class of attack.
  1. No logging or unmonitored logging. A firewall with logging disabled is a security checkbox without evidence. A firewall logging to a local disk that nobody reads is barely better. Logs need to go somewhere and someone needs to be watching.
  1. Geo-blocking turned off when it should be on. Most SMBs have no business reason for inbound traffic from countries they do not operate in. Geo-blocking inbound from those regions removes a large slice of attack surface for free.
  1. Site-to-site VPN configured once and forgotten. The IPSec tunnel that was set up six years ago is still using outdated cipher suites. The pre-shared key has not been rotated. The firewall on the other side is end-of-life. Periodic VPN configuration review is part of firewall hygiene. For multi-site businesses, the broader question of when site-to-site VPN is still the right tool vs when SD-WAN or another option fits better is covered in how to network multiple office locations for a small business.
  1. Remote access VPN without MFA. Remote VPN exposed to the internet without MFA is the single most common SMB ransomware entry point. The depth on the alternative is in VPN vs zero trust network access: what remote businesses should use.
  1. Treating the firewall as the entire security stack. A firewall is one layer. Endpoint protection, identity security, email security, backup, and security awareness all matter. A great firewall in front of a network full of unpatched endpoints with shared passwords is not enough.
  1. Skipping the rule cleanup that happens after staff turnover. When an IT person leaves, their VPN access, their custom firewall rules, and their exception entries should be reviewed and removed. This rarely happens on its own.
  1. Letting the firewall run end-of-life. Vendors stop releasing firmware and threat intelligence updates for hardware after a certain age. An end-of-life firewall is an unpatched firewall. Hardware refresh planning matters – covered in when to replace your business network equipment when that article is live.

When a firewall is enough vs when it is not

A firewall is necessary but never sufficient. The honest framing.

Threat categoryWhat the firewall handlesWhat it does not
External port scans, brute forceDrops or rate-limits
Inbound exploit attempts on exposed servicesIDS/IPS catches known signaturesZero-days slip through
Phishing emailsDNS filtering blocks known-bad linksEmail security and user training are still needed
Ransomware infectionOutbound filtering blocks C2; DNS filtering blocks lookupsEndpoint protection has to catch the actual payload
Credential theft / business email compromiseLimited visibilityIdentity security and MFA carry this
Insider threatsApplication control, loggingMost of the response depends on access controls
Cloud-to-cloud data exposureGenerally outside the firewall’s viewCASB, M365 security tooling, identity controls
Lateral movement once insideInternal segmentation if implementedEndpoint EDR / MDR carries the rest

A firewall is the perimeter layer. It is the start of a layered defense, not the whole defense. Most modern SMB security programs treat firewall, endpoint, identity, email, and backup as five independent layers – any one of them failing is recoverable, but the program depends on having all five in place.

How long firewall benefits take to show up

OutcomeTypical time to value
Unsolicited internet noise stops reaching internal devicesSame day
Outbound malware C2 attempts blockedWithin first month (will see them in logs)
Reduction in phishing-related incidents1-3 months (paired with DNS filtering and email security)
Audit and compliance evidence availableWithin first quarter
Reduction in firewall-driven user friction3-6 months (rule tuning matures)
Lifecycle and refresh predictability12 months (fits into budget cycle)

Most SMBs that move from a consumer-grade or ISP-provided device to a real business firewall see measurable signal in the logs in week one – traffic that was reaching internal devices before is now being dropped at the perimeter. The bigger wins (reduced incidents, cleaner compliance posture, better visibility) accumulate over the first six to twelve months.

How Sequentur can help

If you are deciding whether your current firewall is enough, sizing a replacement, or evaluating managed firewall services, schedule a call.

Get the Best IT Support

Schedule a 15-minute call to see if we’re the right partner for your success.

Invalid Email
Invalid Number
Please check the captcha to verify you are not a robot.
Testimonials

What Our Clients Say

Here is why you are going to love working with Sequentur

Need help?

FAQs About Our Managed IT Services