@Bob_Zimmerman
I was addressing the specific question raised by the topic starter: What is the order of operation of Firewall Blades in a typical environment?
I’d like to reiterate my perspective regarding providing an all-encompassing answer to questions that haven’t been explicitly asked.
Based on my professional experience, attempting to address every possible scenario in a single response is both impractical and potentially counterproductive.
To fully understand how traffic interacts with firewalls, it’s essential to make a deep dive into the intricate details of firewall software modules, chains, and the various parameters associated with connections and packets. This includes how these parameters are presented, controlled, and manipulated by different security blades. This is a complex subject that requires significant time—weeks, months, or even years—to master comprehensively.
That said, this level of detail is not typically necessary for the day-to-day responsibilities of security administrators and architects. While such knowledge is indispensable for software developers and TAC experts, most field tasks, including deployment, management, and even troubleshooting of security systems, can often be performed effectively without diving into every technical nuance.
Once again, this is just my personal opinion. In my trainings I tend to do the opposite: take a complex case and creak it down to a number of simple to grasp subjects, then slowly and carefully deepen the understanding, to be efficient. And then repeat the principle to the required depth.
Looking at the questions from the author here, I am not ready to dive to the bottom of everything in a single sentence of even a paragraph.
I hope this makes sense. If not, let's talk further 🙂