** Work in progress **
Configuring a firewall to defend attacks and protect your network/assets means taking several layers of defense into account. It's not just the rulebase that makes up a firewall security. In fact there are many more layers of protection and defense that together build up a strong level of firewall security.
These layers are often easy to deploy and set active, one just needs to know that they are available and ready to form your shield of protection.
So let's start to list them all up.
| Layers of defense | Field of security | Description | Protection | Method of validation | 
| Layer 1 | Physical security | secure space within a 19" rack in a secured spot only accessible to firewall admins |  |  | 
| Layer 2 | Network security | 
access to firewall management is controlled and secured by firewalls managed by this management (firewall self-protection)firewall management's default gateway is the firewall cluster operated by this firewall managementfirewall management is defined as host and not as gatewayfirewall management is not connections to any other networks and has only only interface to it's own firewall clustersecure VPN configuration |  |  | 
| Layer 3 | Gaia OS security | 
allowed hostspersonalized user accountslimited Clish shell as default Login shellpassword security controlsstrong cipher suitesseparate scp accountlogin messagesession timeoutbackups / snapshotsntp v4snmp v3-onlyetc. | Ransomware |  | 
| Layer 4 | Firewall security | 
IP address spoofing protectionblock blacklisted IPs (sk103154)block GEO locations (sk126172)firewall rulebase securityinspection of encrypted protocols (such als HTTPS)use of available security blades for deep packet inspection etc.IPS (with Snort)Content SecurityApp. Control & URLFAnti-Bot, AV, etc.DLPTE, TXrulebase policy installation free of warnings and errorslogfiles free of warnings and errors |  | 
check for "spoof" entries in logcheck for "DOS/Rate Limiting Policy" entries in logenable session logging and check for "source country" or "destination country" | 
| Layer 5 | Admin security | 
organizes regular firewall security reviewsregularly reports to managementmaintains an up-to-date firewall documentation | 
relics of configurationinconsistenciesinstabilities |  | 
| Layer 6 | End user security | 
regularly receives IT-security awareness trainingsis protected by a proper Endpoint security corp policy | social engineering |  |