It is frequently used to protect a computer network from unauthorised access.
It is a combination of both, software and hardware devices.
It is unable to permit legitimate communication to pass.
It permits network transmission based on a set of rules.