Back to Blog

Firewall Management 101: A Guide for Small Businesses

Firewall Management 101: A Guide for Small Businesses

Your firewall is the front door to your business network. It decides what traffic comes in, what goes out, and what gets blocked entirely. Yet for many UK small businesses, the firewall is a set-and-forget device gathering dust in a server cabinet — configured once during installation and never touched again. This approach is dangerous. An unmanaged firewall is barely better than no firewall at all.

In 2026, with cyber threats against UK businesses reaching record levels, proper firewall management is not a luxury reserved for large enterprises. It is a fundamental requirement for any organisation that connects to the internet — which is to say, every business. The National Cyber Security Centre (NCSC) identifies firewalls and internet gateways as one of the five core technical controls in the Cyber Essentials certification scheme, underscoring their importance in baseline security.

This guide covers everything UK small businesses need to know about firewall management: what firewalls do, the different types available, how to configure them properly, and how to maintain them over time.

39%
of UK businesses reported a cyber attack in the past 12 months
82%
of breaches involve the network perimeter or web applications
£15,300
Average cost of a cyber breach for a UK small business
5x
increase in firewall-targeted exploits since 2023

What Does a Firewall Actually Do?

At its most basic level, a firewall inspects network traffic and applies rules to determine whether that traffic should be allowed or blocked. It sits between your internal network and the internet, acting as a gatekeeper that filters incoming and outgoing data packets based on predefined security policies.

Modern firewalls do far more than simple packet filtering. A next-generation firewall (NGFW) can inspect the content of traffic at the application layer, identify and block malware, detect intrusion attempts, filter web content, manage VPN connections, and provide detailed logging of all network activity. Think of a traditional firewall as a bouncer checking IDs at the door, and a next-generation firewall as a bouncer who also searches bags, checks the guest list, monitors behaviour inside the venue, and records everything on CCTV.

Types of Firewall

Understanding the different types of firewall helps you choose the right solution for your business.

Firewall Type How It Works Best For Typical Cost
Packet Filtering Inspects individual packets against basic rules (source, destination, port) Very basic perimeter protection £100-300
Stateful Inspection Tracks active connections and makes decisions based on traffic state Standard business use £300-800
Next-Generation (NGFW) Deep packet inspection, application awareness, intrusion prevention Most UK SMEs £500-3,000
Unified Threat Management (UTM) NGFW features plus antivirus, spam filtering, and content filtering SMEs wanting all-in-one security £800-5,000

Why Set-and-Forget Is Dangerous

A firewall that was correctly configured two years ago may be dangerously out of date today. Cyber threats evolve constantly, and the rules that were appropriate in 2024 may leave gaping holes in 2026. Here are the key reasons why ongoing firewall management is essential.

Firmware vulnerabilities. Firewall manufacturers regularly discover and patch security vulnerabilities in their products. In recent years, critical vulnerabilities in popular firewalls from Fortinet, SonicWall, Palo Alto Networks, and others have been actively exploited by attackers. If your firewall firmware is not kept up to date, you may be running a device with known, publicly documented weaknesses that attackers are actively targeting.

Rule sprawl. Over time, firewall rules accumulate. Temporary rules created for specific projects are never removed. Overly permissive rules are added during troubleshooting and left in place. Former employees' VPN access is never revoked. This rule sprawl gradually erodes your security posture, creating pathways through the firewall that should not exist.

Changing business needs. Your network is not static. New applications, new office locations, new cloud services, and new remote working arrangements all require firewall rule changes. Without active management, the firewall configuration drifts further and further from what your business actually needs.

Cyber Essentials Requirement

To achieve Cyber Essentials certification — increasingly required for UK government contracts and widely recognised as a baseline security standard — your firewall must be properly configured and maintained. This includes changing default passwords, disabling unnecessary services, configuring rules to block unapproved inbound connections, and ensuring firmware is kept current. An unmanaged firewall will fail a Cyber Essentials assessment.

Essential Firewall Management Practices

Effective firewall management does not require deep technical expertise if you follow a structured approach. Here are the practices every UK small business should implement.

1. Keep Firmware Updated

Subscribe to your firewall vendor's security advisories and apply firmware updates promptly. Critical security patches should be applied within days of release, not weeks or months. If you are unsure how to update your firewall firmware safely, this is exactly the kind of task a managed IT provider handles as standard.

2. Review Rules Quarterly

At least every three months, review your firewall rules to identify and remove any that are no longer needed. Look for rules that are overly broad, rules that were created as temporary measures, and rules associated with former employees or decommissioned systems. Every unnecessary rule is a potential attack vector.

3. Follow the Principle of Least Privilege

Firewall rules should allow the minimum access necessary for business operations. The default stance should be to deny all traffic and then create specific rules to permit what is needed. Many businesses operate the reverse — allowing everything and then trying to block known threats. This approach is fundamentally flawed because it requires you to know about every possible threat in advance.

Deny-by-Default Approach

  • Block all traffic by default
  • Create specific allow rules for business needs
  • Every permitted connection is documented and justified
  • New threats are blocked automatically
  • Meets Cyber Essentials requirements

Allow-by-Default Approach

  • Permit all traffic by default
  • Try to block known threats with deny rules
  • Unknown threats pass through unchecked
  • Difficult to audit what is permitted
  • Fails Cyber Essentials assessment

4. Enable and Monitor Logging

Your firewall generates logs of every connection it processes — allowed and blocked. These logs are invaluable for detecting suspicious activity, investigating incidents, and demonstrating compliance. Ensure logging is enabled, that logs are stored securely (ideally on a separate system so they cannot be tampered with if the firewall is compromised), and that someone is actually reviewing them regularly.

For most SMEs, reviewing raw firewall logs is impractical. Automated log analysis tools or a managed security service can parse the logs and alert you to anomalies — such as repeated blocked connection attempts from a single source, unusual outbound traffic patterns, or connections to known malicious IP addresses.

5. Segment Your Network

Internal network segmentation uses your firewall (or additional internal firewalls) to divide your network into separate zones. For example, you might have one zone for general office workstations, another for servers, another for guest Wi-Fi, and another for IoT devices. Traffic between zones is controlled by firewall rules, limiting the damage an attacker can do if they compromise one part of your network.

Businesses with flat networks (no segmentation)
62%
Businesses with basic segmentation
27%
Businesses with full micro-segmentation
11%

6. Manage VPN Access Carefully

If your firewall provides VPN access for remote workers, manage this rigorously. Remove access immediately when employees leave the organisation. Use multi-factor authentication for VPN connections. Restrict VPN users to only the resources they need — a remote worker should not have unrestricted access to your entire network simply because they have connected via VPN.

7. Test Your Firewall Regularly

Periodic vulnerability scanning and penetration testing should include your firewall. External scans can identify ports that are unexpectedly open or services that are exposed to the internet. Internal testing can verify that network segmentation rules are working correctly. The NCSC recommends that UK businesses conduct regular vulnerability assessments as part of their security programme.

Choosing the Right Firewall for Your Business

For UK SMEs with 10 to 100 users, a next-generation firewall from a reputable vendor is the recommended choice. Popular options include Fortinet FortiGate, Cisco Meraki MX, WatchGuard Firebox, and SonicWall TZ series. Each has strengths — Fortinet offers excellent value for money, Meraki provides superb cloud management, WatchGuard is known for ease of use, and SonicWall has a strong track record in the SME market.

The right choice depends on your specific requirements, your budget, and whether your IT provider has expertise with a particular vendor. Consistency matters — if your IT support team knows Fortinet inside out, a FortiGate firewall will be managed more effectively than an unfamiliar product.

Consumer router/firewall - Security levelVery Low
Basic business firewall - Security levelModerate
Next-gen firewall (managed) - Security levelHigh
NGFW + SIEM + SOC - Security levelVery High

Managed Firewall Services

For many small businesses, managing a firewall in-house is simply not realistic. It requires specialist knowledge that most small teams do not possess, and the consequences of getting it wrong can be severe. A managed firewall service from a specialist IT provider transfers the responsibility for configuration, monitoring, patching, and rule management to experts who do this work every day.

A good managed firewall service includes initial configuration and hardening, ongoing firmware management and patching, rule review and optimisation, 24/7 monitoring and alerting, regular security reports, and support for incident response. For UK SMEs, this typically costs between £50 and £200 per month depending on the complexity of your setup — a fraction of the cost of a single security breach.

Firewall management is not glamorous, and it is not the kind of task that generates visible results when done well. But it is one of the most important things you can do to protect your business. A properly managed firewall, kept up to date and regularly reviewed, is one of the strongest defences your business has against the growing tide of cyber threats facing UK organisations.

Need Expert Firewall Management?

Cloudswitched provides fully managed firewall services for UK businesses, including configuration, monitoring, patching, and rule management. Protect your network without the complexity of managing it yourself.

GET IN TOUCH
Tags:Network AdminFirewalls
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.