Back to Resources
Field Note Mar 2026 6 min read

Choosing an OT Firewall: What Matters and What Doesn't

Firewall selection drives your segmentation strategy for years. Learn what features actually matter for OT versus vendor marketing fiction.

C

Cascadia OT Security

Founder · Managing Principal · CISSP · GICSP

PLC-01HMIRTU-02DMZHISTSCADACORPZONE TOPOLOGYTRAFFIC FLOW →

Vendor marketing confuses firewall selection. Everyone claims to be "OT-aware," "ICS-hardened," and "deterministic." But OT firewall selection should focus on architectural fit, performance under production load, and the operational reality of maintaining rules for 15 years without security patches breaking your devices.

The most expensive firewall is not the most capable—it's the one that doesn't fit your network topology or requires constant troubleshooting to maintain production uptime. Buy for steady-state operations, not peak marketing claims.

Technical Criteria That Matter

Stateful session handling must preserve TCP and UDP timeouts appropriate for slow industrial protocols. Many commercial firewalls default to 30-second timeouts that timeout long-lived Modbus sessions. Confirm the device supports configurable timeouts, not just Mbps throughput. Throughput at line rate is worthless if the firewall breaks your production traffic.

Rule capacity matters more than you expect. A small industrial facility may have 500-1000 access control rules. A multi-zone facility can easily exceed 5000 rules. Firewalls that choke at 2000 rules become liabilities when you add a second production line. Select for headroom, not current load.

What You Actually Need

What You Don't Need

Do not buy a firewall because it claims "AI-powered threat detection" or "behavioral anomaly analysis." OT firewalls are enforcement points, not detective controls. Detection and response belong in separate systems (IDS, historian analysis, SIEM). A firewall trying to do too much becomes slow and unreliable at its primary job.

Avoid firewalls that require internet connectivity for threat intelligence updates. Your OT network should not depend on cloud licensing, vendor databases, or external threat feeds for basic operation. Air-gapped OT networks need firewalls that function fully offline.

Most importantly, choose a vendor who will support the device for 10+ years with security patches that don't break existing rules. This is a longer commitment than server hardware. If you'd like to discuss firewall architecture for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call