{"version":"1.0","provider_name":"Bluehost Blog","provider_url":"https:\/\/www.bluehost.com\/blog\/en-in\/","author_name":"Rahul Sharma","author_url":"https:\/\/www.bluehost.com\/blog\/en-in\/author\/reemagupta\/","title":"Firewalls - Types, Capabilities and Limits","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"hhxny1chtL\"><a href=\"https:\/\/www.bluehost.com\/blog\/en-in\/firewalls-types-capabilities-and-limits\/\">Firewalls &#8211; Types, Capabilities and Limits<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.bluehost.com\/blog\/en-in\/firewalls-types-capabilities-and-limits\/embed\/#?secret=hhxny1chtL\" width=\"600\" height=\"338\" title=\"&#8220;Firewalls &#8211; Types, Capabilities and Limits&#8221; &#8212; Bluehost Blog\" data-secret=\"hhxny1chtL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.bluehost.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2022\/08\/Blog-banner-Sizes-for-Bluehost-1200-x-800-8.png","thumbnail_width":1200,"thumbnail_height":800,"description":"More than 30 years after the introduction of the firewall concept into the security debate, technology remains an essential tool in the corporate network security arsenal. Firewalls have been proven effective for decades, filtering malicious traffic before it traverses the network perimeter. However, like any major technology that has been around for a long time, [&hellip;]"}