Problem Statement
Why keep a host-based firewall (e.g., Windows Firewall, ufw/nftables) enabled even with a perimeter firewall?
Explanation
Host firewalls restrict inbound and outbound flows per machine, containing blast radius if an attacker lands on an endpoint. They complement, not replace, network firewalls and segmentation.
Code Solution
SolutionRead Only
Linux (ufw): ufw default deny incoming; ufw allow 22/tcp Windows: New-NetFirewallRule -DisplayName "Allow SSH" -Direction Inbound -Protocol TCP -LocalPort 22 -Action Allow
