Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Network and information security (22620) Topic -Firewall implementation

DEPARTMENT OF INFORMATION
TECHNOLOGY

Microproject Report
Network and Information Security [NIS]

Topic: Firewall Implementation using


cisco packet tracer
Academic Year: 2023-24

Program Code: IF6I


Course: Network and Information Security [NIS]
Course Code: 22620
Subject Teacher: Mr Sumit Parmar .
Group No: 7

ZAGDU SINGH CHARITABLE TRUST (REGD.)

THAKUR POLYTECHNIC
(AN ISO 9001:2015 Certified Institute)
Thakur Complex, West to W.E Highway, Kandivali (E), Mumbai – 400 101.
(Accredited by: National Board of Accreditation)

1|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

MAHARASHTRA STATE BOARD


OFTECHNICAL
EDUCATION

Certificate
This is to certify that: Anjali Chaurasiya (2105220096), Sanskruti Londhe
(2105220151)Ananya Parbat(2205220277) of Fifth Semester of Diploma in
Information Technology of Institute, Thakur Polytechnic (Code: 0522)
havecompleted the Micro Project satisfactorily in subject Management for
the academic year 2023-24 as prescribed in the curriculum.

Place: Mumbai Date:

Subject Teacher Head of the Department Principal

2|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

ACKNOWLEDGEMENT

This acknowledgment transcends the reality of formality when we would like


toexpress deep gratitude and respect to all those people behind the screen who
guided, inspired and helped me for the completion of our project work.

This project would add as an asset to my academic profile. We express our


sincere gratitude to our respectful Principal Dr. S.M. Ganechari for enabling
us to make use of laboratory and library facilities liberally, that helped us a long
way in carrying out our project work successfully.

We consider ourselves lucky enough to get such a good project. This project
would add as an asset to my academic profile. We express our gratitude to the
help of the Head of the Department of Information technology, Mrs. Suwarna
Thakre, for her constant supervision, guidance and co-operation throughout
theproject and we would like to express our thankfulness to our project guide
(subject teacher), MR.Sumit Parmar. for his constant motivation and
valuable help through the project work. We extend our sincere gratitude to our
parents who have encouraged us with their blessings to do this project
successfully.

THANK YOU

3|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

PROPOSAL

4|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Micro-Project Proposal
Firewall Implementation using cisco packet tracer

1. Aim/Benefit of the project:


• A firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on predetermined security
rules. Implementing a firewall using Cisco Packet Tracer, a simulation tool
for networking, can provide several benefits for an organization
• Secure network: By implementing a firewall, organizations can ensure that
unauthorized users cannot access their network and sensitive data. The
firewall can block malicious traffic and prevent unauthorized access
attempts.
• Control network traffic: A firewall can help organizations control the flow
of network traffic by setting up rules and policies. This can prevent
network congestion and ensure that critical applications have sufficient
bandwidth.
• Protect against cyber threats: Firewalls are essential in protecting networks
from various cyber threats, such as malware, phishing attacks, and DDoS
attacks. By implementing a firewall, organizations can reduce the risk of a
security breach.

2. Course Outcomes:
• Apply measures to prevent attack on network using firewall.

3. Proposed Methodology:
In order to complete the Micro-Project Network and Information
security the procedure that will be followed is listed below:
• Collection of Information
• Co-ordination with necessary ethics
• Group discussion
• References from websites and books
• Execution of the project
• Preparing the report
• Presentation of project
• Report Submission

5|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

4. Action Plan:
Sr. No Details of Planned Start Planned Name of
Activity Date Finished responsible
Date team members
1 Information 15-01-2024 20-01-2024 All team
Search members
2 Group 21-01-2024 28-01-2024 All team
Discussion members
3 Group 29-01-2024 05-02-2024 All team
Discussion members
4 Taking 06-02-2024 10-02-2024 Ananya parbat
Reference
5 Execution 11-02-2024 20-02-2024 Sanskruti Londhe

6 Compilationof 21-02-2024 29-02-2024 Anjali


reports Chaurasiya &
Sanskruti
Londhe
7 Presentation 01-03-2024 10-03-2024 All team
members
8 Report 11-03-2024 15-03-2024 All team
Submission members

5. Resources Required:

Sr. Name of Specifications Remarks


No Resources/Materials

1 Internet https://www.geeksforgeeks.org/basic- Available


firewall-configuration-in-cisco-packet-
tracer/
2 software Cisco packet tracker Available

Name of Responsible Team Members:

Anjali Chaurasiya (01)


Ananya Parbat (56)
Sanskruti Londhe (49)
(MR. Sumit Parmar)

6|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

REPORT

7|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

1. Rationale
Firewalls are essential components of network security that act as a barrier
between a trusted internal network and untrusted external networks, such as
the internet. The primary purpose of implementing a firewall is to enhance
the security posture of an organization by controlling and monitoring
incoming and outgoing network traffic based on predetermined security
rules.

2. Aims of Micro Project


• Firewalls play a crucial role in modern computer networks, providing an
essential layer of protection against unauthorized access, malicious attacks,
and data breaches. By implementing a firewall, organizations can
significantly improve their network security posture, enhance privacy and
data protection, increase network stability and performance, meet regulatory
compliance requirements, and achieve cost savings compared to other
security solutions.
• As cyber threats continue to evolve, the importance of firewalls and their
effective implementation will remain paramount in safeguarding computer
networks and protecting valuable assets.
• Cisco provides networking hardware, software, and security solutions,
including firewalls. Their products and expertise were utilized to understand
the technical aspects of firewall implementation and benefits.
• Firewalls can detect and prevent intrusions by analyzing traffic patterns and
identifying anomalies. They can also block known malicious traffic, such as
malware-infected emails or websites hosting malicious content.

3. Course Outcomes Addressed


• Apply measures to prevent attack on network using firewall.

4. Actual Methodology Followed


In order to complete the Micro-Project of Operating System theprocedure that
will be followed is listed below:
• Collection of Information
• Co-ordination with necessary ethics
• Group discussion
• References from websites and books
• Execution of the project
• Preparing the report
• Presentation of project
• Report Submission

8|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

5. Resources Required
Sr. Name of Specifications Remarks
No Resources/Materials
1 Internet https://blog.rsisecurity.com/co Available
mprehensive-guide-to-firewall-
implementation/
2 Software Cisco packet tracker Available

6. Literature Review

• The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by Clifford Stoll: A non-fiction book that details the author's real-life
experience tracking down a hacker who breached the security of a computer
network in the 1980s.
• Cybersecurity and Cyberwar: What Everyone Needs to Know by P.W. Singer
and Allan Friedman: An accessible introduction to the world of cybersecurity,
covering topics such as cyber threats, hacking techniques, and the role of
government in protecting digital infrastructure.
• The Art of Intrusion: The Real Stories Behind the Exploits of Hackers,
Intruders and Deceivers by Kevin D. Mitnick and William L. Simon: A
collection of true stories that delve into the methods used by hackers to
infiltrate networks and compromise security Systems.

7. Output of the Micro Project:


The results of putting in place a firewall can differ based on the particular
circumstances and the administrator-established rules. The following are some
possible results of implementing a firewall:
Enhanced network security: A firewall can assist in defending the network
against viruses, illegal access, and other security risks by screening and
tracking all incoming and outgoing traffic.

Improved network performance and lower latency can be attained by using a


firewall to filter unwanted or dangerous data packets, which helps optimize
network traffic.
Enhanced control and visibility: Administrators may monitor and manage
access to important resources by using firewalls, which give them insight into
network traffic.

9|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

TYPES OF FIREWALL
1. Network-based firewall: This type of firewall is installed on a network gateway
and monitors incoming and outgoing traffic to block or allow specific types of
traffic based on predefined rules.
2. Host-based firewall: This type of firewall runs on individual devices, such as a
computer or server, and controls the traffic to and from that specific device.
3. Application-level firewall: This firewall monitors and controls network traffic at
the application level, allowing for more granular control over specific
applications or services.
4. Proxy firewall: A proxy firewall acts as an intermediary between the internal
network and external networks, filtering and blocking traffic based on specific
criteria.
5. Stateful firewall: This type of firewall keeps track of the state of active
connections and uses this information to make decisions about whether to allow
or block traffic.
6. Next-generation firewall: These firewalls combine traditional firewall
capabilities with advanced security features such as intrusion prevention,
application control, and deep packet inspection.
7. Packet-filtering firewall: A packet-filtering firewall examines packets of data as
they pass through the network and allows or blocks them based on predefined
rules.
8. Cloud firewall: This type of firewall is hosted in the cloud and provides
protection for cloud-based applications and data, often offering scalable and
flexible security measures

10 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Firewall implementation:
1.structure

11 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

12 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

13 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Applications:
Applications of Firewalls

1. Application-Specific Access Control: For Java applications that require


internet access, firewalls can be configured to allow specific traffic. For
example, if an application needs to access a web service, a firewall rule
can be set to allow traffic only to that specific server and port,
enhancing security
2. Network Security: Firewalls are essential for protecting a network from
external threats. They monitor and control incoming and outgoing
network traffic based on predetermined security rules.
3. Control and monitor inbound and outbound network traffic, allowing
organizations to enforce security policies and restrict access to certain
websites or services.
4. Bandwidth management: Firewalls can be configured to optimize
network performance by prioritizing traffic and managing bandwidth
usage, ensuring that critical applications have sufficient resources.

14 | P a g e
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Conclusion:
In conclusion, firewalls are essential components of network security that help
to protect systems and data from a wide range of cyber threats. They serve as
a critical barrier between an organization's internal network and external
threats, controlling incoming and outgoing traffic based on predefined security
rules. By monitoring and filtering network traffic, firewalls can prevent
unauthorized access, mitigate the risk of malware infections, and enforce
security policies. It is important for organizations to implement firewalls as
part of a comprehensive cybersecurity strategy to safeguard their networks and
assets from potential security breaches.

Name of Team Members with Roll No.

Anjali Chaurasiya (01)


Ananya Parbat(56)
Sanskruti Londhe (49)

15 | P a g e
Department of Information Technology, IF6I

You might also like