Professional Documents
Culture Documents
Subnetting & Firewall
Subnetting & Firewall
1
Subnetting
5
subnet mask
3
subnet mask
Benefits of Subnetting:
● Efficient Use of IP Addresses: Subnetting allows for the more efficient allocation of IP addresses. Instead of assigning a single IP address to
each device on a large network, subnetting allows for the creation of smaller subnets, each with its own range of IP addresses. This helps in
conserving IP addresses, which can be crucial in environments where IP address space is limited.
● Improved Network Performance: By dividing a large network into smaller subnets, subnetting can help reduce the size of broadcast
domains. This can lead to a decrease in network congestion and an improvement in overall network performance. Additionally, subnetting
can help isolate network issues to specific subnets, making troubleshooting easier and more efficient.
● Enhanced Security: Subnetting can also help enhance network security. By dividing a large network into smaller subnets, it is possible to
implement more granular security policies. For example, different subnets can be assigned different levels of access permissions, allowing
for more precise control over who can access specific resources on the network. Subnetting can also help in isolating network traffic,
making it more difficult for unauthorized users to gain access to sensitive information.
4
subnet mask
Let's say we want to create 4 subnets. To do this, we need to borrow 2 bits from the host portion of the IP address, as 2^2 = 4
subnets.
Subnet mask for 4 subnets: 255.255.255.192 (/26) - 26 bits for the network portion.
5
subnet mask
6
subnet mask
7
Port number
5
Port Number
9
Port Number
10
Port Number
Port 80: Used for HTTP (Hypertext Transfer Protocol) traffic, which is the protocol
used for accessing websites.
Port 443: Used for HTTPS (Hypertext Transfer Protocol Secure) traffic, which is
HTTP encrypted with SSL/TLS.
Port 22: Used for SSH (Secure Shell) traffic, which provides secure access to a remote
computer.
Port 25: Used for SMTP (Simple Mail Transfer Protocol) traffic, which is used for
sending email.
11
Port Number
5
Firewall
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted internal network and untrusted external networks, such as the
internet, to prevent unauthorized access while allowing legitimate communication.
14
Firewall
Types of Firewalls:
Packet Filtering Firewalls:
Examines packets of data as they pass through the firewall.
Filters packets based on predefined rules (e.g., source/destination IP address, port
number, protocol).
Can be simple and fast but offer limited security features.
15
Firewall
Keeps track of the state of active connections and makes decisions based on the
context of the traffic.
Provides higher security by considering the state of the connection, not just
individual packets.
16
Firewall
Proxy Firewalls:
17
Firewall
18
Firewall
Functions of a Firewall:
Stateful Inspection: Keeps track of the state of active connections to make more
informed decisions about allowing or blocking traffic.
Proxy Services: Acts as an intermediary for client requests, enhancing security by
filtering content and hiding internal network details.
Virtual Private Network (VPN) Support: Supports secure remote access through
VPN tunnels, allowing remote users to securely connect to the internal network.
19
Firewall
Benefits of Firewalls:
Improved Security:Protects against unauthorized access and cyber threats, such as
malware, viruses, and denial-of-service (DoS) attacks.
Network Segmentation: Allows for the creation of security zones within a network,
improving overall network security.
Regulatory Compliance: Helps organizations comply with regulatory requirements
regarding network security and data protection.
20
#RahoAmbitious
Thank you!
44