Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

#LifeKoKaroLift

Subnetting & Firewall

1
Subnetting

5
subnet mask

Subnetting is the process of dividing a large network into smaller sub-networks, or


subnets. This division helps in organizing and managing a network more efficiently,
allowing for better control of traffic flow and resource allocation.

3
subnet mask

Benefits of Subnetting:

● Efficient Use of IP Addresses: Subnetting allows for the more efficient allocation of IP addresses. Instead of assigning a single IP address to
each device on a large network, subnetting allows for the creation of smaller subnets, each with its own range of IP addresses. This helps in
conserving IP addresses, which can be crucial in environments where IP address space is limited.
● Improved Network Performance: By dividing a large network into smaller subnets, subnetting can help reduce the size of broadcast
domains. This can lead to a decrease in network congestion and an improvement in overall network performance. Additionally, subnetting
can help isolate network issues to specific subnets, making troubleshooting easier and more efficient.
● Enhanced Security: Subnetting can also help enhance network security. By dividing a large network into smaller subnets, it is possible to
implement more granular security policies. For example, different subnets can be assigned different levels of access permissions, allowing
for more precise control over who can access specific resources on the network. Subnetting can also help in isolating network traffic,
making it more difficult for unauthorized users to gain access to sensitive information.

4
subnet mask

Given network: 192.168.1.0/24

Choose a Suitable Subnet Mask:

Let's say we want to create 4 subnets. To do this, we need to borrow 2 bits from the host portion of the IP address, as 2^2 = 4
subnets.

Subnet mask for 4 subnets: 255.255.255.192 (/26) - 26 bits for the network portion.

5
subnet mask

Determine the Number of Subnets and Hosts per Subnet:

Number of subnets = 2^2 = 4

Number of hosts per subnet = 2^(remaining bits) - 2 = 2^(8-6) - 2 = 2^2 - 2 = 4 - 2 = 2

Calculate the Subnet Address and Broadcast Address:

Subnet 1: 192.168.1.0/26 (Subnet Address: 192.168.1.0, Broadcast Address: 192.168.1.63)

Subnet 2: 192.168.1.64/26 (Subnet Address: 192.168.1.64, Broadcast Address: 192.168.1.127)

Subnet 3: 192.168.1.128/26 (Subnet Address: 192.168.1.128, Broadcast Address: 192.168.1.191)

Subnet 4: 192.168.1.192/26 (Subnet Address: 192.168.1.192, Broadcast Address: 192.168.1.255)

Determine the Range of Usable IP Addresses:

6
subnet mask

Subnet 1: 192.168.1.1 to 192.168.1.62 (Usable: 192.168.1.1 - 192.168.1.62)

Subnet 2: 192.168.1.65 to 192.168.1.126 (Usable: 192.168.1.65 - 192.168.1.126)

Subnet 3: 192.168.1.129 to 192.168.1.190 (Usable: 192.168.1.129 - 192.168.1.190)

Subnet 4: 192.168.1.193 to 192.168.1.254 (Usable: 192.168.1.193 - 192.168.1.254)

7
Port number

5
Port Number

What are Port Numbers?


Port numbers are 16-bit unsigned integers, ranging from 0 to 65535.
They are divided into three ranges:
Well-known ports (0-1023): Reserved for system services or widely used
applications (e.g., HTTP on port 80, HTTPS on port 443).
Registered ports (1024-49151): Assigned to specific applications by the Internet
Assigned Numbers Authority (IANA) (e.g., SSH on port 22, SMTP on port 25).
Dynamic or private ports (49152-65535): Used for ephemeral purposes, such as
temporary connections.

9
Port Number

How Port Numbers Work:


When a computer sends data over a network, it includes the destination port
number along with the destination IP address.
On the receiving end, the operating system uses the port number to determine which
application or service should receive the incoming data.
This allows multiple applications to run simultaneously on a single device, each
communicating through its own port number.

10
Port Number

Commonly Used Ports:

Port 80: Used for HTTP (Hypertext Transfer Protocol) traffic, which is the protocol
used for accessing websites.
Port 443: Used for HTTPS (Hypertext Transfer Protocol Secure) traffic, which is
HTTP encrypted with SSL/TLS.
Port 22: Used for SSH (Secure Shell) traffic, which provides secure access to a remote
computer.
Port 25: Used for SMTP (Simple Mail Transfer Protocol) traffic, which is used for
sending email.
11
Port Number

Port Number Assignments:


Well-known ports are assigned by the IANA, while registered ports can be requested by
application developers or organizations for specific purposes.
Ports are assigned based on the protocol being used (e.g., TCP or UDP) and the type of
service or application.
Firewalls and Port Numbers:
Firewalls can block or allow traffic based on port numbers. For example, a firewall might
block incoming traffic on port 80 to prevent unauthorized access to a web server.
Network administrators use firewalls to control which ports are open or closed to protect
their network from unauthorized access or attacks.
12
Firewall

5
Firewall

A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted internal network and untrusted external networks, such as the
internet, to prevent unauthorized access while allowing legitimate communication.

14
Firewall

Types of Firewalls:
Packet Filtering Firewalls:
Examines packets of data as they pass through the firewall.
Filters packets based on predefined rules (e.g., source/destination IP address, port
number, protocol).
Can be simple and fast but offer limited security features.

15
Firewall

Stateful Inspection Firewalls:

Keeps track of the state of active connections and makes decisions based on the
context of the traffic.
Provides higher security by considering the state of the connection, not just
individual packets.

16
Firewall

Proxy Firewalls:

Acts as an intermediary between internal and external systems.


Requests from internal clients are forwarded to the proxy, which then initiates a new
request to the external server.
Provides additional security by hiding internal IP addresses and filtering content.

17
Firewall

Next-Generation Firewalls (NGFW):

Incorporate features of traditional firewalls, plus additional security measures such


as intrusion prevention, application awareness, and deep packet inspection.
Can identify and block sophisticated attacks, including malware and
application-layer attacks.

18
Firewall

Functions of a Firewall:
Stateful Inspection: Keeps track of the state of active connections to make more
informed decisions about allowing or blocking traffic.
Proxy Services: Acts as an intermediary for client requests, enhancing security by
filtering content and hiding internal network details.
Virtual Private Network (VPN) Support: Supports secure remote access through
VPN tunnels, allowing remote users to securely connect to the internal network.

19
Firewall

Benefits of Firewalls:
Improved Security:Protects against unauthorized access and cyber threats, such as
malware, viruses, and denial-of-service (DoS) attacks.
Network Segmentation: Allows for the creation of security zones within a network,
improving overall network security.
Regulatory Compliance: Helps organizations comply with regulatory requirements
regarding network security and data protection.

20
#RahoAmbitious

Thank you!

44

You might also like