You are on page 1of 4

Bharatiya Vidya Bhavan’s

Sardar Patel Institute of Technology


Bhavan’s Campus, Munshi Nagar, Andheri (West), Mumbai-400058-India
(Autonomous College Affiliated to University of Mumbai)
Department of Electronics and Telecommunication

Course code EC 307 Computer Communication Network 2022.23


Name: Gaurang Gawas UID: 2021201071

Aim: Study and Demonstration of Network security using simulation Tools

Apparatus (Software): Desktop/ Laptop, OS(Windows, Ubuntu, Android )

Theory:
 Introduction to VPN for information security
Users can establish a private, encrypted connection to the internet using VPN
technology. Sensitive data is shielded from hackers and thieves thanks to its
high level of privacy and security. Users can also get around geo-restrictions and
access content that might be blocked in their area. Anyone who wishes to
increase their online privacy and security should consider using a VPN.

 Introduction to the firewall for network security


A firewall is a security system that monitors and controls the incoming and
outgoing network traffic based on predetermined security rules. It can be
hardware-based or software-based and can be configured to block or allow
specific types of traffic based on a set of rules. It provides a high level of
security and can help comply with various security regulations and standards. It
is an essential tool for improving information security.

 Write Procedure for demonstration of VPN:


 Output Screen shots

 Tracert command from pc0 to pc1:-

 Tracert command from pc0 to pc1 using tunnel :-

Interpretation:
● VPN is implemented using the IPsec protocol on the router.
● VPN allowed PC0 and PC1 to bypass using t h e tunnel o f the ISP
router while communicating with each other.
 Write Procedure for demonstration of VPN:

 Output Screen shots


 fig.: Ping command from PC0 to Google Server

 fig.: Tracert command from PC0 to Google Server

Interpretation:
● Firewall is implemented using Cisco ASA for TCP and ICMP protocols.
● Firewall allows client PCs to connect to the internet securely

Conclusion:
 The experiment demonstrated how Cisco Packet Tracer can be used to simulate a
network environment and test different configurations before implementing them in
a real-world setting.
 The experiment demonstrated the importance of network security and how VPNs
and firewalls can be used to secure a network.
 The experiment also demonstrated how Cisco Packet Tracer can be used to simulate
a network environment and test different configurations before implementing them
in a real-world setting.
 Overall, the experiment provided a valuable learning experience in network security,
and the skills gained can be applied in a variety of settings to ensure the security of
network infrastructure.

You might also like