You are on page 1of 62

I.

Introduction

The On-the-Job Training (OJT) Program is a part of the college curriculum where

students are able to exercise and apply the technical and theoretical knowledge they’ve

learned from the university. The Central Luzon State University Bachelor of Science in

Information Technology Curriculum requires three hundred (300) hours of OJT.

Throughout this Program, the students undergo a hands-on training in a particular

company which is related to their chosen field of expertise.

The Program allows companies to train students who will serve as an addition to

their workforce thereby making a more efficient outcome. It requires them to oversee and

guide the students to be familiar with the company’s day-to-day activities and

transactions. Daily activities serve as tests for the interns which will in turn help them

improve their skills. Because of these tasks, the supervisors will be able to observe how

productive and useful are the trainees with regards to efficiency, effectivity, and quality

of their performance. This may be a tool to help them choose quality employees for

hiring in the future. For the students, the Program prepares them to develop their skills,

acquire experience, learn to innovate and nurture themselves in their chosen field. The

experience they learn from the Training will serve as their gauge in selecting a working

environment suitable for their growing capacity in the future. The Program also helps

students to find the right job where they can apply their skills and start their career as

professionals.

1
A. Importance of the field practice

The Program serves as a training ground for students to improve their knowledge,

talents, and interpersonal skills. It allows the students to apply the knowledge, ideas and

theories they have learned inside the classroom.

On-the-job-training (OJT) Programs also help the students to gain additional

concepts and learn more for advancement in their chosen field. The field practice

involved in the Program lets them experience real world scenarios and facilitates

development of desirable work habits. It also increases perseverance and self-motivation

required to be a responsible professional.

On-the-job-training is an instrument for the students to develop proper work attitude

such as having sense of responsibility, confidence, creativity and productivity. Moreover,

it greatly helps the students in gaining personal and hands-on experience in their chosen

field of specialty.

B. Objective of the field practice

In line with the thrust of the Department of Information Technology to produce

technically equipped and extensively trained Information Technology (IT) graduates, the

On-the-Job-Training (OJT) Program aims to:

a. Provide students the opportunity to acquire practical knowledge, skills, and

desirable attitudes and values in reputable establishments or industries;

b. Promote competitiveness of students through their training to give them insights

on the various corporate use of technologies, management strategies, and

organizational behaviors;

2
c. Enhance the students’ work competencies and discipline as they relate to people

in the workplace and to instill the importance of human relations in the working

environment;

d. Develop a positive attitude, self`-confidence, and motivation required of a

responsible professional capable to handle new challenges and complex tasks;

e. Provide opportunities to learn from and network with experienced professionals;

and

f. Strengthen and enrich the BSIT program through the documented experiences of

students in their OJT.

C. Location and Duration of the Field Practice

The field practice was conducted in M.D. Tambungui Specialist Inc. located at

#18 Wacat St., N.S. Amoranto Sr. Avenue, La Loma, Quezon City, Metro Manila,

Philippines (See Figure 1). The trainee was assigned on various departments or sections

of the company. The training started in January 30, 2017 and ended in April 06, 2017.

The trainee reported for work from Monday to Friday and rendered exactly eight hours

working time daily for the company, excluding a one hour lunch break. The trainee

fulfilled the three-hundred-hour training period.

The trainee was required to record their arrival and departure using Daily time

record (DTR). The required Three Hundred (300) hours have completed as recorded in

the DTR.

3
Figure 1 Location Map of the Company

4
II. STATION AND PLACE OF ASSIGNMENT

A. Brief Description of the Place of Assignment

MD Tambungui Specialist Inc. is one of the primary contractors in

telecommunication industry in the Philippines. It showcases different services from

generators, power distribution up to tower fabrication and installation. It is also known

to be one of the active and main PLDT and Globe contractors in the country. Almost a

decade since its establishment, MDTS Inc. has shown its capability, flexibility,

innovation and competitiveness in many ways to PLDT, Globe, and various telecom

players. It offered services in system installation of High frequency (HF) and Very

high frequency (VHF), microwave equipment including generators, power

distributions, telecommunication, tower erection and antenna installation.

B. Activities of the Place of Assignment

1. DSL Installation - Installs, maintains and repairs telecommunication systems,

including cable television, broadband Internet and telephone services. They

frequently perform these services on-site at homes or businesses. Although the

formal education requirements can be minimal. Employees with limited

knowledge, training or expertise could face fierce job competition. The

sector’s technicians have degree in telecommunications.

2. Smart BTS Maintenance and Installation - They are also responsible in the

installation and maintenance of base transceiver station

3. GEPON Installation and Maintenance - Being one of globe’s major

contractors, MDTS is also responsible in installing globe internet on different

residences and establishments along metro manila. The department has six

5
teams consisting of two members and a team leader. These teams are

distributed on different places in metro manila to install, repair, configure and

troubleshoot seven days a week.

4. Engineering and Installation - Inside and outside plant engineering and

installation on both aerial and buried cable networks. Operating a complete

fleet of service vehicles, provides timely and reliable service for any inside

and outside plant needs. This provides full range of services including

• Shelter Installations

-This is the wiring of internet cables inside the premises of the

client.

• New Site-Build outs

-Citing the nearest installation of the network cable for the client

and find what is the best site to install the network cable therefore.

• Route Patrol

-Routing all the network cables if there’s a human error or that the

other contractor has move their existing cable wires.

• Fiber Splicing/Locating/Install

-Fiber Splicing, fixing of fiber inside that has been broken cause by

the trees or a human error. Locating, finding the length of which

the fiber has been damaged. Installation, this is the part where the

establishing of wiring outside is done.

6
• 24-hour emergency call out

-When there is a sudden break down of the cables or fiber optics. It

will be seen immediately and call out the contractor to be fixed

after fixing, the employee calls out to the operator in charge to be

check if correctly done.

• Equipment Installations

- The installation of the broadband network will be done. And the

configuration of the network of the client such as the network ip’s,

the phone number of the client.

5. Structural Steel Fabricator/Erector - manufactures, assemble, modify and

repair steel structures of all types such as steel-framed buildings and bridges.

They cut; shape, join and finish steel using detailed specifications to fabricate

the members, parts and sub-assemblies of the structure. Erectors work in the

construction and engineering sectors, installing and fixing the prefabricated

steel girders, pipework and sections, which make up the framework of a

building or structure.

C. Historical Background of the Firm

M.D. TAMBUNGUI Specialist Inc inherited its experiences and technical

know-how from an affiliate company, Alma Erectors and Contractors Company. It

was organized in the late summer of 1985 wherein Mr. Manolo D. Tambungui acts as

Vice President for Operations. The company was comprised by well-trained

aggressive personnel, working with a reputable international company in line with

7
overseas projects. The group then, as working with SCIOMM INTERNATIONAL

COMPANY which engaged in the system installation of HF, VHF, microwave

equipment including generators power distributions, telecommunication, tower

erection and antenna installation.

Upon completion of the last project, the group decided to formally register the

business in Manila. Again, by sheer luck, the company opened its first project overseas

in Libya with the ELECTRONIC GENERAL COMPANY located at P.O. Box 12888

Al-Dhamani Tripoli, Socialist People Libyan Arab Jamahiriya (SPLAJ) for a full

maintenance contract of electronic equipments, generators, antenna and tower

erections.

In the second quarter of 1992, M.D. TAMBUNGUI SERVICES AND

COMPANY was established independently by Mr. Manolo D. Tambungui.

Concentrating in the local market with the advent of high technology it gained in

overseas projects. From then on, the company obtained vast projects ranging from

steel structures, civil works, electro-mechanical jobs, tower fabrications, erections and

general construction works.

Indeed, M.D TAMBUNGUI SERVICES AND COMPANY’s metamorphosis

was not easy. However, it maintained its credibility, several PLDT X5

telecommunication tower erection, antenna installation and side struct stability have

been awarded by ELECTRONIC TELEPHONE SYSTEM INDUSTRIES,

INCORPORATED (ETSI), PLDT’s main contractor and consultant to MDTS.

Through excellent workmanship and technical know-how. PLDT also awarded

contracts in addition to the X5 projects, regarding the expansion of its cellular cell

8
sites. Tower design and analysis, tower fabrication and erection, antenna and

waveguide/coaxial cable installations up to testing and commissioning.

The company’s achievements earned through sheer determination,

perseverance and trust, visualize and resolved to carve a name in tower accessories,

fabrication, erection, installations, electronic services and general constructions.

MDTS AND COMPANY, with its total commitment to the people it serves, is

determined to contribute in raising the quality of life for all people, and do its part in

ensuring that progress will continue in this world community.

Our progress and performance in the past 24 years proved our capacity in

positioning ourselves in the telecommunication industry. To maintain such mobility, it

is necessary for us to consistently enhance our competitiveness by expanding our

services.

Our company MDTS & Co., considered to be one of the active PLDT

contractors, is not an easy talk. Almost a decade since its establishment, MDTS & Co.

has shown its capability, flexibility, innovation, and competitiveness in many ways to

PLDT and other various telecom players. As our company, has broaden up its

horizons, it was year 1997 when OSP Accreditation at PLDT have transcended to be a

budding corporation – as M.D. Tambungui Specialists (MDTS) Inc. Since then,

numerous outside plant projects were accomplished with satisfaction to different

telecoms. On July of 2008, engagement to Globe Telecoms, OSP Maintenance started.

We are committed in maintaining its facilities working twenty-four – seven. With our

9
dedication and hard work various appreciations including The Most Outstanding OSP

for the year 2010 was achieved.

These aforementioned accomplishments distinguish their goals and approach to

business partners and clients. It is their strong belief that servicing our customers is the

solid foundation in creating business opportunities. And based on these principles, we

are determined to provide their customers professional knowledge and various support.

By enhancing and leveraging these capabilities, they are committed to meet the

expectations of our clients in the local market.

D. Mission and Vision

VISION

To become a leading force in the country’s telecommunications contracting

industry by ensuring that we always deliver in compliance with the highest standards

of quality.

MISSION

To continue providing excellent services that showcase the top of the line

manpower and equipment by providing our customers professional knowledge and

various support to meet the expectations of our clients in the country.

10
E. Functions of the Different Divisions/Departments/Sections

This section discussed the different functions of every departments and sections

on Ace Promotion and Marketing Corporation.

1. Accounting Department

The company’s accounting department of the company is responsible on

providing services, recording and reporting/managing cash flows and liquidity issues

and financial support within the company. It coordinates with the company’s logistics

department in terms of material expense and other company transactions that involves

money.

2. Engineering Department

The company’s Engineering Department is responsible for planning, analyzing

and implementing system extension projects; planning and designing of major facility

replacements; capital improvement projects; continuing improvements; and technical

assistance to other divisions especially with the Internet Service Provider (ISP) and

Remote Operations Center (ROC) Division.

3. Human Resource

The company’s HR department is responsible for posting job vacancies,

conducting preliminary interviews to the aspiring employee and coordinating pre-

employment processes, such as drug testing, background investigations and reference

checks. The department is also responsible in processing employee complaints,

investigate and resolve those issues when issues arise or when there are supervisor-

employee or employee-employee conflicts.

11
4. Logistics Department

A Telecommunications Contractor company is always in need of a Logistics

division, which will cover the complete process involving planning, managing and

controlling the flow of materials and services, information, real-time data and human

resources from the point of origin to the point of destination. The logistics department

of MD Tambungui is responsible for processing several aspects such as handling and

distributing materials, tracking and delivery of those materials transportation,

inventories and Ensuring all the requirements of the clients and business partners are

met on time in an efficient and safe manner.

5. Open Settlement Protocol

This is the main department of MD Tambungui Specialists where employees

coordinate with Globe, PLDT, and Smart regarding Job orders from clients an

example of job order is where field workers install and repair internet to the clients.

Job orders is sent to the division dispatcher every day, the division dispatcher

distributes the job orders to field workers, each job order given that day must be

accomplished within that day as well. Office hubs on different provinces reports to the

main office every month.

12
This figure shows the Organizational Chart of the MD Tambungui Specialist Inc.

it shows who’s behind the creation of the said company. It was started with a family of

tambungui whose president is Manolo D. tambungui. Vice President as Carmensita T.

Tambungui. and OSP Division Head/ Project Manager as Carlos C. Tambungui

Figure 2 Company Organization Chart

13
F. Personnel

Ms. Grace T. Tambungui – Herrera

Administration/Logistics/Human Resource Head

She is responsible on handing and monitoring all the materials needed and

used by the company. She is also responsible handling and distributing materials,

tracking and delivery of those materials transportation, inventories. As the Human

Resource Head, she is responsible in conducting preliminary interview to who are

aspiring to work at the company and processing employee complaints.

Mr. Carlos C. Tambungui

Open Settlement Protocol (OSP) Head/Project Manager

He is responsible that every project is completed on time and within

budget that the project's objectives are met and that everyone else is doing their

job properly. Projects are usually separate to usual day-to-day business activities

and require a group of people to work together to achieve a set of specific

objectives. Also, he checks every project to ensure the desired result is achieved,

the most efficient resources are used, and the different interests involved are

satisfied

14
Ms. Rosalie Juatchon

Accounting Head

She holds the company’s budget and is responsible in managing every

expense. She is responsible on leading the company accountants on recording and

reporting/managing cash flows and liquidity issues and financial support within

the company

Engr. Rogelio S. Gosiaco

Chief Engineer

He is responsible on handing out projects to the company’s engineer such

as plans and designs. He is also responsible on checking those projects whether it

needs improvements showed the list of activities done by the trainee during the

on-the-job training. It also showed the accomplishments and skills being

enhanced during the internship that gave them the best training ground as

beginners. In doing a task, I must exert my full effort to do what the task requires.

The following were the tasks that I the student performed during his 300-hour On-

The-Job training.

III. PROGRAM OF ACTIVITES

This showed the list of activities done by the trainee during the on-the-job

training. It also showed the accomplishments and skills being enhanced during the

15
internship that gave him the best training ground as beginners. In doing a task, he must

exert our full effort in order to do what the task requires. The following were the tasks

that he had performed during our 300-hour On-The-Job training.

A. Summary of OJT Activities

This section showed the activities conducted by the trainee at MD.

Tambungui Specialists Inc.

Internet Installation/Configuration

The trainee were assigned for several weeks in the field where he needs to

install fiber optic cables to the premises and configure the network of the

company’s high-profile clients.

Internet Repair/Maintenance

The trainee is also expected and was task on troubleshooting/ resolving

troubles reported by these clients.

Installation of Operating Systems and other Software

The trainee installed operating systems to laptops used for configuring

networks on the field and office.

Documentation of Weekly and Monthly Reports

The trainee was supervised by the coordinators on preparing and making

monthly reports of every job order within the rest of the month.

16
B. Other Functions Accomplished

During his on-the-job training in MD. Tambungui Specialists Inc., he

attended meetings with Globe. Sometimes the trainee was tasked to do

administration work, i.e., assisting the staff in noting the needs and objectives of

the clients. The trainee assisted the staff in ensuring that the demands of the

clients are met satisfactorily and on time.

Meeting on Material Reports and Distribution

Every month, the company meets with their business partners regarding

materials distribution. The trainee accompanied the logistics staffs every month in

meeting with Globe. The student-trainee was tasked to assist the logistics staff in

identifying the materials and resources needed for the specific project. The

student-trainee also had to assist the staff in the inventory of materials and in

ensuring the efficiency of the distribution. The student-trainee also gave feedback

and assisted the staff in drafting reports and gave some input in monthly forecasts.

IV. SIGNIFICANCE OF THE TRAINING

During the On-the-job training in MD Tambungui Specialists Inc., the student-

trainee applied some knowledge that he learned in class to perform his tasks. In return,

the student gained valuable practical knowledge and skills during training.

17
A. Classroom Learning Used in the Training

Throughout the training, the trainee applied operational, general,

analytical and intellectual knowledge that they acquired during the four years of

studying in the University. Some of the lessons and teachings learned from the

classroom help the trainee to provide and share ideas for the benefit of the

Company. These learnings utilized by the trainee tend to lessen the difficulties of

tasks assigned to them although some were not similar to the problems they

encountered in school. The following are some of the classroom lessons used by

the trainee in the field practice:

• Reinstalling of Operating System

• Basic troubleshooting of computer equipment

• Troubleshooting LAN connections

• Configuration of network devices

B. Knowledge Gained and Skills Developed

Adjustment period is crucial especially in working with new colleagues

on a new environment which is different from the classroom set up. The training

in M.D. Tambungui Specialist Inc. makes the trainee independent and

responsible on finishing the tasks given to them everyday, it gives the trainee a

glimpse of what lies ahead after graduating. The trainee was able to manage their

jobs in a minimum allotted time only. The trainee was assigned on different

sections of the company every week which makes it more challenging for them

to accomplish the tasks given. Throughout the training, the trainee has acquired

more knowledge with regards to the basics of networking such as, but not limited

18
to, the transmission of signal from the telephone company to the entrance facility

of the office. They experienced installing and repairing internet connections and

operating systems on different places. They became more knowledgeable in

repairing internet connections and troubleshooting LAN connections.

With the tasks assigned to him, the trainee was able to develop their skills

and learn the physical aspects of their work. Their skills in preparing the floor

plans were also challenged.

After the three hundred hours of training, the trainee is now more capable

of doing related works in line with their chosen specialty.

V. PROBLEMS ENCOUNTERED

When the trainee finished the training in M.D. Tambungui Specialist Inc., he

gained some knowledge and developed skills in solving problems. The trainee also

encountered problems, namely:

A. Issues and Concerns about the Company

Due to lack of proper orientation, the trainee was clueless about the work

process within the company, its departments and its functions and operations. To

overcome these problems, he asked some employees on the procedures of the

company, who shared valuable knowledge on how the company operates.

19
B. Conceptual Problems

The trainee was not familiar with some of the company’s network

equipment and the office’s current network which becomes a big challenge for

them. To overcome these problems, the trainee searched the equipment’s purpose

on the internet and manually studied the office’s current network for weeks to be

able to analyze it.

C. Behavioral/Interpersonal Problems

During the first days of the training, the trainee was not confident to

socialize with the company’s supervisors, department heads and employees. The

trainee was discouraged to approach the supervisors who have always been so

busy managing the day to day operations. To overcome these problems, despite

the hesitations, the trainee was able to cope up after a week since the employees

were approachable and friendly.

D. Technical Problems

On the technical aspect, the trainee had a problem with the computer unit

he was using on some of their projects. There were times that some applications

needed installation but the training of the trainee is not sufficient enough to fix

the unit. More so, there was only one computer unit available for all the trainees

of the company.

20
VI. CONCLUSION

Experience is one of the best methods in acquiring new knowledge and

strengthening what has been already imbued within. It is the key to a more

improved learning. The trainee gained a lot of beneficial things therefrom

which would definitely equip him to succeed in the field of Information

Technology. The field practice conducted at M.D. Tambungui Specialists

(MDTS) Inc. proved to be a great experience for the trainee as it can be used

by the trainee in the future. This training served as an instrument for the

trainee to gain more knowledge by applying the theoretical methods he

learned and putting it into actual use. These methods include installation and

repair of networks, ordering network equipment and using it during

deployments.

Throughout the training, they realized the difference between theoretical

learning in school and practical learning in the real world. Equipped with the

values and experiences gained by the trainee, the objectives of the On-the-job

Training Program of the Department has definitely been realized.

VII. RECOMMENDATIONS

After the training in MD. Tambungui Specialists Inc., the trainee

recommends the following:

• For the BSIT OJT Program and for the BSIT Curriculum

The trainee recommends that the University’s Information Technology

Curriculum should help and assist the students on their search for companies

21
that will fit in to their capabilities, considering also the fact that looking for a

company without a target is time consuming. The trainee also recommends

that the University should conduct more seminars and trainings for the

students so that they can enhance their skills and learn more in their chosen

career. For the University’s Bachelor of Science in Information Technology

curriculum, the student would like to recommend that the Department would

consider the idea of upgrading the curriculum and let the BSIT student to

choose their field of expertise during their early years because one semester is

not enough for students to enhance the skills of a student. It would benefit

both the university and the students; the students can master and be more

knowledgeable on their major and the university would produce some more

skillful and competent information technology experts.

• For the Company’s Conduct of OJT

The trainee recommend that the company should provide a nice working

place for the trainee and must provide tasks/activities that is relevant to the

trainee’s course and field of specialization. The company must be responsible

for overseeing the progress of the trainee. The company must support the

project of the trainee that would help the company. The supervisor should

guide the trainee in doing their work and oversee the process of the trainee’s

special project and teach the trainee new knowledge that could be used in the

future.

• For the other Students who will enroll for OJT

22
The trainee would like to recommend the next batch of trainee to search

for a suitable company that would be appropriate for their chosen field of

expertise so that they can develop and harness their skills more. The trainee

should find their targeted companies as early as possible so that they will not

be late in accomplishing the whole three hundred hours of training. The

trainee must cooperate to Also during the training, the trainee must start

working on their narrative reports and special projects to avoid rushing their

manuscripts at the end of the training.

23
SPECIALPROJECT: PFSENSE FIREWALL OPERATING SYSTEM FOR MDTS

JOHN ROLAND M. CAPULE

Disclaimer:

“This project is submitted to the Department of Information

Technology, College of Engineering in partial fulfillment of the

requirements for the degree Bachelor of Science in Information

Technology at the Central Luzon State University, Science City of

Muñoz, Nueva Ecija. It is the product of our own work except

where indicated in the text. The project report or any portion

thereof including the blueprint design, or any section may be freely

copied and distributed provided that the source is acknowledged.”

24
I. INTRODUCTION

Operating system is the most important program that runs on a computer. Every

general-purpose computer must have an operating system to run other programs and

applications. Computer operating systems perform basic tasks, such as recognizing input

from the keyboard, sending output to the display screen, keeping track of files and

directories on the storage drives, and controlling peripheral devices such as printers. For

large systems, the operating system has even greater responsibilities and powers. It is like

a traffic cop – it makes sure that different program and users running at the same time do

not interfere with each other. The operating system is also responsible for security,

ensuring that unauthorized users do not access the system.

M.D. Tambungui Specialists (MDTS) Inc. is a telecommunications Contractor

Company located at La Loma, Quezon City. It is one of the country’s primary contractors

in the Telecommunication Industry. It started as a small business named “Alma erectors

and Contractors Company” which was founded by old friends in the late summer of

1985. In 1992, “M.D. Tambungui Services and Company” was established when one of

the associates decided to run a business independently. Concentrating in the local market

in the advent of high technology revolution, it gained, named and able to operate business

overseas. From then on, the company obtained vast projects ranging from electro-

mechanical jobs, tower fabrications, erections and general construction works.

In the current situation, MDTS is using an interconnected network that gives them

a high risk of being hack or being infected by a virus. The files are being shared in all the

employees’ personal computer which limits confidentiality of the company’s business

plans and transactions.

25
As the trainee observed the problem, he come up in proposing an idea of

providing a firewall operating system that can help the company to secure files and data

as well as to protect the network from hackers and viruses.

II. PROBLEM DOMAIN

A. STATEMENT OF THE PROBLEM

The MDTS company current network has no firewall. A firewall that can

protect them from any unwanted circumstances that can brought bigger problem

in the future. Their Optix OSN is connected in their router using CAT5 cable. The

router is also connected to a CISCO Ethernet switch using a CAT5 cable and

there is another CISCO Ethernet switch which is not in use. The company shares

the same network.

The MDTS needs to protect their trade secrets from hackers who could

steal the company’s data with respect to the layout/design, price/costing of

services, and supplier contacts. MDTS vulnerable to hackers who want to access

MDTS’ industrial, business, financial and personal information. Worse, some

hackers can send malicious viruses and worms, which MDTS may unexpectedly

share to its valuable clients, destroying the company’s reputation.

Hence, MDTS needs a firewall that works as a barrier, or a shield,

between the company’s computer network and the internet.

26
B. OBJECTIVES

General Objective

To provide a PfSense firewall operating system to protect important data

and files of MD Tambungui Specialists’(MDTS) Inc. that will provide security

and support for their future expansion of the business.

Specific Objective

• To identify the current design of the computer network of the company

• To identify the number of departments of the company that will use

VLAN’s

• To determine the number of users of each department to access WLAN

• To provide the PfSense firewall operating system

• To create a restriction for each department by protecting the company’s

networking system

C. SCOPE AND SIGNIFICANCE

The PfSense Firewall Operating System is installed at MD Tambungui

Specialists Inc. in La Loma, Quezon City. The firewall operating system allows the

user to control the network, look up who is connected, block upcoming connection,

block sites and download sites. This, however, would not affect their computer from

being infected by another sites or downloads.

PfSense Operating System is anticipated to provide protection of files and

data of the company. The company will establish security in terms of their business’s

27
information and transactions. It will improve client’s trust in terms of their

confidential information.

A VLAN, a feature of PfSense Firewall that can divide each department and

provide a restriction for all the computers that is connected. A VLAN is a single LAN

that spans geographically dispersed locations, essentially making multiple LANs look

like a single LAN. The benefits of a VLAN include the ability to share information

and resources across the locations as if they were all under one roof. As a result of

this, businesses can operate more efficiently with improved productivity.

For the trainee, the project can fulfill the requirements needed for them to earn

BSIT degree. Apart from fulfilling the requirement, he will have a better

understanding about the benefits of PfSense Firewall Operating System. The study

can be useful reference for students will engaged on research related to the topic. The

main benefits of this project are to protect and create restrictions.

III. REVIEW OF EXISTING ALTERNATIVES

As stated by Jack-Benny P. (2016), PfSense is better than many of the

enterprise class firewall and it is absolutely free. It’s easy to manage, easy to update

to a newer version, and best of all it’s easy to extend. For example, you can extend it

with IDS/IPS(Snort), reverse proxies, various tunnel services, network landing sites

etc.

In the case of MD Tambungui Specialists, there is no major existed yet. They

are doing they work well but since they’re expanding they needed a a firewall. This

28
project lessens their budget for protecting their confidential files sinces this software

is a free to use.

Based on Sam Keer (2016), PfSense is customized distribution of FreeBSD

that can turn an old computer into a full featured router and firewall. It is very flexible

and can easily be adapted to numerous applications ranging from a home router to a

firewall for a large corporate network. PfSense is easy to install and maintain offering

a very useful web based user interface. PfSense includes many features that are often

only found in expensive commercial routers.

In this case, a PfSense Firewall Operating System can be created by using

parts that can withstand the use of the firewall. They can create from the existing or

build a new computer to install the System. PfSense is just downloadable and easily

to install.

Based on David Ziantara, pfSense has the same reliability and stability as

even the most popular commercial firewall offerings on the market – but, like the

very best open-source software, it doesn't limit you. You're in control – you can

exploit and customize pfSense around your security needs.

Stated by Matt Williamson, PfSense is an open source operating system used

to turn a computer into a firewall, router, or a variety of other application-specific

network appliances. PfSense is a customized FreeBSD distribution based on the

m0n0wall project, a powerful but light-weight firewall distribution. PfSense builds

upon monowall's foundation and takes its functionality several steps further by adding

a variety of other popular networking services.

29
At the state of MD Tambungui Specialists, the trainee can easily create or

install the PfSense Firewall Operating System. The trainee created a firewall that can

protect them. A Pfsense that is easily install with their recommended requirements.

Written by pfSense co-founder Chris Buechler and pfSense consultant Jim

Pingle, this Definitive Guide to pfSense covers installation and basic configuration

through advanced networking and firewalling with the popular open source firewall

and router distribution. This book is designed to be a friendly step-by-step guide to

common networking and security tasks, plus a thorough reference of pfSense's

capabilities. The book covers hardware and system planning, installation and

upgrades, backups, firewalling fundamentals, port forwarding and Network Address

Translation, bridging, Virtual LANs (VLAN), Multi-WAN, Virtual Private Networks

(VPN) using IPsec, PPTP, and OpenVPN, traffic shaping, load balancing, wireless

networking and captive portal setups, redundant firewalls and High Availability,

system monitoring, logging, traffic analysis, sniffing, packet capturing,

troubleshooting, and software package and third-party software installations and

upgrades.

Written by pfSense co-founder Chris Buechler and pfSense consultant Jim

Pingle, this Definitive Guide to pfSense covers installation and basic configuration

through advanced networking and firewalling with the popular open source firewall

and router distribution. This book is designed to be a friendly step-by-step guide to

common networking and security tasks, plus a thorough reference of pfSense's

capabilities. The book covers hardware and system planning, installation and

upgrades, backups, firewalling fundamentals, port forwarding and Network Address

30
Translation, bridging, Virtual LANs (VLAN), Multi-WAN, Virtual Private Networks

(VPN) using IPsec, PPTP, and OpenVPN, traffic shaping, load balancing, wireless

networking and captive portal setups, redundant firewalls and High Availability,

system monitoring, logging, traffic analysis, sniffing, packet capturing,

troubleshooting, and software package and third-party software installations and

upgrades.

A create VLANs to the PfSense Firewall Operating System for the separation

of computer system, bridging the network when connecting to the PfSense Firewall,

Written by Krupa C. Patel (2017), Defense efforts must be unified to provide

comprehensive protection against frequently changing network and cyber threats.

UTM generally refers to a security appliance that consolidates a wide range of

essential network security functions into a single device. UTM brings the following

network security technologies in to a single platform: Firewall, Anti-spam, Anti-

virus, URL filtering, Virtual Private Network (VPN)

As on PfSense, it can block system downloading and accessing of files for the

protection. It was created in the squidguard proxy filter that can access all blocked

data to the connected user.

Findings drawn from the studies cited disclosed the significance in

accessibility, economic cost and system benefits of PfSense Firewall Operating

System

IV. METHODOLOGY

The “PfSense Firewall Operating System” project for the M.D. Tambungui

follows the Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO)

31
methodology as a phase approach to solving network problems. There are six steps

included in the PPDIOO lifecycle. Each phase defines the activities required to

successfully deploy and operate CISCO technologies. It also details how to optimize

performance throughout the lifecycle of a network. Figure below shows the methods.

This is the step by step method on creating the PfSense Firewall Operating

System. These steps must be in order. Prepare, Plan, Design, Implement, Operate, and

Optimize. Every step is needed to create the specific project. The figure below shows

the steps

Figure 3 PPDIOO Life Cycle Diagram

32
A. Prepare

The primary purpose of this phase to justify the network upgrade. This

phase will involve speaking with high level managers to figure out what business

goals the company has and what products could be used to provide that

functionality to the business.

Below is the list of questions that were answered during the data gathering:

• What is the current design of the computer network of the company?

• How many VLANs of the departments that will be use?

• How many users will access WLAN on each department?

• What is the current firewall security that you have?

After gathering the data and information for the project, the trainee created

a summary of task on a single document, to create a vlan for different people who

will use the wlan, and to split the speed of data for different users

B. Plan

Like the Prepare phase, the way in which the Plan phase is used depends

on the current state of the company’s network. The trainee prepared the PfSense

installer and checked the minimum hardware requirement of computer system

then installed the PfSense Firewall Operating System. Afterwards, configuration

of the system is done. Lastly, checking the system configuration is necessary to

determine if it is working properly.

33
C. Design

This phase includes the proposal in installing the PfSense Firewall

Operating System in the main server. This system requires configuration and

checking in different units for every department. PfSense Firewall Operating

System will be automatically performed its task as soon as the physical computer

starts.

D. Implement

As soon as the new building is established, required equipment will be

installed and configured. Every detail of the network that is based in the design

phase will be done in the implement phase. New devices will be replaced or

augmented by existing infrastructure. The project plan is followed during this

phase. Each step in the implementation should include a description, detailed

implementation guidelines, estimated time to implement, rollback steps in case of

a failure, and any additional reference information. As changes are implemented

they are also tested before moving to the operate phase.

E. Operate

On this phase, the firewall network has been deployed and is being

utilized by the end users. Appropriate support personnel are also monitoring and

maintaining the network. A company proactively monitors the health and vital

signs of the network to improve service quality, reduce disruptions, mitigate

outages, and maintain high availability, reliability, and security. By providing an

34
efficient framework and operational tools to respond to problems, a company can

avoid costly downtime and business interruption.

F. Optimize

In this phase the network is proactively monitored & changed to improve

performance or resolve issues. These changes can be minor or major depending

on the amount and type of issues that occur. If the changes are big enough this life

cycle could begin again back at the prepare phase.

V. RESULT AND DISCUSSION

A. Prepare

Gathering important data was made in this phase to verify and facilitate

the most efficient and effective way creating a computer hardware to be used on a

firewall operating system. The trainee asked for a network map because their

connection must be always working or up network. Having a down network may

cause them a problem for the whole company that accompanied them. Basing on

their current network topology. The trainee used it to specify how many VLANs

are going to be used for their network. And the data transfer for each employee.

By creating a network strategy. It can lessen the time and cost of maintenance on

inserting the new firewall network.

The results of data gathering were accumulated through interview and

existing documents. Below are the results and answers of these procedure:

35
• What is the current design of the computer network of the company?

Figure 4.0, Since the company, MD Tambungui Specialists Inc.,

don’t have a good firewall. I ask the existing network of their company

and the new for the installation of their new firewall operating system. As

you can see on their existing network. They don’t have a firewall network

that protects them from harm, so I proposed the project firewall. The

trainee observed the connections of equipment on the rack. They noticed

that the Optix OSN is connected in the router using a Cat5 cable. The

router is also connected to a Cisco Ethernet switch using a Cat5 cable.

And, there is another Cisco Ethernet switch that is not in use. The switch

that is linked on the router, there are two (2) modem connected. At the

same time, two (2) computer units are connected to the switch – one is

used for Closed Circuit Television and the other one is used for printing. A

question came across in the minds of the trainee as to what Optix OSN for.

The trainee thought that modem is an Internet Service Provider (ISP). To

better understand the role of Optix OSN in the network, the trainee

browsed the internet and read articles related to it. According to an online

article, “Optix OSN is Huawei’s new generation optical transmission

equipment” and is used mostly by private companies. Since the trainee

needed more information about this device, they interviewed Robin

Santeno, one of the authorized technicians of Globe Telecom. He is from

the Giga Ethernet Passive Optical Network (GEPON) team. Jenny Bi

Samson, one of the DSL technicians and the authorized routing personnel

36
of MDTS Inc. had also been interviewed about the queries of the trainee.

Mr. Santeno and Mr. Samson explained the role of Optix OSN. You can

see in the image below.

This is the current network of the MD Tambungui Specialists Inc. it also includes

all the hardware and the structural design of the company. See figure below

Figure 4 MD Tambungui Specialists INC Current Network

37
• How many VLANs of the departments that will be use?

There are many department on the company. There are;

o Internet Service Provider(ISP)

o OSP Division

o Logistics Department

o Human Resource

o Engineering Department

o Accounting Department

o President’s Office

There will be a 7 VLANs that going to be created on the MDTS

Company.

• How many users will access WLAN on each department?

After getting all the vlan network. The trainee asked about how

many users will be there on each department on an estimate value.

o Internet Service Provider(ISP) –> 50

o OSP Division –> 50

o Logistics Department –> 10

o Human Resource –> 10

o Engineering Department –> 20

o Accounting Department –> 10

o President’s Office –> 1

38
• What is the current firewall security that you have?

The company doesn’t have a firewall security for now. They are

only interconnected to each other. They share files for each of the

department to transact business and transfer data.

The trainee asks for the plan of current building of the company for that

the project of the trainee propose will be used by it. There are 7 VLANs that’s

going to be created. Table shows the IP Addresses that has been created

Table 1 VLAN ID

VLAN
ID LABEL IP ADDRESS
10 President's Office 192.168.10.1/24
20 Accounting Department 192.168.20.1/24
30 Engineering Department 192.168.30.1/24
40 Human Resources 192.168.40.1/24
50 Logistics Department 192.168.50.1/24
60 OSP Division 192.168.60.1/24
70 Internet Service Provider 192.168.70.1/24
Benefits of the Proposed PfSense Firewall Operating System

Tangible Benefits

• They will be protected from hackers

• Risks of getting infected by malware or worm will be minimized

• Network traffic will be observed

Intangible Benefits

• They are going to be secured 24/7 at all times.

• Internet communications are observed throughout the time

39
• The network helps all the staffs in the office to be more productive

Technical Feasibility

The present hardware in the current network evaluated has no constrains

that can affect the PfSense Firewall Operating System. The Installer of the system

was easily downloaded for free in the official PfSense website. The operating

system supports all the connected computer units easily.

Table 2 Requirements

Minimum
Requirements Current
CPU 1GHz CPU Intel Core Pentium
RAM 512 MB RAM 2GB Ram
NIC 50Mbps 10/100 Mbps NIC
HARD 250gb ide hard
Drive 50gb hard drive Drive

MD Tambungui Specialist are technically feasible to run the PfSense

Firewall Operating System. They run an Intel Pentium Processor, a 2 GB ram, a

Network Interface Card and a 250GB hard drive where the PfSense Firewall

Operating System will be installed. Those minimum requirements were met so

much so that their hardware is feasible to run the Operating System.

Operational Feasibility

The project will be implemented in the new and current building of MD

Tambungui Specialists Inc. the employees/staffs of the institution will be moving

to the new building once the proposed firewall operating system has been

implemented and successfully working. This project will help the institution’s

40
employee in managing and protecting to their new office. With this firewall, the

staff will lessen their risk on being infected or being hack by other devices.

Table 3 User Profile

User Profile
Name: Engr. Rogelio S. Gosiaco
Position: Chief Engineer
Engr. Rogelio S. Gosiaco are going to manage the PfSense Firewall

Operating System. He will be the one to tell which will be going to be added and

optimize on the PfSense Firewall Operating System. He will ask the trusted

employee to maintain the Firewall every week, so they can see the downtime or if

there are some error to be fixed.

Economic Feasibility

Assuming that the MD Tambungui Specialists Inc would allot a large

amount of fund for the implementation of this firewall operating system. The

long-term benefits of this project would compensate for the expenses and still

economically efficient in the long run.

In terms of costing, PfSense Firewall is a FreeBSD software that can be

used for business. The only cost they will have is the labor for the employee who

will manage and maintain the software

41
Cost and Benefit Analysis

This is the procedure of constructing the financial facts about the system

when accompanying a preliminary investigation. When new Operating system are

proposed, the cost is a major consideration which impacts on the decision to

accept or reject the proposed Operating System. This analysis would allow the

company to know the benefits that operating system implementation. The cost

indicated below are only estimated based on the current price.

Table 4 Cost and Benefit

Table 4 shows the estimated cost of installing a PfSense firewall operating

system. As you see the PfSense Firewall is a free software that anyone can use but

not easy to install that’s why there’s an expertise.

Estimated Price in Ph
PfSense OS FREE
Installation expertise for
OS one time 1000
Maintenance & Labor in year 18000
Total 19000

B. Plan

The plan phase is where the firewall installation is created and on how the

operating system will work on company’s goals, facilities, and user needs. This

implementation will be done after the company has done constructing their new

proposed building of MDTS. The trainee first asks the server room for the

installation of the PfSense Firewall Operating System. This is where the firewall

42
operating will be connected and must have a sustainable internet connection for it

to be installed properly. After finding the server room. The trainee check for all

the requirements that is needed for the firewall operating system. The minimum

requirements of the PfSense Firewall Operating System will be:

This table shows the minimum requirements to be used for PfSense

Firewall Operating System.

Table 5 Requirements of PfSense Firewall Operating System

Minimum Recommended
Requirements Requirements
CPU 500 MHz 1 GHz
RAM 256 MB 1 GB

The trainee advise that the company create a new cpu for the installation

of pfsense firewall since they are moving on the new building when it has been

built. For this, the company will be sure that it is fully functional or working. The

trainee shows the needed material for the creation of new CPU as shown on Table

below

Table 6 & 7 are the equipment for the cpu to be used for the installation of

firewall and set-up. This equipment was based on a user who already use it. This

is the best for a company that is starting to expand for the best performance of the

firewall. The firewall will be open 24/7 for that the company will always be

protected from the harm who wants to get in and steal their data

43
Table 6 CPU Materials

Intel - Core i5-4460 3.2GHz Quad-Core Processor

Cooler Master - Hyper 212 EVO 82.9 CFM Sleeve


Bearing CPU Cooler

Gigabyte - GA-B85M-DS3H-A Micro ATX


LGA1150 Motherboard

Crucial - Ballistix Sport 16GB (2 x 8GB) DDR3-


1600 Memory

SanDisk - SSD PLUS 120GB 2.5" Solid State


Drive

StarTech - ST1000SPEXD3 PCI-Express x1


10/100/1000 Mbps Network Adapter

44
Table 7 CPU

QTY UNIT DESCRIPTION UNIT COST TOTAL COST


Intel - Core i5-4460
1 PCS 3.2GHz Quad-Core 9308.53 9308.50
Processor
Cooler Master - Hyper
212 EVO 82.9 CFM
1 PCS 1685.11 1685.11
Sleeve Bearing CPU
Cooler
Gigabyte - GA-B85M-
1 PCS DS3H-A Micro ATX 4894.61 4894.61
LGA1150 Motherboard
Crucial - Ballistix Sport
2 PCS 16GB (2 x 8GB) DDR3- 3498.85 6997.70
1600 Memory
SanDisk - SSD PLUS
1 PCS 120GB 2.5" Solid State 3870.02 3870.02
Drive
StarTech -
ST1000SPEXD3 PCI-
1 PCS 1726.27 1726.27
Express x1 10/100/1000
Mbps Network Adapter
TOTAL 28482.21

C. Design

Creating a design will make the deployment much easier and the cost of

time much faster rather than without a design. The firewall requirements and

goals of the company will be their total security. This will not be perfect because

it’s the first time to be implemented on their company.

The trainee creates their new network topology to be used for the

deployment of the firewall system. This process will make the installation much

easier to insert the firewall operating system. I’ve created a new design with the

45
use of Edraw app to show the connections of each floors and what hardware is

going to be installed in each floor.

The trainee asks about their current topology. See figure 5 below:

Figure 5 Company’s Current Network Topology

46
This figure shows the design for the network. Different IPs where

distributed on different department. Each IPs has a different restriction.

Restriction of which they don’t access like, Sites, Files, Share, Application,

Downloads.

Figure 6 Proposed Network design for the VLAN

47
This figure shows where the current VLAN is found. VLAN 10, President’s

Office, VLAN 20, Accounting Department, VLAN 30, Engineering Department, VLAN

40, Human Resources, VLAN 50, Logistics Department, VLAN 60, OSP Division,

VLAN 70, Internet Service Provider

Figure 7 Network Design of VLAN

48
The figure shows the logical diagram of the network. The firewall was added.

This is the proposed logical diagram. Each floor, there are router, switch, patch panel, pc,

printer, and a media converter. They are all protected by the firewall. Secured and safe

for usage. There’s a different vpn type for each floor that a security measure. There’s a

blockage for website, file downloads, file transfer and accessing files of another

computer.

Figure 8 Proposed Logical Topology

49
The figure below is the installed PfSense and running. Before installing the

PfSense Firewall Operating System, it must be connected to the internet, for it will not

work if it isn’t. When installing, press “I” first then follow the next step that you will see.

If it is connected properly. As you see on the image below. It will automatically be finish

with an ip address. As you can see there is an IP address of 192.168.126.128/24, this

address can be used to configure the operating system opening on a browser. It will be

shown on the next figure.

Figure 9 Installing Firewall PfSense

50
Figure below shows that the configuration is done. It was configured with a new

password so that only the required personnel can only configure or changed inside the

browser page. The DNS was set to 8.8.8.8 and 8.8.4.4 because it’s the default DNS

server. Other configuration was skipped.

Figure 10 Finished Configuring PfSense

51
This Figure shows the blocking of sites. First you need to download a

blacklist to the blacklist site on shallalist.de. then we choose what kind of sites that we’re

going to blocked. Http or https sites can be blocked by squidquard proxy filter. Using

Common ACL. There are many of sites to be blocked like, drugs, porn, social media,

video, that you don’t like to access. On groups ACL tab, it’s like common ACL but you

create a group of categories to be blocked much faster. On Target categories tab, you

create a specific site that will be blocked like downloading.

Figure 11 Blocking Sites

52
The image below was blocked. The pfsense will automatically detect all “.exe”

file and won’t be downloaded. Any “.exe” file will be blocked from downloads. Instant

blocking of any kind. Cannot access on any means. Only changing the specific blocking

will access the specific file.

Figure 12 Blocked Download

53
This image shows that the website is blocked and cannot be access at any time. A

pfsense features that blocked a kind of websites. An updated Pfsense OS was used that’s

why error was seen on the screenshot and it means that it blocked the kind of website. As

seen, gambling sites is being blocked.

Figure 13 Blocked Webiste

54
Image below shows the Blocking to Access an Specific Folder of the User and

Only allowed person can access it. All computer is connected to each other but cannot

access un-allowed files

Figure 14 Blocked Access to Specific File

55
Image above shows that it only restricts reading purposes. Writing and deleting

the file or copying the file is not allowed. You can only access it by reading. You can’t

also copy paste what’s inside the content that your going to read.

Figure 15 Blocked Access, only for reading purposes

56
The trainee created a VLAN connection for each oh the department for the

restriction/limitation. The VLAN is created in the PfSense. It is found on

Interfaces tab then VLANs to add a specific VLAN. Then after adding specific

VLAN. We activate the created VLAN on the interface assignment.

D. Implement, Operate, and Optimize

This last three phases of the PPDIOO methodology was not applied in this

special project. The idea of this project and the scenarios will be:

Implement – The firewall operating system will be established. It will be

used when the construction of their building is done. The

installation of the Pfsense Firewall Operating System will be

installed and the configuration of the networks will be done after.

Operate – This is the last test of the Pfsense Firewall Operating System. It

will be completely running on their newly constructed MDTS

building and a new Pfsense Firewall Operating System that can

protect them from any harm.

Optimize – It can be done any time since it is already installed. Citing

which part can be optimize will be easier to manage

VI. CONCLUSION

MD Tambungui Specialists Inc’s new Pfsense Firewall Operating System will

be more effective on their work. Usage of the Operating System will be more

effective which leads them to be able to access the blocked website or download any

57
file without the consent of who’s in charge with the PfSense Firewall Operating

System.

The Pfsense Firewall Operating System allows the user to control the network,

look up who is connected, blocked upcoming connection, block sites and download

sites. For this, it will protect their computer from being infected by another sites or

downloads.

After the Pfsense Firewall Operating System was proposed and done. The

trainee understand how the Firewall system was used and how it protects who’s

connected on the system.

VII. RECOMMENDATION

Since there are too many employees who will be using the internet and they

are interconnected to each other. The trainee recommends the system to be protected

from each other since they are connected to each other. This way, they will be kept

from harm when one of it was infected.

The trainee would also recommend updating and check each time so there

won’t be any faulty on their system. They must also indicate or document what they

added or remove for knowing if something goes wrong, they can revert what they do.

VIII. REFERENCES

Internet Source

**Firewall OS

https://www.clearcenter.com/blogs/reviews/review-5-open-source-alternatives-for-

routers-firewalls

58
https://www.untangle.com/untangle-ng-firewall/

**Equipment Canvassing

https://www.amazon.com/

https://www.outletpc.com/

https://www.newegg.com/

https://pcpartpicker.com/

Local Source

**Talplacido, Miguel Paulo A. & Torne, Billy Joe B.(2016), Central Luzon State

University. Special Project:Rehabilitation of Network in De Los Santos Medical

Center(Structured Cabling). Narrative Report, Information Systems Institute, College

of Engineering, Central Luzon State University, Science City of Munoz, Nueva Ecija

IX. APPENDICES

Summary of Activities Undertaken

September 6-9, 2017


September 6 • Company Rules Orientation
September 7 • Requirement Processing
September 8 • Finding the Company's network
September 9 • Field Works
o Network Installation
o Network Troubleshoot

September 11-14, 2017


September 11 • Company Rules Orientation
• Introduction to Department
September 12 • Finding the network structure of the

59
company
September 13 • Introduce the firewall system of the
company
September 14 • Field Works
o Internet Troubleshoots
o Operating the Internet Connection

September 18-21, 2017


• Starting the first phase of the
September 18 methodology
September 19 • Meeting of all crew members
September 20 • Installing the firewall system
September 21 • Field Works
o Network Troubleshoots

September 25-28, 2017


September 25 • Conducting feasibility study
September 26 • Research network devices and equipment
September 27 • Budgeting and canvassing
September 28 • Field works
o Installing a new internet
connection on the subscriber

October 2-5, 2017


October 2 • Starting plan phase
• Documenting the network structure
October 3 • Analyzing the project
October 4 • Field Works
o Network Troubleshoot
October 5 • Field Works
o Internet Installation

October 16-19, 2017


October 16 • Presenting Feasibility Study
October 17 • Starting Documenting of Special Project
October 18 • Field Works
o Internet Installation
October 19 • Field Works
o Internet Troubleshooting

60
October 23-26, 2017
October 23 • Fund Planning of the Project
October 24 • Start of Phase Design
October 25 • Field Works
o Network Installation
October 26 • Field Works
o Network Installation

October 30-31, November 1-2, 2017


October 30 • Field Works
o Splicing of Fiber Optic Cable
October 31 • Configuring the Network
November 1 • Assigning IP addresses of network
November 2 • Field Works
o Removing of unused copper cable

November 6-9, 2017


November 6 • Presenting the firewall network
November 7 • Field Works
o Network troubleshoot
November 8 • Sorting monthly report
November 9 • Fixing of firewall network

November 13-16, 2017


November 13 • Sorting weekly reports
November 14 • Presenting the Firewall OS Network
November 15 • Finishing the OS network
November 16 • Farewell

61
The trainee with the team and the accountant manager

62

You might also like