Professional Documents
Culture Documents
Topic: Firewall Implementation Using Cisco Packet Tracer: Network and Information Security
Topic: Firewall Implementation Using Cisco Packet Tracer: Network and Information Security
DEPARTMENT OF
INFORMATION
TECHNOLOGY
Microproject Report
Network and Information Security [NIS]
THAKUR POLYTECHNIC
(AN ISO 9001:2015 Certified Institute)
Thakur Complex, West to W.E Highway, Kandivali (E), Mumbai – 400 101.
(Accredited by: National Board of Accreditation)
1|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Certificate
This is to certify that: Anjali Chaurasiya (2105220096), Sanskruti Londhe
(2105220151)Ananya Parbat(2205220277) of Fifth Semester of Diploma in
Information Technology of Institute, Thakur Polytechnic (Code: 0522)
have completed the Micro Project satisfactorily in subject Management for
the academic year 2023-24 as prescribed in the curriculum.
2|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
ACKNOWLEDGEMENT
We consider ourselves lucky enough to get such a good project. This project
would add as an asset to my academic profile. We express our gratitude to
the help of the Head of the Department of Information technology, Mrs.
Suwarna Thakre, for her constant supervision, guidance and co-operation
throughout the project and we would like to express our thankfulness to our
project guide (subject teacher), MR.Sumit Parmar. for his constant
motivation and valuable help through the project work. We extend our
sincere gratitude to our parents who have encouraged us with their blessings
to do this project successfully.
THANK YOU
3|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
TYPES OF FIREWALL
1. Network-based firewall: This type of firewall is installed on a network gateway
and monitors incoming and outgoing traffic to block or allow specific types of
traffic based on predefined rules.
2. Host-based firewall: This type of firewall runs on individual devices, such as a
computer or server, and controls the traffic to and from that specific device.
3. Application-level firewall: This firewall monitors and controls network traffic
at the application level, allowing for more granular control over specific
applications or services.
4. Proxy firewall: A proxy firewall acts as an intermediary between the internal
network and external networks, filtering and blocking traffic based on specific
criteria.
5. Stateful firewall: This type of firewall keeps track of the state of active
connections and uses this information to make decisions about whether to allow
or block traffic.
6. Next-generation firewall: These firewalls combine traditional firewall
capabilities with advanced security features such as intrusion prevention,
application control, and deep packet inspection.
7. Packet-filtering firewall: A packet-filtering firewall examines packets of data as
they pass through the network and allows or blocks them based on predefined
rules.
8. Cloud firewall: This type of firewall is hosted in the cloud and provides
protection for cloud-based applications and data, often offering scalable and
flexible security measures
4|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Firewall implementation:
1.structure
5|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
6|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
7|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Applications:
Applications of Firewalls
8|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation
Conclusion:
In conclusion, firewalls are essential components of network security that
help to protect systems and data from a wide range of cyber threats. They
serve as a critical barrier between an organization's internal network and
external threats, controlling incoming and outgoing traffic based on
predefined security rules. By monitoring and filtering network traffic,
firewalls can prevent unauthorized access, mitigate the risk of malware
infections, and enforce security policies. It is important for organizations to
implement firewalls as part of a comprehensive cybersecurity strategy to
safeguard their networks and assets from potential security breaches.
9|Page
Department of Information Technology, IF6I