You are on page 1of 9

Network and information security (22620) Topic -Firewall implementation

DEPARTMENT OF
INFORMATION
TECHNOLOGY

Microproject Report
Network and Information Security [NIS]

Topic: Firewall Implementation using


cisco packet tracer
Academic Year: 2023-24

Program Code: IF6I


Course: Network and Information Security [NIS]
Course Code: 22620
Subject Teacher: Mr Sumit Parmar .
Group No: 7

ZAGDU SINGH CHARITABLE TRUST (REGD.)

THAKUR POLYTECHNIC
(AN ISO 9001:2015 Certified Institute)
Thakur Complex, West to W.E Highway, Kandivali (E), Mumbai – 400 101.
(Accredited by: National Board of Accreditation)

1|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

MAHARASHTRA STATE BOARD


OF TECHNICAL
EDUCATION

Certificate
This is to certify that: Anjali Chaurasiya (2105220096), Sanskruti Londhe
(2105220151)Ananya Parbat(2205220277) of Fifth Semester of Diploma in
Information Technology of Institute, Thakur Polytechnic (Code: 0522)
have completed the Micro Project satisfactorily in subject Management for
the academic year 2023-24 as prescribed in the curriculum.

Place: Mumbai Date:

Subject Teacher Head of the Department Principal

2|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

ACKNOWLEDGEMENT

This acknowledgment transcends the reality of formality when we would like


to express deep gratitude and respect to all those people behind the screen
who guided, inspired and helped me for the completion of our project work.

This project would add as an asset to my academic profile. We express our


sincere gratitude to our respectful Principal Dr. S.M. Ganechari for
enabling us to make use of laboratory and library facilities liberally, that
helped us a long way in carrying out our project work successfully.

We consider ourselves lucky enough to get such a good project. This project
would add as an asset to my academic profile. We express our gratitude to
the help of the Head of the Department of Information technology, Mrs.
Suwarna Thakre, for her constant supervision, guidance and co-operation
throughout the project and we would like to express our thankfulness to our
project guide (subject teacher), MR.Sumit Parmar. for his constant
motivation and valuable help through the project work. We extend our
sincere gratitude to our parents who have encouraged us with their blessings
to do this project successfully.

THANK YOU

3|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

TYPES OF FIREWALL
1. Network-based firewall: This type of firewall is installed on a network gateway
and monitors incoming and outgoing traffic to block or allow specific types of
traffic based on predefined rules.
2. Host-based firewall: This type of firewall runs on individual devices, such as a
computer or server, and controls the traffic to and from that specific device.
3. Application-level firewall: This firewall monitors and controls network traffic
at the application level, allowing for more granular control over specific
applications or services.
4. Proxy firewall: A proxy firewall acts as an intermediary between the internal
network and external networks, filtering and blocking traffic based on specific
criteria.
5. Stateful firewall: This type of firewall keeps track of the state of active
connections and uses this information to make decisions about whether to allow
or block traffic.
6. Next-generation firewall: These firewalls combine traditional firewall
capabilities with advanced security features such as intrusion prevention,
application control, and deep packet inspection.
7. Packet-filtering firewall: A packet-filtering firewall examines packets of data as
they pass through the network and allows or blocks them based on predefined
rules.
8. Cloud firewall: This type of firewall is hosted in the cloud and provides
protection for cloud-based applications and data, often offering scalable and
flexible security measures

4|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Firewall implementation:
1.structure

5|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

6|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

7|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Applications:
Applications of Firewalls

1. Application-Specific Access Control: For Java applications that require


internet access, firewalls can be configured to allow specific traffic. For
example, if an application needs to access a web service, a firewall rule
can be set to allow traffic only to that specific server and port,
enhancing security
2. Network Security: Firewalls are essential for protecting a network from
external threats. They monitor and control incoming and outgoing
network traffic based on predetermined security rules.
3. Control and monitor inbound and outbound network traffic, allowing
organizations to enforce security policies and restrict access to certain
websites or services.
4. Bandwidth management: Firewalls can be configured to optimize
network performance by prioritizing traffic and managing bandwidth
usage, ensuring that critical applications have sufficient resources.

8|Page
Department of Information Technology, IF6I
Network and information security (22620) Topic -Firewall implementation

Conclusion:
In conclusion, firewalls are essential components of network security that
help to protect systems and data from a wide range of cyber threats. They
serve as a critical barrier between an organization's internal network and
external threats, controlling incoming and outgoing traffic based on
predefined security rules. By monitoring and filtering network traffic,
firewalls can prevent unauthorized access, mitigate the risk of malware
infections, and enforce security policies. It is important for organizations to
implement firewalls as part of a comprehensive cybersecurity strategy to
safeguard their networks and assets from potential security breaches.

Name of Team Members with Roll No.

Anjali Chaurasiya (01)


Ananya Parbat(56)
Sanskruti Londhe (49)

9|Page
Department of Information Technology, IF6I

You might also like