Sei sulla pagina 1di 6

CASE STUDY 7 CONFIGURING A FIRE WALL

To consider a firewall communication server with single inbound modem. Configure the modem to ensure security for LAN REQUIREMENTS: Cisco Packet Tracer 6.0.1 3 PC windows or Linux PC's One Switch or Hub One DSL Modem One Application Server Communication Channels Class B IP Address. Basic firewall operations. Basic Network configuration Commands. PROCEDURE: Open The CISCO PACKET TRACER software. Draw The Three PC using End Device Icons. Draw The CISCO 24 Port Switch Using Switch icon lists. Draw The DSL modem using WAN Emulation Icon. Draw The Cloud Icon using WAN Emulation Icon. Draw The Server using End Device Icons. Make the cable connectivity. Enter The IP Address To Each Machine (Server and PC's). Check the IP address for Every PC using ipconfig or ifconfig Command. Check The Connections using Ping Commands. NETWORK TOPOLOGY:

http://menetworkengineering.blogspot.in/

What is Firewall? A firewall is a layer of security between your home network and the Internet. Since a router or modem is the main connection from a home network to the Internet, a firewall is often packaged with those devices. Every home network should have a firewall to protect its privacy. firewalls are a combination of hardware and software The hardware part gives firewalls excellent performance, while the software part allows firewalls to be tailored to your specific needs Firewall Rules: Firewall rules block or allow specific traffic passing through from one side of the router to the other. Inbound rules (WAN to LAN) restrict access by outsiders to private resources, selectively allowing only specific outside users to access specific resources. Outbound rules (LAN to WAN) determine what outside resources local users can have access to. A firewall has two default rules, one for inbound traffic and one for outbound. The default rules of the modem router are: 1. Inbound 2. Outbound INBOUND RULES: Block all access from outside except responses to requests from the LAN side OUTBOUND RULES: Allow all access from the LAN side to the outside. NOTE: You can define additional rules that will specify exceptions to the default rules. By adding custom rules, you can block or allow access based on the service or application, source or destination IP addresses, and time of day. You can also choose to log traffic that matches or does not match the rule you have defined.

http://menetworkengineering.blogspot.in/

SERVER IP ADDRESS: SERVER>ipconfig FastEthernet0 Connection:(default port) Link-local IPv6 Address.........: FE80::201:63FF:FEB1:4829 IP Address......................: 172.16.0.1 Subnet Mask.....................: 255.255.0.0 Default Gateway.................: 0.0.0.0 PC-1 IP ADDRESS: PC>ipconfig FastEthernet0 Connection:(default port) Link-local IPv6 Address.........: FE80::201:C9FF:FE64:518E IP Address......................: 172.16.0.2 Subnet Mask.....................: 255.255.0.0 Default Gateway.................: 0.0.0.0 PC-2 IP ADDRESS: PC>ipconfig FastEthernet0 Connection:(default port) Link-local IPv6 Address.........: FE80::201:C9FF:FE64:518E IP Address......................: 172.16.0.2 Subnet Mask.....................: 255.255.0.0 Default Gateway.................: 0.0.0.0 PC-3 IP ADDRESS: PC>ipconfig FastEthernet0 Connection:(default port) Link-local IPv6 Address.........: FE80::290:21FF:FEBC:CDA5 IP Address......................: 172.16.0.4 Subnet Mask.....................: 255.255.0.0 Default Gateway.................: 0.0.0.0

BEFORE THE FIREWALL CONFIGURATION: ICMP ping command is a Network Utility Command. ping tools use Internet Control Message Protocol (ICMP). ping used to verify the connection between source PC to Destination PC.

http://menetworkengineering.blogspot.in/

PING BETWEEN WAN PC TO SERVER USING ICMP PROTOCOL: ping was successful between the Server and Remote PC.

HTTP Open the any PC web Browser type the server IP address in address bar. (http://172.16.0.1). We can access the web page from the server. WEB PAGE ACCESS BETWEEN SERVER TO WAN PC USING TCP PROTOCOL: Web Page can Access successful on Remote PC from the Server.

AFTER THE FIREWALL CONFIGURATION: We use Firewall Inbound Rules. Block all access from outside except responses to requests from the LAN side

http://menetworkengineering.blogspot.in/

Deny ICMP protocol Services from the outside Network

Allow TCP protocol Services from the outside Network

PING BETWEEN WAN PC TO SERVER USING ICMP PROTOCOL: ping was not successful between the Server and Remote PC. Because we block the outside network ICMP services.

http://menetworkengineering.blogspot.in/

WEB PAGE ACCESS BETWEEN SERVER TO WAN PC USING TCP PROTOCOL: Web Page can Access successful on Remote PC from the Server. Because we Allow the TCP protocol Services from the outside Network.

RESULT: Thus the Firewall Experiment was Configured Successfully.

http://menetworkengineering.blogspot.in/

Potrebbero piacerti anche