NF Project
NF Project
NF Project
MICRO-PROJECT
SUBJECT : NETWORK FORENSICS (4360705)
SEMESTER :- 6TH
DEPARTMENT
COMPUTER ENGINEERING
TOPIC
1|Pa ge
Vision of our Institute
To nurture young minds by imparting quality technical education to meet
ever changing industrial challenges and societal needs.
Vision of Department
Mission of Department
• To implant professional attitude, moral values, technical expertise
and innovative capabilities.
• To prepare skilled computer engineers for specialized careers
along with higher studies.
• To enhance liaison with industry and academia for maximum
exchange of knowledge and skill
2|Pa ge
ABSTRACT
3|Pa ge
Acknowledgement
We would like to express our gratitude to our guide Guided By :
Mr. PARESHKUMAR PATEL as well as our
H.O.D Mr.S.R.SOLANKI who gave us golden opportunity to do this
project on this topic Firewall We Would also like to thank our
classmates and Specially to our classmates Who helped us in our
Project. We Would also like to Think our parents Who supported us
Throughout the semester.
Pankaj Baria(216300307039)
Awsaf Shaikh (216300307005)
4|Pa ge
❖ Introduction:-
Today's networks change and develop on a regular basis to
adapt to new business situations, such as reorganisations,
acquisitions, outsourcing, mergers, joint ventures, and
strategic partnerships, and the increasing degree to which
internal networks are connected to the Internet. The increased
complexity and openness of the network thus caused makes
the question of security more complicated than hitherto, and
necessitates the development of sophisticated security
technologies at the interface between networks of different
security domains, such as between Intranet and Internet or
Extranet. The best way of ensuring interface security is the use
of a firewall.
5|Pa ge
Figure 1: Firewall Schematics
6|Pa ge
❖Firewalls: Basic Approaches and Limitations :
Firewalls are critical components of network security, serving as
barriers between internal networks and external threats. They
employ various approaches to regulate and monitor traffic, each with
its strengths and limitations.
1. Packet Filtering:
This method examines individual data packets based on
predefined rules. It filters packets by inspecting headers for source
and destination addresses, ports, and protocol types. While
efficient and suitable for basic security needs, packet filtering can
be vulnerable to IP spoofing attacks and lacks the ability to inspect
packet contents beyond headers.
3.Proxy Firewalls:
Proxy firewalls act as intermediaries between internal and
external networks, handling requests on behalf of clients. They
7|Pa ge
establish separate connections with both parties, inspecting and
filtering traffic at the application layer. While offering strong
security by scrutinizing packet contents and effectively hiding
internal network details, proxy firewalls can degrade performance
due to the overhead of processing each connection.
8|Pa ge
❖ Limitations:
1.Encrypted Traffic:
Firewalls face difficulties inspecting encrypted traffic, as
they cannot analyses encrypted contents without decryption
keys. This limitation hampers their ability to detect threats
hidden within encrypted communications.
2.Application Awareness:
While NGFWs boast application awareness, they may
struggle to accurately identify and control increasingly
complex and dynamic applications, leading to potential
gaps in security coverage.
3.Scalability:
As network traffic volume grows, firewalls may struggle to
handle the increased load efficiently, potentially leading to
performance bottlenecks and degraded user experience.
4.Zero-Day Threats:
Firewalls rely on predefined rules and signatures to detect
and mitigate threats. As a result, they may be susceptible to
zero-day attacks that exploit vulnerabilities unknown to
security vendors.
9|Pa ge
❖ Types of Firewall:
3. Database Firewalls :
As the name suggests, these firewalls are focused on
protecting databases from unauthorized access, SQL injection
attacks, and other threats. They monitor database traffic and
enforce access controls based on predefined security policies
to ensure that only authorized users and applications can
interact with the database.
4. Cloud-based Firewalls :
These firewalls are deployed in cloud environments to protect
cloud infrastructure, applications, and data from various
threats. They operate similarly to traditional network firewalls
but are specifically designed to secure cloud-based resources
and provide additional features such as scalability, elasticity,
and integration with cloud platforms.
5. Next-Generation Firewalls:
NGFWs combine traditional firewall capabilities with
advanced security features such as intrusion detection and
prevention, application awareness, SSL inspection, and more.
They offer deeper visibility into network traffic and
application behaviour, allowing organizations to better
identify and respond to emerging threats in real-time.
11 | P a g e
❖ Steps to Configure and Verify Firewall in Cisco
Packet Tracer:
Step 1: First, open the Cisco packet tracer desktop and
select the devices:
S.NO Device Model Name Quantity
1. PC PC 1
2. server PT-Server 1
3. switch PT-Switch 1
IP Addressing Table:
12 | P a g e
• Then we, create a network topology as shown below the image.
13 | P a g e
Step 2: Configure the PCs (hosts) and server with IPv4 address and
Subnet Mask according to the IP addressing table given above.
14 | P a g e
Step 3: Configuring the firewall in a server and blocking packets
and allowing web browser
• First, Deny the ICMP protocol and set remote IP to 0.0.0.0 and
Remote wildcard mask to 255.255.255.255.
• Then, allow the IP protocol and set remote IP to 0.0.0.0 and Remote
wildcard mask to 255.255.255.255.
15 | P a g e
16 | P a g e
Step 4: Verifying the network by pinging the IP address of any PC.
17 | P a g e
18 | P a g e
❖ Conclusion
19 | P a g e