0% found this document useful (0 votes)
5 views

ACN_microproject

acn microproject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

ACN_microproject

acn microproject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

MAHARASHTRA STATE BOARD OF

TECHNICAL EDUCATION
ZEAL EDUCATION SOCIETY’S

ZEAL
POLYTECHNIC
MICRO PROJECT
Academic year: 2024-2025

TITLE OF PROJECT

Configure firewall using cisco packet tracer

Program: Computer Engineering Program code: CO


Course: ACN Course code: 22520
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

Certificate

This is to certify that Mr Adiraj Anil Khore Roll No. 22 of Semester 5th of Diploma in

Computer Enginering of Institute, ZEAL POLYTECHNIC (Code: 0988) has completed

the Micro Project satisfactorily in Subject – ACN (22520) for the academic year 2024-

2025 as prescribed in the curriculum.

Place: Pune Enrollment No: 2209880272

Date: Exam. Seat No:

Subject Teacher Head of the Department Principal


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

Certificate

This is to certify that Mr Parth Nitin Shinde Roll No. 49 of Semester 5th of Diploma in

Computer Engineering of Institute, ZEAL POLYTECHNIC (Code: 0988) has

completed the Micro Project satisfactorily in Subject – ACN (22520) for the academic year

2024-2025 as prescribed in the curriculum.

Place: Pune Enrollment No: 2209880354

Date: Exam. Seat No:


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

Certificate

This is to certify that Mr Yash Pradeep Shinde Roll No. 53 of Semester 5th of Diploma in

Computer Engineeering of Institute, ZEAL POLYTECHNIC (Code: 0988) has

completed the Micro Project satisfactorily in Subject – ACN (22520) for the academic year

2024-2025 as prescribed in the curriculum.

Place: Pune Enrollment No: 2209880360

Date: Exam. Seat No:


MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

Certificate

This is to certify that Mr. Shubham Tukaram Sutar Roll No. 64 of Semester 5th of

Diploma in Computer Engineering of Institute, ZEAL POLYTECHNIC (Code: 0988) has

completed the Micro Project satisfactorily in Subject – ACN (22520) for the academic year

2024-2025 as prescribed in the curriculum.

Place: Pune Enrollment No: 2209880721

Date: Exam. Seat No:


Group Details:

Name of group
Sr. No Roll No Enrollment No
members
1 Adiraj Anil Khore 22 2209880272

2 Parth Nitin Shinde 49 2209880354

3 Yash Pradeep Shinde 53 2209880360

4 Shubham Tukaram 64 2209880721


Sutar

Name of Project Guide: - Prof. Tejal Panmand


INDEX

SR.NO. CONTENT PAGE NO.

1 PROJECT ABSTRACT 1

2 MAIN CONTENT 2-13

3 CONCLUSION 14

4 REFERENCES USED 15

5 SOURCES USED 15

6 WEEKLY PROJECT REPORT 16

7 EVALUATION SHEET 17
PROJECT ABSTRACT

This project focuses on configuring a firewall using Cisco Packet Tracer to secure a network by

controlling traffic flow. A simulated network topology will be created, including both internal

(LAN) and external (WAN) segments. The firewall will be configured with security zones and

Access Control Lists (ACLs) to filter traffic based on predefined rules. Testing and verification

will demonstrate how these configurations enhance network security.

1|P a g e
MAIN CONTENT

 Introduction:-
 Definition and Purpose of a Firewall:-

A firewall is a network security device or software designed to monitor and


control incoming and outgoing network traffic based on a set of security rules. Its
primary purpose is to establish a barrier between a trusted internal network and
untrusted external networks (such as the internet) to prevent unauthorized access and
protect against malicious attacks.

 Types of Firewalls:-
Software Firewalls: These are installed on individual devices (e.g., computers, smartphones) to
control traffic for that specific device. They are typically part of the operating system or a third-
party security suite.

Hardware Firewalls: Dedicated physical devices placed between a network and an external
source, such as the internet. They are often used to protect entire networks, making them ideal
for organizations.

Network-based Firewalls: Positioned at the boundary of a network to filter traffic entering or


leaving the network. These are typically hardware firewalls that provide protection at a broader
level.

Host-based Firewalls: Installed on individual computers or servers, host-based firewalls protect


the specific device where they are installed.

2|P a g e
 Importance of Firewalls in Network Security:-
Firewalls are critical to network security because they:

 Filter malicious traffic: Prevent unauthorized access to sensitive data and


resources by filtering out harmful traffic based on established rules.

 Control network access: Define which devices or services can communicate


with internal systems, providing a layer of access control.

 Block attacks: Protect networks from cyber-attacks such as Distributed


Denial of Service (DDoS), malware, and phishing by blocking suspicious
traffic.

 Log traffic: Record network traffic patterns, helping to identify potential


security incidents and enabling more effective monitoring and auditing.

3|P a g e
 Cisco Packet Tracer Overview:-
 Brief Introduction to Cisco Packet Tracer:-

Cisco Packet Tracer is a powerful, multi-platform network simulation tool


developed by Cisco Systems. It is widely used by students, instructors, and
network professionals for learning, teaching, and experimenting with
network concepts in a virtual environment. Packet Tracer enables users to
create, configure, and simulate networks, helping them to better understand
how different networking devices and protocols work together.

 Advantages of Using Packet Tracer for Network Security


Configurations:-

 Cost-effective Learning: Packet Tracer offers a free and virtual environment


where users can simulate network security configurations without needing
physical devices.
 Hands-on Practice: Users can experiment with security features like
firewalls, ACLs, and VPNs, helping them understand the practical
implications of network security concepts.
 Real-time Simulations: Packet Tracer provides real-time feedback on the
impact of security configurations, allowing users to immediately see how
changes affect network traffic and security.
It only loans out resources to processes if it has enough on hand to meet
potential demand. We characterize this as a safe state.

5|P a g e
 Firewall configuration steps:-

 Creating a Basic Network Topology in Cisco Packet Tracer


1) Launch Packet Tracer:
 Start a new project.
2) Add Devices:
 Drag a router (e.g., 1841), a switch (e.g., 2950-24), and a few PCs
into the workspace from the devices panel.
3) Connect Devices:
 Use Copper Straight-Through cables to connect:
o Router to Switch.
o Switch to PCs.
o

6|P a g e
 Assigning IP Addresses Using DHCP:-

 Add DHCP Server:


Drag a Server from End Devices and connect it to the switch.

 Configure DHCP Server:


Click the Server, go to Config > DHCP.

 Set up the DHCP pool with:


o Pool Name

o Default Gateway (e.g., 10.0.0.1)

o Starting IP Address (e.g., 10.0.0.10)

o Subnet Mask (e.g., 255.255.255.0)

o Maximum Number of Users

 Configure PCs for DHCP:


o Click each PC, go to Desktop > IP Configuration.

o Select DHCP to automatically receive an IP address.

7|P a g e
 Setting up firewall on server:-
 Access the Firewall Configuration:
o Go to the Desktop of server:

Click on the Firewall device.


Go to the Desktop tab.
o Open Firewall Configuration:

Click on Firewall to open the configuration interface.


 Set up firewall
Give a remote IP address(i.e 0.0.0.0)
Give a remote wildcard mask(i.e 255.255.255.255)
Give type of action like allow or deny
Give type of protocol for specific action
Click on add.
 Configure Firewal l
Give Deny action for icmp protocol so that devices can not send data. and
Allow only ip address.

8|P a g e
 Verify configuration:-

o Test Connectivity:

 Use Command Prompt on a connected PC to ping other devices and


ensure ICMP traffic is blocked.

 Test connectivity to other IP services to verify that IP traffic is


allowed.

9|P a g e
CONCLUSION

configuring a firewall using Cisco Packet Tracer involves defining


rules and policies to control the flow of network traffic. By setting up the
firewall to deny ICMP traffic and allow all IP traffic, you ensure that while
network devices can communicate normally via IP, they are protected from
potential ICMP-based attacks or unsolicited network probing. This
configuration helps maintain network security and stability while allowing
necessary communication. Effective firewall management is crucial for
safeguarding network resources and minimizing vulnerabilities.

10 | P a g e
WEEKLY PROGRESS REPORT OF MICRO-PROJECT:

SR.NO. WEEK ACTIVITY PERFORMED SIGN OF GUIDE DATE

1 1st Discussion and finalization of topic

2 2nd Preparation and submission of Abstract

3 3rd Literature Review

4 4th Collection of Data

5 5th Collection of Data

6 6th Discussion and outline of Content

7 7th Formulation of Content

Editing and proof Reading


8 8th
of Content

9 9th Compilation of Report And Presentation

10 10th Seminar

11 11th Viva voce

12 12th Final submission of Micro Project

Sign of the student Sign of the Faculty

11 | P a g e
REFERENCE:

SOURSE :

- https://chatgpt.com/c/66e86cdc-6108-800a-b51b-
a0c2612c50c4
-
https://www.computernetworkingnotes.com/wp-content/uploads
/ccna-study-guide/images/csg132-01-cisco-packet-tracer.png

12 | P a g e
ANEEXURE II

Evaluation Sheet for the Micro Project


Academic Year: 2024-25 Name of the Faculty: Prof. Shilpa MAM

Course: OSY Course code: 22516 Semester:5


Title of the project: Power Consumption and Activity Monitor (Android)
Cos addressed by Micro Project:
A: description about Firewall
B: Advantages of firewall
C: description about cisco packet tracer
D: firewall configuration

Major learning outcomes achieved by students by doing the project


(a) Practical outcome:
• Understanding firewall.
• Firewall configuration steps.
(b) Unit outcomes in Cognitive domain:
•Explaining functioning of firewall configuration.

(c) Outcomes in Affective domain:


• Problem-Solving Resilience
• Appreciation for System Robustness

Comments/suggestions about team work /leadership/inter-personal communication (if any)


………………………………………………………………………………………………………………
Marks out of 9 Marks out of 6 for
for performance performance in oral/
in group presentation
Roll No Student Name activity (D5 Col.9) Total out of 15
(D5 Col.8)
22 Adiraj Anil Khore
49 Parth Nitin Shinde
53 Yash Pradeep Shinde
64 Shubham Tukaram Sutar

(Signature of Faculty)

13 | P a g e

You might also like