Document 6
Document 6
Report on
“Firewall Configuration”
At
Gnest Technology
Submitted to:
Submitted by:
Kanhaiya Shah
Date:
…................................................
Gyaneshwar Rajbanshi
Project coordinator
(Internship Supervisor)
CERTIFICATE OF APPROVAL
The undersigned certify that they have read and recommended to the Department of
Computer Science for acceptance an internship reported entitled “Firewall
Configuration” submitted by Kanhaiya Shah (TU Roll No.: 11536/073) in partial
fulfillment for the degree of Bachelor of Science in Computer Science and
Information Technology.
…............................................
Supervisor/Project Coordinator
…..............................................
Mr.
External Examiner
Tribhuvan University
.............................................
We found him extremely inquisitive and hardworking. He was very much interested
to learn the functions of our core division and also willing to put her best effort and
get in-depth of the subject to understand it better. His association with us was very
fruitful and we wish her all the best for her future endeavors.
….......................................
Gyaneshwar Rajbanshi
Roadses, Biratnagar
ACKNOWLEDGEMENT
The main purpose of internship program is to provide the practical knowledge in
computer science and information technology related field to the student. I could not
have done this work without the help that I received cheerfully from my college
“HIMALAYA DARSHAN COLLGE”.
Firstly, my special thanks to Mr. Sumit Shah sir (coordinator BSc. CSIT, Himalaya
Darshan College). I am highly indebted to Mr. Gyaneshwar Rajbanshi (Supervisor)
for the patient guidance encouragement and air device during my internship period
and also for age trustworthy help towards making this report the standard as per the
norms and values.
Finally, my thanks and appreciation go to each and every one of my colleagues and
the entire team who always encouraged and supported me. without the priceless
contribution and guidance of all above mentioned, really, I could not have learned
as many things I have learned in my intern period.
ACKNOWLEDGEMENT.....................................................................v
ABSTRACT............................................................................................v
LIST OF FIGURES..............................................................................ix
LIST OF TABLES.................................................................................x
LIST OF ABBREVIATIONS..............................................................xi
CHAPTER 1...........................................................................................1
INTRODUCTION..................................................................................1
1.3 Objectives............................................................................................................2
1.4 Brief Introduction of industry ............................................................................2
1.4.3 Motivation...................................................................................................3
1.7 Duration..............................................................................................................5
CHAPTER 3...........................................................................................8
SYSTEM ANALYSIS............................................................................8
3.1.1 Firewall....................................................................................................8
CHAPTER 4.........................................................................................11
PROJECT IMPLEMENTATION......................................................11
4.1 Tool used..........................................................................................................11
4.2 Implementation................................................................................................11
4.2.1 Functionalities...............................................................................................11
4.2.2 Security.......................................................................................................12
CHAPTER 5..........................................................................................24
TESTING...............................................................................................24
5.1 Testing..............................................................................................................24
CHAPTER 6.........................................................................................27
CONCLUSION....................................................................................27
6.1 Conclusion........................................................................................................27
6.3 Recommendations............................................................................................27
REFERENCES......................................................................................29
LIST OF FIGURES
figure 1.1: organizational hierarchy..........................................................................4
LIST OF TABLES
Table 1: duration of internship.................................................................................5
LIST OF ABBREVIATION
BSc. CSIT Bachelor of Science in Computer Science and Information
Technology
IT Information Technology
IP Internet Protocol
1. INTRODUCTION
This internship as per the requirement of the TU for the BSc. CSIT has enhanced the
skill and enthusiasms of the students are they get knowledge of the company
environments and to learn different aspects of working mechanism that prevail in
the organization internship benefits include:
I worked as a junior level network assistant and I chose the firewall configuration as
a specific project for the finals of 8th semester as required by Tribhuvan University.
This project is intended to configure the firewall and provide network security to any
organization. A firewall is a system designed to prevent unauthorized access to or
from a private network. A firewall is a system designed to prevent unauthorized
access to or from a private network. A firewall configuration is a process in which
we can add or remove filters based on several conditions. After configuring a
firewall, it typically establishes a barrier between a trusted internal network and
untrusted external network, such as the internet. The process of correctly configuring
a firewall is complicated and prone to error, and it worsen as the network complexity
grows. A poorly configured firewall may result in major security threats, in the case
of a network firewall, an organization’s security could be endangered, and in the
case of a personal firewall, an individual computer’s security is threatened. Firewalls
are an essential part of your network security, and a misconfigured firewall can
damage organization and give easy access to an attacker. Fortinet firewall is used
for configuration of firewall in this project.
1.3 Objectives
In view of the rapid changes in the information technology (IT) industry Gnest
technology offers strategic solution especially design to meet the client’s needs
across a wide range of sector government, semi government, financial institutions,
nonprofit business, and others. in case of Gnest technology the structure of the
organization is more like a boundary-less organization. the members in this company
believe more into eliminating vertical and horizontal boundaries break down
external barriers between the companies and its customers and suppliers.
Gnest technology and computer solution was established when well experienced and
specialist people together came up with the idea to run their own business. since the
existence of organizations have not been so long, the head of the management didn't
appear clear. Also, at time intern joined the company, intern believes partner is liable
to their specialized department and every work here is done by the agreement of all
the partners.
1.4.2 Organization Rationale
• Vision
• Customer-focus
We will go out of our way and walk that extra mile to WOW our customers
• Honesty
• Efficiency
We strive to maximize efficiency in everything we do. We are frugal and seek value
in our spending
We maintain a healthy work environment based on mutual trust and respect, that
builds strong teams and fosters long term relationships.
1.4.3 Motivation
The world has enhanced in technology and the new technologies are invented day
by day. Networking is the important area of technology. Networking deals with
maintenance and upgrading of the software and the problem arise in the system. I
always have curiosity about how the network system worked, how the problems
occur and what may be the possible solution? While using my own laptop and
internet service I have faced so many problems and I always want to know the cause
and solve the solution on my own. In future I want to make my carrier in the field of
network that’s why I choose the field of networking for the internship.
After studying three and half years of BSc. CSIT course, lots of theoretical
knowledge has acquired. According to the requirement of the course, at final year
we have to choose one of the organizations determined by college department for
internship. Simply it is the opportunity to gain the practical knowledge and
experience in real life working environment of an organization. As per my interest
in networking I have selected IT Security College of Computer as it is well renowned
organization that provide the network support to other private and government
organization.
1.7 Duration
Network security is a serious concern these days. Keeping create a reliable security
and trusted security firewall is required. configuring firewall is not an easy task.
RESEARCH METHODOLOGY
Cisco offers the industry’s first threat-focused next-generation firewall: Cisco ASA
with fire POWER services available on the cisco ASA 5500-X series and ASA 5585-
X Adaptive Security Appliances. With this solution user get proven cisco ASA
firewall protection, combined with industry-leading source fire threat and advanced
malware protection in a single device. It protects business with superior visibility
and highly effective, threat-focused defense across the entire attack continuum. It
provides comprehensive visibility, reduced cost and complexity, and real-time
protection from malware and emerging threats.
These firewalls help you to balanced security effectiveness with productivity. This
solution offers the combination of the industry’s most deployed stateful firewall with
a comprehensive range of next-generation network security services. It includes
granular visibility and control, robust web security onsite or in the cloud, industry-
leading intrusion prevention system (IPS) to protect against known threats,
comprehensive protection from threats and advanced malware, world’s most widely
deployed ASA firewall with highly secure Cisco any connect remote access.
All Cisco ASA 5500-X Series Next-Generation firewalls are powered by Cisco
Adaptive Security Appliance (ASA) software, with enterprise-class stateful
inspection and next-generation firewall capabilities integration with other essential
network security technologies. It has high availability for high-resiliency
applications. (CISCI,2007)
Palo Alto
SYSTEM ANALYSIS
3.1.1 Firewall
A firewall is a network system that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. A firewall typically
establishes a barrier between our trusted internal network an untrusted external
network such as the Internet. Firewall are often categorized as either network
firewalls or host-based firewalls. Network firewalls filter traffic between two or
more networks and run-on networks hardware. host based firewalls run on host
computers and control network traffic in and out of those machines.
The purpose of this age to provide user security from any threats. It does not allow
unauthorized users to access the Internet. user management can be done which
helps user to give access to the valid users only. Using firewall is advantageous, if
any users want to certain website which are not suitable for the organization, they
can do so by using firewall. By filtering the URL address is accessible to the user,
you are adding security to the computer system. in an organization, URL blocking
helps in improving the productivity. (Wickert,2015)
some requirements are the configuration that our system must have in order for a
hardware/software application to run smoothly and efficiently. failure to meet these
requirements can result in installation/performance problem.
Functional Requirements
Nonfunctional requirements
Availability: The first one should have uptime of 99% of the time
Usability: It provides positive user experience.
This ability is carried out to determine potential positive and negative outcomes of
a project before investing or considerable amount of time and money into it. insert
a feasibility analysis evaluates the project potential for success. following
feasibility analysis was performed prior to working on the project.
This project is technically feasible due to its powerful devices and experienced
people with technical knowledge are preferably good. it provides security in high
level.
Firewall does not have affordable price thus it is not economically feasible.
this test of visibility checks how well the firewall meets the user requirement. users
use firewall for the network security. A well configured firewall provides network
security in an organization. the technical is stop having sufficient knowledge of the
tools being used and the users need just to know how to access and run the device.
hence it is concluded that the project is operationally feasible.
Gnatt chart display the overall timeline of the proposed project. It presents a
sequential breakdown of individual tasks showing the relationship between task
and the time taken for each task.
CHAPTER 4
PROJECT IMPLEMENTATION
4.2 Implementation
4.2.1 Functionalities
4.2.2 Security
This type of firewall has a list of firewall security rules which can block traffic
based on IP protocol, IP address and port number. Under this firewall management
program, all web traffic will be allowed, including web-based attacks. In this
situation, you need to have interest on prevention in addition to firewall security in
order to differentiate between good web and bad web traffic. And it is not problem
with packet filtering firewalls which are not stateful is that the firewall can't tell the
difference between a legitimate return packet and a packet which pretend to be
from an established connection which means your firewall management system
configuration will have to allow both kinds of packets into the network.
• Stateful firewall
This is similar to a packet filtering firewall, but it is more intelligent about keeping
track of active connections, so you can define power management rules such as
“Only allow there gets into the networks that are part of an already established
outbound connections.” You have solved the established connection issue
described above, but you still can't tell the difference between “good” and “bad”
web traffic. you need intrusion prevention to detect and block all attacks.
an application firewall actually examines the data in the packet, and can therefore
look at application layer attacks. this kind of firewall security is similar to interest
and prevention technology. there are three caveats, however. first the definition of
“deep” extends to some particular depth in the packet and does not necessarily
examine the entire packet. This can result in missing some kind of attacks. second
depending on the hardware, a firewall may not have adequate processing power to
handle the deep packet inspection for your network. next be sure to ask questions
about how much bandwidth it can handle while performing such inspection. and
finally, embedded firewall management technology may not have the flexibility to
handle all attacks.
A firewall controls access between the external and internal networks. to prevent
unauthorized access from an external network, it blocks communication other than
that which is permitted for predetermined client or communication, to use a
firewall it is therefore necessary to class clarify and specify the port or IP addresses
for which communication is permitted. and intrusion detection system (IDS)
Monitors the communication line and huge communication patterns to determine
whether access is authorized.
This part includes the field of system testing which each carried out with device of
Fortinet security system. the union powder the following snapshots were taken at the
period of demonstration. the network will be configured as below. you may need to
adjust the IP addresses to suit needs.
A. Configuring a firewall
1. interface configures
• log in
Figure 4.1: Login for Interface Configuration
• Go to network Party
• click on interfaces
• create a new ‘WAN 1’
• Change IP address
Figure 4.5: Setting up IP Address
2. Routes configured
• go to network
• click on routing
• Create a new
• Destination: 0.0.0.0/0.0.0.0
• Gateway:192.168.100.1
• Interface: Wan 1
• administration distance: 10
3. IPV4 configure
• go to policy
• go to IPV 4
• create a new incoming interface ’Lan’(internal) and outgoing interface ‘wan
1’
B. User Creation
1. Creating new user
• Go to user
• click on user group
• create a new user naming ‘Internet’, member’s s1 and s2.
• Add
Figure 4.11: Creation of New User
• Go to user
• Create new user name ‘s1’ and ‘s2’
• Assigning a password
4. Creating a Policy
• Go to policy
• click on add assign ‘Internet’ in user group ‘any’ in service, ‘always’ on
schedule
• Click on OK
C. Web Filter
1. Blocking our URL
• go to security profile
• click on web filter
• enable URL filter
• in list the URL you want to block: * facebook.com, Type: Wildcard Action:
Block and tick enable on status.
Figure 4.16: Enable URL filter
2. Creating policy
• go to policy and object
• click on IPV4
• turn on ‘web filter’ on security profile
Figure 4.18: Turning on Web Filter
CHAPTER 5
TESTING
5.1 Testing
Testing is the process of determining whether the system works effectively and
efficiently. Testing does not only include debugging. It also takes for quality
assurance validation and verification. reliability and availability estimation.
Testing can be done in various levels. Here in my project testing is done based on
authentication an authorization to both user and administrator.
Users 1 Log In
The unit testing part of testing methodology is the testing of individual software
modules or component that make up a system project.
Here,
Figure
5.1:
Authentication failed
As the username is listed as S2 here we typed s so the authentication failed but
when we type S2 we could get access to Internet.
After the successful login with password anality user input the firewall is start
working. This can be assured by ping in the command prompt with its public IP
address. this one in figure below:
CONCLUSION
Conclusion
during the internship, I had the opportunity of gaining The Walking mechanism of
the Internet and taught to manage the time and planning while working in a team.
the main achievement from the internship. Is to confidence inside before starting
the profession on related field. along with technical gain, I also had the knowledge
on handling the customers trouble in a systematic and easy way. besides that, I
learned about the file setting, troubleshoot the problem, and solved the IP problem.
this internship was a confident boosting factor for my future.
The internship program was very fruitful as it provided the opportunity to improve
their skills and knowledge and also helped in working with a large group of people
in a team. talking about the technical gain, the knowledge on firewall was
obtained.
during the internship., I learned to configure the various routers making them
primary and secondary use. I got an opportunity to maintain and implement
networking devices. I learned to work under extreme pressure and time constraints,
weight helped in building self-confident. finally, my internship helped me to gain
knowledge on firewall configuration and network security, wireless network, file
sharing, troubleshoot problem and also is provided me some useful knowledge
about IP.
6.3 Recommendation
• As an intern, I didn't get the access of the organization entire system which
limits the knowledge of the organization as well as technologies mechanism.
thus, should provide some access so that the intern can learn more deeply
about the organization.
• Any organization, usually the service based sued always give first priority to
the customers. organization must realize that the holding existing customer
is more important and fruitful than planning for new customers.
• the organization must bring new planning and packages so that the existing
customers are highly benefited and to attract the new customers from the
competitive market.
• the mentors assigned to the intern student must be highly experienced and
knowledgeable on related field.