SlideShare a Scribd company logo
1 of 29
Firewall Reconciliation
(Six Months Industrial Training Report)
By- Gurjan Singh
Roll no.- 1054
Firewall Reconciliation 1
COMPANY PROFILE
Firewall Reconciliation
COMPANY PROFILE
 Bharti Enterprises has been at the forefront of technology and has
revolutionized telecommunications with its world-class products and services.
 Today Bharti Teletech is the major PTT supplier in South Asia. It has ISO 9002
accreditation and also an OEM for Sprint Corporation and Siemens.
 It’s range of products marketed under the brand name Beetel constitute a 30%
market share in India thereby making it the market leader in the domestic
market.
Firewall Reconciliation 3
COMPANY ACHIEVEMENTS & AWARDS
2011
 Awarded the Excellence Award for Telecommunication by Geospacial World
Forum 2011.
 Awarded as the Global Gamechanger, Innovative VAS provider, Customer
Experience Enhancement at the ET Telecom awards 2011.
 Ranked 6th in Asia-Pacific and 5th in India in the list of ‘Top 25 Companies for
Leaders Globally’.
Firewall Reconciliation 4
COMPANY ACHIEVEMENTS & AWARDS
Continued …
2012
 Beyond Excellence – Improvement of Voice Network Quality by National award
on Economics of Quality by Quality Council of India (QCI).
 ‘Har Ek Friend Zaroori Hota Hai’ – One of the most loved campaigns was the
second most awarded campaign at the Creative ABBY Awards! It won total of 7
metals including 2 gold, 4 silver and 1 bronze.
 ‘Product of the Year’ award for Airtel Digital TV (HD).
Firewall Reconciliation 5
PROJECT UNDERTAKEN
Firewall Reconciliation 6
FIREWALL RECONCILIATION
 A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communications.
 There are several types of firewall techniques:
Packet filter
Application gateway
Circuit-level gateway
Proxy server
Firewall Reconciliation 7
FUNCTIONS OF FIREWALL
 A firewall is a dedicated appliance, or software running on a computer, which
inspects network traffic passing through it, and denies or permits passage
based on a set of rules.
 It is normally placed between a protected network and an unprotected
network and acts like a gate to protect assets to ensure that nothing private
goes out and nothing malicious comes in.
Firewall Reconciliation 8
SOFTWARES USED FOR FIREWALL
RECONCILIATION
SOFTWARES BEING USED:
 CHECKPOINT SMART DASHBOARD.
 CHECKPOINT SMARTVIEW MONITOR.
 CHECKPOINT SMARTVIEW TRACKER.
 PUTTY SOFTWARE.
 SUBNET CALCULATOR.
Firewall Reconciliation 9
SOFTWARES BEING USED
CHECKPOINT SMART DASHBOARD
 Smart Dashboard is a single, comprehensive user interface for defining and
managing multiple elements of a security policy: firewall security, VPNs,
network address translation, web security.
CHECKPOINT SMARTVIEW MONITOR
 SmartView Monitor centrally monitors Check Point and OPSEC devices,
presenting a complete visual picture of changes to gateways, remote users
and security activities. This enables administrators to immediately identify
changes in network traffic flow patterns that may signify malicious activity.
Firewall Reconciliation 10
Firewall Reconciliation 11
Firewall Reconciliation 12
SOFTWARES BEING USED
Continued …
SMARTVIEW TRACKER
 Administrators can use SmartView Tracker in order to ensure their products
are operating properly, troubleshoot system and security issues, gather
information for legal or audit purposes, and generate reports to analyze
network traffic patterns.
SUBNET MASK CALCULATOR
 With subnet mask you can split your network into subnets. Enter your IP
address and play with the second netmask until the result matches your need.
Firewall Reconciliation 13
Firewall Reconciliation 14
FIREWALL RECONCILIATION STEPS
 In Firewall we apply rules to the network. These rules are applied so as to
increase the security of the network. We have restricted the users from
accessing the network by applying these rules in the firewall.
 These rules are applied to the whole network, though only a few IP are being
used in that network. So with this, it gives the other IP to use the service like
http, Telnet etc.
 Firewall reconciliation means dividing the rules on the network. By doing
reconciliation we can apply the same rule on the that we want them to use
the service and not the whole network.
Firewall Reconciliation 15
FIREWALL RECONCILIATION
Continued …
RULEBASE AT PRESENT
Firewall Reconciliation 16
SOURCE DESTINATION PORT ACTION
IT Tech IP 80 Accept
Tech IT IP 8080 Accept
Tech Tech DMZ 443 Accept
Tech Internet 8080 Accept
Tech network subnets
group for circle
10.X.X.X Any Accept
Any Any Any Drop
FIREWALL RECONCILIATION STEPS
Continued …
 We do firewall reconciliation by taking logs from the firewall, from which we
can come to know about the all the IPs are trying to use the service and who
are using that service. From there we can take the necessary IPs and delete
the unnecessary ones.
 With this reconciliation the network security is increased as only the few IPs
are allowed to use that particular service, thus avoiding the other IPs to use
the same service to access the routes switches.
Firewall Reconciliation 17
FIREWALL RECONCILIATION
Continued …
PROPOSED RULEBASE
Firewall Reconciliation 18
SOURCE DESTINATION PORT ACTION
IT Tech subnets inside XX Accept
IT Tech subnets DMZ XXX Accept
Tech subnets Tech subnets DMZ /
internet
XXX Accept
Tech DMZ Tech subnets XXX Accept
Tech DMZ Tech DMZ XXX Accept
10.X.X.X Tech NW subnets
group for circle
Any Drop
Tech NW subnets group
for circle
Any Accept
Any Any Any Drop
WHATSUP GOLD
Firewall Reconciliation 19
ACTIVITY PERFORMED
 Requirement: Installation of two new Cisco 3750 Switches (in stack)
 Host name: PUN_AS14_MOH
 IP Address: 10.20.6.29
 Description: Presently PUN_AS09_MOH (10.20.6.25) & PUN_AS10_MOH
(10.20.6.26) are directly connected to PUN_CS01_MOH (10.20.6.2) &
PUN_CS02_MOH (10.20.6.3) respectively.
 Requirement is to connect the new Cisco 3750 switches in stack & connect
the direct cables from Core switches to new switch as per attached PPT.
PUN_AS09_MOH & PUN_AS10_MOH will take the connectivity from this new
switch.
Firewall Reconciliation 20
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
Firewall Reconciliation 21
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
INTERNETWORKING
 Internetworking involves connecting two or more computer networks via
gateways using a common routing technology. The result is called an
internetwork (often shortened to internet).
 The original term for an internetwork was catenet. Internetworking started as
a way to connect disparate types of networking technology, but it became
widespread through the developing need to connect two or more local area
networks via some sort of wide area network.
Firewall Reconciliation 22
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
Firewall Reconciliation 23
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
ETHERNET CABLING
 Straight-through cable
• Host to switch or hub
• Router to switch or hub
 Crossover cable
• Switch to switch
• Hub to hub
• Host to host
• Hub to switch
• Router direct to host
Firewall Reconciliation 24
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
ETHERNET CABLING Continued …
 Rolled cable
• For display
Firewall Reconciliation 25
IP ADDRESS CLASSES
 Class A addresses begin with 0xxx, or 1 to 126 decimal.
 Class B addresses begin with 10xx, or 128 to 191 decimal.
 Class C addresses begin with 110x, or 192 to 223 decimal.
 Class D addresses begin with 1110, or 224 to 239 decimal.
 Class E addresses begin with 1111, or 240 to 254 decimal.
Firewall Reconciliation 26
SUBNETTING
 204.17.5.0 255.255.255.224 host address range 1 to 30
 204.17.5.32 255.255.255.224 host address range 33 to 62
 204.17.5.64 255.255.255.224 host address range 65 to 94
 204.17.5.96 255.255.255.224 host address range 97 to 126
 204.17.5.128 255.255.255.224 host address range 129 to 158
 204.17.5.160 255.255.255.224 host address range 161 to 190
 204.17.5.192 255.255.255.224 host address range 193 to 222
 204.17.5.224 255.255.255.224 host address range 225 to 254
Firewall Reconciliation 27
BIBLIOGRAPHY
 BOOKS
• CCNA By Todd Lamle
• Networking for dummies
• CCENT by Matt Walker
 INTERNET
• Wikipedia.com
• Computerhope.com
• computer.howstuffworks.com
• airtel.in
• checkpoint.com
Firewall Reconciliation 28
Thank You
Firewall Reconciliation 29

More Related Content

What's hot

Sql injection - security testing
Sql injection - security testingSql injection - security testing
Sql injection - security testingNapendra Singh
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspectrohit_ta
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
CCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfCCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfbekhti
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2Splunk
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
Security Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCRahul Raghavan
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testingImaginea
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Web sockets - Pentesting
Web sockets - Pentesting Web sockets - Pentesting
Web sockets - Pentesting Vandana Verma
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring BasicsRob Dunn
 
Authentication methods
Authentication methodsAuthentication methods
Authentication methodssana mateen
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switchingparthasn83
 
Web Security Deployment
Web Security DeploymentWeb Security Deployment
Web Security DeploymentCisco Canada
 

What's hot (20)

Sql injection - security testing
Sql injection - security testingSql injection - security testing
Sql injection - security testing
 
HP WebInspect
HP WebInspectHP WebInspect
HP WebInspect
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
CCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfCCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdf
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Security Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLC
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testing
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Web sockets - Pentesting
Web sockets - Pentesting Web sockets - Pentesting
Web sockets - Pentesting
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Authentication methods
Authentication methodsAuthentication methods
Authentication methods
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
Web Security Deployment
Web Security DeploymentWeb Security Deployment
Web Security Deployment
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 

Viewers also liked

Viewers also liked (12)

Airtel
AirtelAirtel
Airtel
 
Airtel
AirtelAirtel
Airtel
 
Report on airtel
Report on airtelReport on airtel
Report on airtel
 
Network cables-Imdad Hussain
Network cables-Imdad HussainNetwork cables-Imdad Hussain
Network cables-Imdad Hussain
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
ccna project
ccna projectccna project
ccna project
 
Airtel Report
Airtel ReportAirtel Report
Airtel Report
 
A training project report on airtel
A training project report on airtelA training project report on airtel
A training project report on airtel
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Final report firewall reconciliation

Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overviewRajesh Kapoor
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfRayanneAguiar4
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017Jiunn-Jer Sun
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxManojGowdaKb
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFEmulex Corporation
 
Simplifying your network management using software tools
Simplifying your network management using software toolsSimplifying your network management using software tools
Simplifying your network management using software toolsWestermo Network Technologies
 

Similar to Final report firewall reconciliation (20)

Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overview
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Corporation Tech
Corporation TechCorporation Tech
Corporation Tech
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
Simplifying your network management using software tools
Simplifying your network management using software toolsSimplifying your network management using software tools
Simplifying your network management using software tools
 
V P N
V P NV P N
V P N
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Final report firewall reconciliation

  • 1. Firewall Reconciliation (Six Months Industrial Training Report) By- Gurjan Singh Roll no.- 1054 Firewall Reconciliation 1
  • 3. COMPANY PROFILE  Bharti Enterprises has been at the forefront of technology and has revolutionized telecommunications with its world-class products and services.  Today Bharti Teletech is the major PTT supplier in South Asia. It has ISO 9002 accreditation and also an OEM for Sprint Corporation and Siemens.  It’s range of products marketed under the brand name Beetel constitute a 30% market share in India thereby making it the market leader in the domestic market. Firewall Reconciliation 3
  • 4. COMPANY ACHIEVEMENTS & AWARDS 2011  Awarded the Excellence Award for Telecommunication by Geospacial World Forum 2011.  Awarded as the Global Gamechanger, Innovative VAS provider, Customer Experience Enhancement at the ET Telecom awards 2011.  Ranked 6th in Asia-Pacific and 5th in India in the list of ‘Top 25 Companies for Leaders Globally’. Firewall Reconciliation 4
  • 5. COMPANY ACHIEVEMENTS & AWARDS Continued … 2012  Beyond Excellence – Improvement of Voice Network Quality by National award on Economics of Quality by Quality Council of India (QCI).  ‘Har Ek Friend Zaroori Hota Hai’ – One of the most loved campaigns was the second most awarded campaign at the Creative ABBY Awards! It won total of 7 metals including 2 gold, 4 silver and 1 bronze.  ‘Product of the Year’ award for Airtel Digital TV (HD). Firewall Reconciliation 5
  • 7. FIREWALL RECONCILIATION  A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.  There are several types of firewall techniques: Packet filter Application gateway Circuit-level gateway Proxy server Firewall Reconciliation 7
  • 8. FUNCTIONS OF FIREWALL  A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.  It is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in. Firewall Reconciliation 8
  • 9. SOFTWARES USED FOR FIREWALL RECONCILIATION SOFTWARES BEING USED:  CHECKPOINT SMART DASHBOARD.  CHECKPOINT SMARTVIEW MONITOR.  CHECKPOINT SMARTVIEW TRACKER.  PUTTY SOFTWARE.  SUBNET CALCULATOR. Firewall Reconciliation 9
  • 10. SOFTWARES BEING USED CHECKPOINT SMART DASHBOARD  Smart Dashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security. CHECKPOINT SMARTVIEW MONITOR  SmartView Monitor centrally monitors Check Point and OPSEC devices, presenting a complete visual picture of changes to gateways, remote users and security activities. This enables administrators to immediately identify changes in network traffic flow patterns that may signify malicious activity. Firewall Reconciliation 10
  • 13. SOFTWARES BEING USED Continued … SMARTVIEW TRACKER  Administrators can use SmartView Tracker in order to ensure their products are operating properly, troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. SUBNET MASK CALCULATOR  With subnet mask you can split your network into subnets. Enter your IP address and play with the second netmask until the result matches your need. Firewall Reconciliation 13
  • 15. FIREWALL RECONCILIATION STEPS  In Firewall we apply rules to the network. These rules are applied so as to increase the security of the network. We have restricted the users from accessing the network by applying these rules in the firewall.  These rules are applied to the whole network, though only a few IP are being used in that network. So with this, it gives the other IP to use the service like http, Telnet etc.  Firewall reconciliation means dividing the rules on the network. By doing reconciliation we can apply the same rule on the that we want them to use the service and not the whole network. Firewall Reconciliation 15
  • 16. FIREWALL RECONCILIATION Continued … RULEBASE AT PRESENT Firewall Reconciliation 16 SOURCE DESTINATION PORT ACTION IT Tech IP 80 Accept Tech IT IP 8080 Accept Tech Tech DMZ 443 Accept Tech Internet 8080 Accept Tech network subnets group for circle 10.X.X.X Any Accept Any Any Any Drop
  • 17. FIREWALL RECONCILIATION STEPS Continued …  We do firewall reconciliation by taking logs from the firewall, from which we can come to know about the all the IPs are trying to use the service and who are using that service. From there we can take the necessary IPs and delete the unnecessary ones.  With this reconciliation the network security is increased as only the few IPs are allowed to use that particular service, thus avoiding the other IPs to use the same service to access the routes switches. Firewall Reconciliation 17
  • 18. FIREWALL RECONCILIATION Continued … PROPOSED RULEBASE Firewall Reconciliation 18 SOURCE DESTINATION PORT ACTION IT Tech subnets inside XX Accept IT Tech subnets DMZ XXX Accept Tech subnets Tech subnets DMZ / internet XXX Accept Tech DMZ Tech subnets XXX Accept Tech DMZ Tech DMZ XXX Accept 10.X.X.X Tech NW subnets group for circle Any Drop Tech NW subnets group for circle Any Accept Any Any Any Drop
  • 20. ACTIVITY PERFORMED  Requirement: Installation of two new Cisco 3750 Switches (in stack)  Host name: PUN_AS14_MOH  IP Address: 10.20.6.29  Description: Presently PUN_AS09_MOH (10.20.6.25) & PUN_AS10_MOH (10.20.6.26) are directly connected to PUN_CS01_MOH (10.20.6.2) & PUN_CS02_MOH (10.20.6.3) respectively.  Requirement is to connect the new Cisco 3750 switches in stack & connect the direct cables from Core switches to new switch as per attached PPT. PUN_AS09_MOH & PUN_AS10_MOH will take the connectivity from this new switch. Firewall Reconciliation 20
  • 21. DETAILED ANALYSIS OF INDIVIDUAL MODULE Firewall Reconciliation 21
  • 22. DETAILED ANALYSIS OF INDIVIDUAL MODULE INTERNETWORKING  Internetworking involves connecting two or more computer networks via gateways using a common routing technology. The result is called an internetwork (often shortened to internet).  The original term for an internetwork was catenet. Internetworking started as a way to connect disparate types of networking technology, but it became widespread through the developing need to connect two or more local area networks via some sort of wide area network. Firewall Reconciliation 22
  • 23. DETAILED ANALYSIS OF INDIVIDUAL MODULE Firewall Reconciliation 23
  • 24. DETAILED ANALYSIS OF INDIVIDUAL MODULE ETHERNET CABLING  Straight-through cable • Host to switch or hub • Router to switch or hub  Crossover cable • Switch to switch • Hub to hub • Host to host • Hub to switch • Router direct to host Firewall Reconciliation 24
  • 25. DETAILED ANALYSIS OF INDIVIDUAL MODULE ETHERNET CABLING Continued …  Rolled cable • For display Firewall Reconciliation 25
  • 26. IP ADDRESS CLASSES  Class A addresses begin with 0xxx, or 1 to 126 decimal.  Class B addresses begin with 10xx, or 128 to 191 decimal.  Class C addresses begin with 110x, or 192 to 223 decimal.  Class D addresses begin with 1110, or 224 to 239 decimal.  Class E addresses begin with 1111, or 240 to 254 decimal. Firewall Reconciliation 26
  • 27. SUBNETTING  204.17.5.0 255.255.255.224 host address range 1 to 30  204.17.5.32 255.255.255.224 host address range 33 to 62  204.17.5.64 255.255.255.224 host address range 65 to 94  204.17.5.96 255.255.255.224 host address range 97 to 126  204.17.5.128 255.255.255.224 host address range 129 to 158  204.17.5.160 255.255.255.224 host address range 161 to 190  204.17.5.192 255.255.255.224 host address range 193 to 222  204.17.5.224 255.255.255.224 host address range 225 to 254 Firewall Reconciliation 27
  • 28. BIBLIOGRAPHY  BOOKS • CCNA By Todd Lamle • Networking for dummies • CCENT by Matt Walker  INTERNET • Wikipedia.com • Computerhope.com • computer.howstuffworks.com • airtel.in • checkpoint.com Firewall Reconciliation 28