SlideShare a Scribd company logo
1 of 29
Firewall Reconciliation
(Six Months Industrial Training Report)
By- Gurjan Singh
Roll no.- 1054
Firewall Reconciliation 1
COMPANY PROFILE
Firewall Reconciliation
COMPANY PROFILE
 Bharti Enterprises has been at the forefront of technology and has
revolutionized telecommunications with its world-class products and services.
 Today Bharti Teletech is the major PTT supplier in South Asia. It has ISO 9002
accreditation and also an OEM for Sprint Corporation and Siemens.
 It’s range of products marketed under the brand name Beetel constitute a 30%
market share in India thereby making it the market leader in the domestic
market.
Firewall Reconciliation 3
COMPANY ACHIEVEMENTS & AWARDS
2011
 Awarded the Excellence Award for Telecommunication by Geospacial World
Forum 2011.
 Awarded as the Global Gamechanger, Innovative VAS provider, Customer
Experience Enhancement at the ET Telecom awards 2011.
 Ranked 6th in Asia-Pacific and 5th in India in the list of ‘Top 25 Companies for
Leaders Globally’.
Firewall Reconciliation 4
COMPANY ACHIEVEMENTS & AWARDS
Continued …
2012
 Beyond Excellence – Improvement of Voice Network Quality by National award
on Economics of Quality by Quality Council of India (QCI).
 ‘Har Ek Friend Zaroori Hota Hai’ – One of the most loved campaigns was the
second most awarded campaign at the Creative ABBY Awards! It won total of 7
metals including 2 gold, 4 silver and 1 bronze.
 ‘Product of the Year’ award for Airtel Digital TV (HD).
Firewall Reconciliation 5
PROJECT UNDERTAKEN
Firewall Reconciliation 6
FIREWALL RECONCILIATION
 A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communications.
 There are several types of firewall techniques:
Packet filter
Application gateway
Circuit-level gateway
Proxy server
Firewall Reconciliation 7
FUNCTIONS OF FIREWALL
 A firewall is a dedicated appliance, or software running on a computer, which
inspects network traffic passing through it, and denies or permits passage
based on a set of rules.
 It is normally placed between a protected network and an unprotected
network and acts like a gate to protect assets to ensure that nothing private
goes out and nothing malicious comes in.
Firewall Reconciliation 8
SOFTWARES USED FOR FIREWALL
RECONCILIATION
SOFTWARES BEING USED:
 CHECKPOINT SMART DASHBOARD.
 CHECKPOINT SMARTVIEW MONITOR.
 CHECKPOINT SMARTVIEW TRACKER.
 PUTTY SOFTWARE.
 SUBNET CALCULATOR.
Firewall Reconciliation 9
SOFTWARES BEING USED
CHECKPOINT SMART DASHBOARD
 Smart Dashboard is a single, comprehensive user interface for defining and
managing multiple elements of a security policy: firewall security, VPNs,
network address translation, web security.
CHECKPOINT SMARTVIEW MONITOR
 SmartView Monitor centrally monitors Check Point and OPSEC devices,
presenting a complete visual picture of changes to gateways, remote users
and security activities. This enables administrators to immediately identify
changes in network traffic flow patterns that may signify malicious activity.
Firewall Reconciliation 10
Firewall Reconciliation 11
Firewall Reconciliation 12
SOFTWARES BEING USED
Continued …
SMARTVIEW TRACKER
 Administrators can use SmartView Tracker in order to ensure their products
are operating properly, troubleshoot system and security issues, gather
information for legal or audit purposes, and generate reports to analyze
network traffic patterns.
SUBNET MASK CALCULATOR
 With subnet mask you can split your network into subnets. Enter your IP
address and play with the second netmask until the result matches your need.
Firewall Reconciliation 13
Firewall Reconciliation 14
FIREWALL RECONCILIATION STEPS
 In Firewall we apply rules to the network. These rules are applied so as to
increase the security of the network. We have restricted the users from
accessing the network by applying these rules in the firewall.
 These rules are applied to the whole network, though only a few IP are being
used in that network. So with this, it gives the other IP to use the service like
http, Telnet etc.
 Firewall reconciliation means dividing the rules on the network. By doing
reconciliation we can apply the same rule on the that we want them to use
the service and not the whole network.
Firewall Reconciliation 15
FIREWALL RECONCILIATION
Continued …
RULEBASE AT PRESENT
Firewall Reconciliation 16
SOURCE DESTINATION PORT ACTION
IT Tech IP 80 Accept
Tech IT IP 8080 Accept
Tech Tech DMZ 443 Accept
Tech Internet 8080 Accept
Tech network subnets
group for circle
10.X.X.X Any Accept
Any Any Any Drop
FIREWALL RECONCILIATION STEPS
Continued …
 We do firewall reconciliation by taking logs from the firewall, from which we
can come to know about the all the IPs are trying to use the service and who
are using that service. From there we can take the necessary IPs and delete
the unnecessary ones.
 With this reconciliation the network security is increased as only the few IPs
are allowed to use that particular service, thus avoiding the other IPs to use
the same service to access the routes switches.
Firewall Reconciliation 17
FIREWALL RECONCILIATION
Continued …
PROPOSED RULEBASE
Firewall Reconciliation 18
SOURCE DESTINATION PORT ACTION
IT Tech subnets inside XX Accept
IT Tech subnets DMZ XXX Accept
Tech subnets Tech subnets DMZ /
internet
XXX Accept
Tech DMZ Tech subnets XXX Accept
Tech DMZ Tech DMZ XXX Accept
10.X.X.X Tech NW subnets
group for circle
Any Drop
Tech NW subnets group
for circle
Any Accept
Any Any Any Drop
WHATSUP GOLD
Firewall Reconciliation 19
ACTIVITY PERFORMED
 Requirement: Installation of two new Cisco 3750 Switches (in stack)
 Host name: PUN_AS14_MOH
 IP Address: 10.20.6.29
 Description: Presently PUN_AS09_MOH (10.20.6.25) & PUN_AS10_MOH
(10.20.6.26) are directly connected to PUN_CS01_MOH (10.20.6.2) &
PUN_CS02_MOH (10.20.6.3) respectively.
 Requirement is to connect the new Cisco 3750 switches in stack & connect
the direct cables from Core switches to new switch as per attached PPT.
PUN_AS09_MOH & PUN_AS10_MOH will take the connectivity from this new
switch.
Firewall Reconciliation 20
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
Firewall Reconciliation 21
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
INTERNETWORKING
 Internetworking involves connecting two or more computer networks via
gateways using a common routing technology. The result is called an
internetwork (often shortened to internet).
 The original term for an internetwork was catenet. Internetworking started as
a way to connect disparate types of networking technology, but it became
widespread through the developing need to connect two or more local area
networks via some sort of wide area network.
Firewall Reconciliation 22
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
Firewall Reconciliation 23
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
ETHERNET CABLING
 Straight-through cable
• Host to switch or hub
• Router to switch or hub
 Crossover cable
• Switch to switch
• Hub to hub
• Host to host
• Hub to switch
• Router direct to host
Firewall Reconciliation 24
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
ETHERNET CABLING Continued …
 Rolled cable
• For display
Firewall Reconciliation 25
IP ADDRESS CLASSES
 Class A addresses begin with 0xxx, or 1 to 126 decimal.
 Class B addresses begin with 10xx, or 128 to 191 decimal.
 Class C addresses begin with 110x, or 192 to 223 decimal.
 Class D addresses begin with 1110, or 224 to 239 decimal.
 Class E addresses begin with 1111, or 240 to 254 decimal.
Firewall Reconciliation 26
SUBNETTING
 204.17.5.0 255.255.255.224 host address range 1 to 30
 204.17.5.32 255.255.255.224 host address range 33 to 62
 204.17.5.64 255.255.255.224 host address range 65 to 94
 204.17.5.96 255.255.255.224 host address range 97 to 126
 204.17.5.128 255.255.255.224 host address range 129 to 158
 204.17.5.160 255.255.255.224 host address range 161 to 190
 204.17.5.192 255.255.255.224 host address range 193 to 222
 204.17.5.224 255.255.255.224 host address range 225 to 254
Firewall Reconciliation 27
BIBLIOGRAPHY
 BOOKS
• CCNA By Todd Lamle
• Networking for dummies
• CCENT by Matt Walker
 INTERNET
• Wikipedia.com
• Computerhope.com
• computer.howstuffworks.com
• airtel.in
• checkpoint.com
Firewall Reconciliation 28
Thank You
Firewall Reconciliation 29

More Related Content

What's hot

Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterMITRE ATT&CK
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...TI Safe
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE - ATT&CKcon
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK
 
BAE Systems IFF Program Overview
BAE Systems IFF Program OverviewBAE Systems IFF Program Overview
BAE Systems IFF Program OverviewWilliam Banfi
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Moti Sagey מוטי שגיא
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceMITRE ATT&CK
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security CertificationsNithin Sai
 

What's hot (20)

Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
BAE Systems IFF Program Overview
BAE Systems IFF Program OverviewBAE Systems IFF Program Overview
BAE Systems IFF Program Overview
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
 
teste de invasão
teste de invasãoteste de invasão
teste de invasão
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 

Viewers also liked

Viewers also liked (12)

Airtel
AirtelAirtel
Airtel
 
Airtel
AirtelAirtel
Airtel
 
Report on airtel
Report on airtelReport on airtel
Report on airtel
 
Network cables-Imdad Hussain
Network cables-Imdad HussainNetwork cables-Imdad Hussain
Network cables-Imdad Hussain
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
ccna project
ccna projectccna project
ccna project
 
Airtel Report
Airtel ReportAirtel Report
Airtel Report
 
A training project report on airtel
A training project report on airtelA training project report on airtel
A training project report on airtel
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Final report firewall reconciliation

Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overviewRajesh Kapoor
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfRayanneAguiar4
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017Jiunn-Jer Sun
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxManojGowdaKb
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFEmulex Corporation
 
Simplifying your network management using software tools
Simplifying your network management using software toolsSimplifying your network management using software tools
Simplifying your network management using software toolsWestermo Network Technologies
 

Similar to Final report firewall reconciliation (20)

Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overview
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Corporation Tech
Corporation TechCorporation Tech
Corporation Tech
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
Simplifying your network management using software tools
Simplifying your network management using software toolsSimplifying your network management using software tools
Simplifying your network management using software tools
 
V P N
V P NV P N
V P N
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Final report firewall reconciliation

  • 1. Firewall Reconciliation (Six Months Industrial Training Report) By- Gurjan Singh Roll no.- 1054 Firewall Reconciliation 1
  • 3. COMPANY PROFILE  Bharti Enterprises has been at the forefront of technology and has revolutionized telecommunications with its world-class products and services.  Today Bharti Teletech is the major PTT supplier in South Asia. It has ISO 9002 accreditation and also an OEM for Sprint Corporation and Siemens.  It’s range of products marketed under the brand name Beetel constitute a 30% market share in India thereby making it the market leader in the domestic market. Firewall Reconciliation 3
  • 4. COMPANY ACHIEVEMENTS & AWARDS 2011  Awarded the Excellence Award for Telecommunication by Geospacial World Forum 2011.  Awarded as the Global Gamechanger, Innovative VAS provider, Customer Experience Enhancement at the ET Telecom awards 2011.  Ranked 6th in Asia-Pacific and 5th in India in the list of ‘Top 25 Companies for Leaders Globally’. Firewall Reconciliation 4
  • 5. COMPANY ACHIEVEMENTS & AWARDS Continued … 2012  Beyond Excellence – Improvement of Voice Network Quality by National award on Economics of Quality by Quality Council of India (QCI).  ‘Har Ek Friend Zaroori Hota Hai’ – One of the most loved campaigns was the second most awarded campaign at the Creative ABBY Awards! It won total of 7 metals including 2 gold, 4 silver and 1 bronze.  ‘Product of the Year’ award for Airtel Digital TV (HD). Firewall Reconciliation 5
  • 7. FIREWALL RECONCILIATION  A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.  There are several types of firewall techniques: Packet filter Application gateway Circuit-level gateway Proxy server Firewall Reconciliation 7
  • 8. FUNCTIONS OF FIREWALL  A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.  It is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in. Firewall Reconciliation 8
  • 9. SOFTWARES USED FOR FIREWALL RECONCILIATION SOFTWARES BEING USED:  CHECKPOINT SMART DASHBOARD.  CHECKPOINT SMARTVIEW MONITOR.  CHECKPOINT SMARTVIEW TRACKER.  PUTTY SOFTWARE.  SUBNET CALCULATOR. Firewall Reconciliation 9
  • 10. SOFTWARES BEING USED CHECKPOINT SMART DASHBOARD  Smart Dashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security. CHECKPOINT SMARTVIEW MONITOR  SmartView Monitor centrally monitors Check Point and OPSEC devices, presenting a complete visual picture of changes to gateways, remote users and security activities. This enables administrators to immediately identify changes in network traffic flow patterns that may signify malicious activity. Firewall Reconciliation 10
  • 13. SOFTWARES BEING USED Continued … SMARTVIEW TRACKER  Administrators can use SmartView Tracker in order to ensure their products are operating properly, troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. SUBNET MASK CALCULATOR  With subnet mask you can split your network into subnets. Enter your IP address and play with the second netmask until the result matches your need. Firewall Reconciliation 13
  • 15. FIREWALL RECONCILIATION STEPS  In Firewall we apply rules to the network. These rules are applied so as to increase the security of the network. We have restricted the users from accessing the network by applying these rules in the firewall.  These rules are applied to the whole network, though only a few IP are being used in that network. So with this, it gives the other IP to use the service like http, Telnet etc.  Firewall reconciliation means dividing the rules on the network. By doing reconciliation we can apply the same rule on the that we want them to use the service and not the whole network. Firewall Reconciliation 15
  • 16. FIREWALL RECONCILIATION Continued … RULEBASE AT PRESENT Firewall Reconciliation 16 SOURCE DESTINATION PORT ACTION IT Tech IP 80 Accept Tech IT IP 8080 Accept Tech Tech DMZ 443 Accept Tech Internet 8080 Accept Tech network subnets group for circle 10.X.X.X Any Accept Any Any Any Drop
  • 17. FIREWALL RECONCILIATION STEPS Continued …  We do firewall reconciliation by taking logs from the firewall, from which we can come to know about the all the IPs are trying to use the service and who are using that service. From there we can take the necessary IPs and delete the unnecessary ones.  With this reconciliation the network security is increased as only the few IPs are allowed to use that particular service, thus avoiding the other IPs to use the same service to access the routes switches. Firewall Reconciliation 17
  • 18. FIREWALL RECONCILIATION Continued … PROPOSED RULEBASE Firewall Reconciliation 18 SOURCE DESTINATION PORT ACTION IT Tech subnets inside XX Accept IT Tech subnets DMZ XXX Accept Tech subnets Tech subnets DMZ / internet XXX Accept Tech DMZ Tech subnets XXX Accept Tech DMZ Tech DMZ XXX Accept 10.X.X.X Tech NW subnets group for circle Any Drop Tech NW subnets group for circle Any Accept Any Any Any Drop
  • 20. ACTIVITY PERFORMED  Requirement: Installation of two new Cisco 3750 Switches (in stack)  Host name: PUN_AS14_MOH  IP Address: 10.20.6.29  Description: Presently PUN_AS09_MOH (10.20.6.25) & PUN_AS10_MOH (10.20.6.26) are directly connected to PUN_CS01_MOH (10.20.6.2) & PUN_CS02_MOH (10.20.6.3) respectively.  Requirement is to connect the new Cisco 3750 switches in stack & connect the direct cables from Core switches to new switch as per attached PPT. PUN_AS09_MOH & PUN_AS10_MOH will take the connectivity from this new switch. Firewall Reconciliation 20
  • 21. DETAILED ANALYSIS OF INDIVIDUAL MODULE Firewall Reconciliation 21
  • 22. DETAILED ANALYSIS OF INDIVIDUAL MODULE INTERNETWORKING  Internetworking involves connecting two or more computer networks via gateways using a common routing technology. The result is called an internetwork (often shortened to internet).  The original term for an internetwork was catenet. Internetworking started as a way to connect disparate types of networking technology, but it became widespread through the developing need to connect two or more local area networks via some sort of wide area network. Firewall Reconciliation 22
  • 23. DETAILED ANALYSIS OF INDIVIDUAL MODULE Firewall Reconciliation 23
  • 24. DETAILED ANALYSIS OF INDIVIDUAL MODULE ETHERNET CABLING  Straight-through cable • Host to switch or hub • Router to switch or hub  Crossover cable • Switch to switch • Hub to hub • Host to host • Hub to switch • Router direct to host Firewall Reconciliation 24
  • 25. DETAILED ANALYSIS OF INDIVIDUAL MODULE ETHERNET CABLING Continued …  Rolled cable • For display Firewall Reconciliation 25
  • 26. IP ADDRESS CLASSES  Class A addresses begin with 0xxx, or 1 to 126 decimal.  Class B addresses begin with 10xx, or 128 to 191 decimal.  Class C addresses begin with 110x, or 192 to 223 decimal.  Class D addresses begin with 1110, or 224 to 239 decimal.  Class E addresses begin with 1111, or 240 to 254 decimal. Firewall Reconciliation 26
  • 27. SUBNETTING  204.17.5.0 255.255.255.224 host address range 1 to 30  204.17.5.32 255.255.255.224 host address range 33 to 62  204.17.5.64 255.255.255.224 host address range 65 to 94  204.17.5.96 255.255.255.224 host address range 97 to 126  204.17.5.128 255.255.255.224 host address range 129 to 158  204.17.5.160 255.255.255.224 host address range 161 to 190  204.17.5.192 255.255.255.224 host address range 193 to 222  204.17.5.224 255.255.255.224 host address range 225 to 254 Firewall Reconciliation 27
  • 28. BIBLIOGRAPHY  BOOKS • CCNA By Todd Lamle • Networking for dummies • CCENT by Matt Walker  INTERNET • Wikipedia.com • Computerhope.com • computer.howstuffworks.com • airtel.in • checkpoint.com Firewall Reconciliation 28