What is Firewall?
A firewall is a security system designed to monitor and control incoming and
outgoing network traffic based on predetermined security rules. Its primary function is
to create a barrier between a trusted internal network and untrusted external networks,
such as the internet, to protect against unauthorized access, cyberattacks, and data
breaches.
Firewalls can be implemented as either software or hardware (or a combination of
both) and come in various forms, including:
1. Packet-Filtering Firewalls: These analyze packets of data being sent to or
from a network and allow or block them based on a set of rules, such as IP
addresses, ports, or protocols.
2. Stateful Inspection Firewalls: These track the state of active connections and
make decisions based on the context of the traffic, not just individual packets.
3. Proxy Firewalls: These act as intermediaries between the internal network
and the internet, making requests on behalf of the user and then forwarding
responses back.
4. Next-Generation Firewalls (NGFW): These offer more advanced features,
such as application awareness, intrusion prevention systems (IPS), and deep
packet inspection, to provide more comprehensive security.
5. Cloud Firewalls: These are hosted in the cloud and are typically used to
protect cloud-based infrastructure and services.
Firewalls are a fundamental component of network security, helping to protect against
malicious attacks, unauthorized access, and data exfiltration.
Step 1: Build the Network Topology
1. Open Cisco Packet Tracer.
2. Add the following devices:
● One Server.
● One switch.
● Three Pcs. (to simulate hosts in different networks).
Step 2: Configure IP Addresses
Assign appropriate IP addresses to all PCs and the Server.
Step 3: Configure the Firewall on the Server
1. Select Server0, then navigate to the Desktop tab.
2. Click on Firewall (IPv4).
3. Enable the firewall services.
4. To block ICMP traffic (e.g., pings):
● Deny the ICMP protocol.
● Set the Remote IP to 0.0.0.0 and the Remote Wildcard Mask
to 255.255.255.255.
5. To allow general IP traffic:
● Permit the IP protocol.
● Set the Remote IP to 0.0.0.0 and the Remote Wildcard Mask
to 255.255.255.255.
6. Add the configuration.
Step 4: Verify Network Configuration
1. To verify that ICMP traffic is blocked:
● On PC1, open the Command Prompt.
● Execute the command ping 10.0.0.1.
● Observe that no replies are received, indicating that ICMP packets are being
successfully blocked by the firewall.
To check that web traffic is allowed:
● Open a web browser on any PC.
● Enter the IP address of the server in the URL bar.
● Confirm that the server’s web page loads, demonstrating that HTTP traffic is
permitted.
By following these steps, you have successfully configured a basic firewall in Cisco
Packet Tracer, effectively blocking specific network traffic while allowing others.
Hope this walkthrough helps you successfully configure a basic firewall in Cisco
Packet Tracer!