Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views7 pages

Lab Instruction Firewall

A firewall is a security system that monitors and controls network traffic to protect against unauthorized access and cyberattacks. It can be implemented as software or hardware and comes in various forms, including packet-filtering, stateful inspection, proxy, next-generation, and cloud firewalls. The document also provides a step-by-step guide on configuring a basic firewall using Cisco Packet Tracer.

Uploaded by

Yadanar Lwin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

Lab Instruction Firewall

A firewall is a security system that monitors and controls network traffic to protect against unauthorized access and cyberattacks. It can be implemented as software or hardware and comes in various forms, including packet-filtering, stateful inspection, proxy, next-generation, and cloud firewalls. The document also provides a step-by-step guide on configuring a basic firewall using Cisco Packet Tracer.

Uploaded by

Yadanar Lwin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

What is Firewall?

A firewall is a security system designed to monitor and control incoming and


outgoing network traffic based on predetermined security rules. Its primary function is
to create a barrier between a trusted internal network and untrusted external networks,
such as the internet, to protect against unauthorized access, cyberattacks, and data
breaches.

Firewalls can be implemented as either software or hardware (or a combination of


both) and come in various forms, including:

1.​ Packet-Filtering Firewalls: These analyze packets of data being sent to or


from a network and allow or block them based on a set of rules, such as IP
addresses, ports, or protocols.

2.​ Stateful Inspection Firewalls: These track the state of active connections and
make decisions based on the context of the traffic, not just individual packets.

3.​ Proxy Firewalls: These act as intermediaries between the internal network
and the internet, making requests on behalf of the user and then forwarding
responses back.

4.​ Next-Generation Firewalls (NGFW): These offer more advanced features,


such as application awareness, intrusion prevention systems (IPS), and deep
packet inspection, to provide more comprehensive security.

5.​ Cloud Firewalls: These are hosted in the cloud and are typically used to
protect cloud-based infrastructure and services.

Firewalls are a fundamental component of network security, helping to protect against


malicious attacks, unauthorized access, and data exfiltration.

Step 1: Build the Network Topology

1.​ Open Cisco Packet Tracer.

2.​ Add the following devices:

●​ One Server.

●​ One switch.

●​ Three Pcs. (to simulate hosts in different networks).


Step 2: Configure IP Addresses
Assign appropriate IP addresses to all PCs and the Server.
Step 3: Configure the Firewall on the Server
1.​ Select Server0, then navigate to the Desktop tab.
2.​ Click on Firewall (IPv4).
3.​ Enable the firewall services.
4.​ To block ICMP traffic (e.g., pings):
●​ Deny the ICMP protocol.
●​ Set the Remote IP to 0.0.0.0 and the Remote Wildcard Mask
to 255.255.255.255.
5. To allow general IP traffic:
●​ Permit the IP protocol.
●​ Set the Remote IP to 0.0.0.0 and the Remote Wildcard Mask
to 255.255.255.255.
6. Add the configuration.
Step 4: Verify Network Configuration
1.​ To verify that ICMP traffic is blocked:
●​ On PC1, open the Command Prompt.
●​ Execute the command ping 10.0.0.1.
●​ Observe that no replies are received, indicating that ICMP packets are being
successfully blocked by the firewall.
To check that web traffic is allowed:
●​ Open a web browser on any PC.
●​ Enter the IP address of the server in the URL bar.
●​ Confirm that the server’s web page loads, demonstrating that HTTP traffic is
permitted.
By following these steps, you have successfully configured a basic firewall in Cisco
Packet Tracer, effectively blocking specific network traffic while allowing others.
Hope this walkthrough helps you successfully configure a basic firewall in Cisco
Packet Tracer!

You might also like