SlideShare a Scribd company logo
1 of 29
Firewall Reconciliation
(Six Months Industrial Training Report)
By- Gurjan Singh
Roll no.- 1054
Firewall Reconciliation 1
COMPANY PROFILE
Firewall Reconciliation
COMPANY PROFILE
 Bharti Enterprises has been at the forefront of technology and has
revolutionized telecommunications with its world-class products and services.
 Today Bharti Teletech is the major PTT supplier in South Asia. It has ISO 9002
accreditation and also an OEM for Sprint Corporation and Siemens.
 It’s range of products marketed under the brand name Beetel constitute a 30%
market share in India thereby making it the market leader in the domestic
market.
Firewall Reconciliation 3
COMPANY ACHIEVEMENTS & AWARDS
2011
 Awarded the Excellence Award for Telecommunication by Geospacial World
Forum 2011.
 Awarded as the Global Gamechanger, Innovative VAS provider, Customer
Experience Enhancement at the ET Telecom awards 2011.
 Ranked 6th in Asia-Pacific and 5th in India in the list of ‘Top 25 Companies for
Leaders Globally’.
Firewall Reconciliation 4
COMPANY ACHIEVEMENTS & AWARDS
Continued …
2012
 Beyond Excellence – Improvement of Voice Network Quality by National award
on Economics of Quality by Quality Council of India (QCI).
 ‘Har Ek Friend Zaroori Hota Hai’ – One of the most loved campaigns was the
second most awarded campaign at the Creative ABBY Awards! It won total of 7
metals including 2 gold, 4 silver and 1 bronze.
 ‘Product of the Year’ award for Airtel Digital TV (HD).
Firewall Reconciliation 5
PROJECT UNDERTAKEN
Firewall Reconciliation 6
FIREWALL RECONCILIATION
 A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communications.
 There are several types of firewall techniques:
Packet filter
Application gateway
Circuit-level gateway
Proxy server
Firewall Reconciliation 7
FUNCTIONS OF FIREWALL
 A firewall is a dedicated appliance, or software running on a computer, which
inspects network traffic passing through it, and denies or permits passage
based on a set of rules.
 It is normally placed between a protected network and an unprotected
network and acts like a gate to protect assets to ensure that nothing private
goes out and nothing malicious comes in.
Firewall Reconciliation 8
SOFTWARES USED FOR FIREWALL
RECONCILIATION
SOFTWARES BEING USED:
 CHECKPOINT SMART DASHBOARD.
 CHECKPOINT SMARTVIEW MONITOR.
 CHECKPOINT SMARTVIEW TRACKER.
 PUTTY SOFTWARE.
 SUBNET CALCULATOR.
Firewall Reconciliation 9
SOFTWARES BEING USED
CHECKPOINT SMART DASHBOARD
 Smart Dashboard is a single, comprehensive user interface for defining and
managing multiple elements of a security policy: firewall security, VPNs,
network address translation, web security.
CHECKPOINT SMARTVIEW MONITOR
 SmartView Monitor centrally monitors Check Point and OPSEC devices,
presenting a complete visual picture of changes to gateways, remote users
and security activities. This enables administrators to immediately identify
changes in network traffic flow patterns that may signify malicious activity.
Firewall Reconciliation 10
Firewall Reconciliation 11
Firewall Reconciliation 12
SOFTWARES BEING USED
Continued …
SMARTVIEW TRACKER
 Administrators can use SmartView Tracker in order to ensure their products
are operating properly, troubleshoot system and security issues, gather
information for legal or audit purposes, and generate reports to analyze
network traffic patterns.
SUBNET MASK CALCULATOR
 With subnet mask you can split your network into subnets. Enter your IP
address and play with the second netmask until the result matches your need.
Firewall Reconciliation 13
Firewall Reconciliation 14
FIREWALL RECONCILIATION STEPS
 In Firewall we apply rules to the network. These rules are applied so as to
increase the security of the network. We have restricted the users from
accessing the network by applying these rules in the firewall.
 These rules are applied to the whole network, though only a few IP are being
used in that network. So with this, it gives the other IP to use the service like
http, Telnet etc.
 Firewall reconciliation means dividing the rules on the network. By doing
reconciliation we can apply the same rule on the that we want them to use
the service and not the whole network.
Firewall Reconciliation 15
FIREWALL RECONCILIATION
Continued …
RULEBASE AT PRESENT
Firewall Reconciliation 16
SOURCE DESTINATION PORT ACTION
IT Tech IP 80 Accept
Tech IT IP 8080 Accept
Tech Tech DMZ 443 Accept
Tech Internet 8080 Accept
Tech network subnets
group for circle
10.X.X.X Any Accept
Any Any Any Drop
FIREWALL RECONCILIATION STEPS
Continued …
 We do firewall reconciliation by taking logs from the firewall, from which we
can come to know about the all the IPs are trying to use the service and who
are using that service. From there we can take the necessary IPs and delete
the unnecessary ones.
 With this reconciliation the network security is increased as only the few IPs
are allowed to use that particular service, thus avoiding the other IPs to use
the same service to access the routes switches.
Firewall Reconciliation 17
FIREWALL RECONCILIATION
Continued …
PROPOSED RULEBASE
Firewall Reconciliation 18
SOURCE DESTINATION PORT ACTION
IT Tech subnets inside XX Accept
IT Tech subnets DMZ XXX Accept
Tech subnets Tech subnets DMZ /
internet
XXX Accept
Tech DMZ Tech subnets XXX Accept
Tech DMZ Tech DMZ XXX Accept
10.X.X.X Tech NW subnets
group for circle
Any Drop
Tech NW subnets group
for circle
Any Accept
Any Any Any Drop
WHATSUP GOLD
Firewall Reconciliation 19
ACTIVITY PERFORMED
 Requirement: Installation of two new Cisco 3750 Switches (in stack)
 Host name: PUN_AS14_MOH
 IP Address: 10.20.6.29
 Description: Presently PUN_AS09_MOH (10.20.6.25) & PUN_AS10_MOH
(10.20.6.26) are directly connected to PUN_CS01_MOH (10.20.6.2) &
PUN_CS02_MOH (10.20.6.3) respectively.
 Requirement is to connect the new Cisco 3750 switches in stack & connect
the direct cables from Core switches to new switch as per attached PPT.
PUN_AS09_MOH & PUN_AS10_MOH will take the connectivity from this new
switch.
Firewall Reconciliation 20
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
Firewall Reconciliation 21
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
INTERNETWORKING
 Internetworking involves connecting two or more computer networks via
gateways using a common routing technology. The result is called an
internetwork (often shortened to internet).
 The original term for an internetwork was catenet. Internetworking started as
a way to connect disparate types of networking technology, but it became
widespread through the developing need to connect two or more local area
networks via some sort of wide area network.
Firewall Reconciliation 22
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
Firewall Reconciliation 23
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
ETHERNET CABLING
 Straight-through cable
• Host to switch or hub
• Router to switch or hub
 Crossover cable
• Switch to switch
• Hub to hub
• Host to host
• Hub to switch
• Router direct to host
Firewall Reconciliation 24
DETAILED ANALYSIS OF INDIVIDUAL
MODULE
ETHERNET CABLING Continued …
 Rolled cable
• For display
Firewall Reconciliation 25
IP ADDRESS CLASSES
 Class A addresses begin with 0xxx, or 1 to 126 decimal.
 Class B addresses begin with 10xx, or 128 to 191 decimal.
 Class C addresses begin with 110x, or 192 to 223 decimal.
 Class D addresses begin with 1110, or 224 to 239 decimal.
 Class E addresses begin with 1111, or 240 to 254 decimal.
Firewall Reconciliation 26
SUBNETTING
 204.17.5.0 255.255.255.224 host address range 1 to 30
 204.17.5.32 255.255.255.224 host address range 33 to 62
 204.17.5.64 255.255.255.224 host address range 65 to 94
 204.17.5.96 255.255.255.224 host address range 97 to 126
 204.17.5.128 255.255.255.224 host address range 129 to 158
 204.17.5.160 255.255.255.224 host address range 161 to 190
 204.17.5.192 255.255.255.224 host address range 193 to 222
 204.17.5.224 255.255.255.224 host address range 225 to 254
Firewall Reconciliation 27
BIBLIOGRAPHY
 BOOKS
• CCNA By Todd Lamle
• Networking for dummies
• CCENT by Matt Walker
 INTERNET
• Wikipedia.com
• Computerhope.com
• computer.howstuffworks.com
• airtel.in
• checkpoint.com
Firewall Reconciliation 28
Thank You
Firewall Reconciliation 29

More Related Content

What's hot

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Building a Modern Data Architecture on AWS - Webinar
Building a Modern Data Architecture on AWS - WebinarBuilding a Modern Data Architecture on AWS - Webinar
Building a Modern Data Architecture on AWS - WebinarAmazon Web Services
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedAlbert Hoitingh
 

What's hot (20)

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Zero Trust : How to Get Started
Zero Trust : How to Get StartedZero Trust : How to Get Started
Zero Trust : How to Get Started
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Building a Modern Data Architecture on AWS - Webinar
Building a Modern Data Architecture on AWS - WebinarBuilding a Modern Data Architecture on AWS - Webinar
Building a Modern Data Architecture on AWS - Webinar
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 

Viewers also liked

Viewers also liked (12)

Airtel
AirtelAirtel
Airtel
 
Airtel
AirtelAirtel
Airtel
 
Report on airtel
Report on airtelReport on airtel
Report on airtel
 
Network cables-Imdad Hussain
Network cables-Imdad HussainNetwork cables-Imdad Hussain
Network cables-Imdad Hussain
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
ccna project
ccna projectccna project
ccna project
 
Airtel Report
Airtel ReportAirtel Report
Airtel Report
 
A training project report on airtel
A training project report on airtelA training project report on airtel
A training project report on airtel
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Final report firewall reconciliation

Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overviewRajesh Kapoor
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfRayanneAguiar4
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017Jiunn-Jer Sun
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxManojGowdaKb
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFEmulex Corporation
 
Simplifying your network management using software tools
Simplifying your network management using software toolsSimplifying your network management using software tools
Simplifying your network management using software toolsWestermo Network Technologies
 

Similar to Final report firewall reconciliation (20)

Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overview
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Corporation Tech
Corporation TechCorporation Tech
Corporation Tech
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
Simplifying your network management using software tools
Simplifying your network management using software toolsSimplifying your network management using software tools
Simplifying your network management using software tools
 
V P N
V P NV P N
V P N
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Final report firewall reconciliation

  • 1. Firewall Reconciliation (Six Months Industrial Training Report) By- Gurjan Singh Roll no.- 1054 Firewall Reconciliation 1
  • 3. COMPANY PROFILE  Bharti Enterprises has been at the forefront of technology and has revolutionized telecommunications with its world-class products and services.  Today Bharti Teletech is the major PTT supplier in South Asia. It has ISO 9002 accreditation and also an OEM for Sprint Corporation and Siemens.  It’s range of products marketed under the brand name Beetel constitute a 30% market share in India thereby making it the market leader in the domestic market. Firewall Reconciliation 3
  • 4. COMPANY ACHIEVEMENTS & AWARDS 2011  Awarded the Excellence Award for Telecommunication by Geospacial World Forum 2011.  Awarded as the Global Gamechanger, Innovative VAS provider, Customer Experience Enhancement at the ET Telecom awards 2011.  Ranked 6th in Asia-Pacific and 5th in India in the list of ‘Top 25 Companies for Leaders Globally’. Firewall Reconciliation 4
  • 5. COMPANY ACHIEVEMENTS & AWARDS Continued … 2012  Beyond Excellence – Improvement of Voice Network Quality by National award on Economics of Quality by Quality Council of India (QCI).  ‘Har Ek Friend Zaroori Hota Hai’ – One of the most loved campaigns was the second most awarded campaign at the Creative ABBY Awards! It won total of 7 metals including 2 gold, 4 silver and 1 bronze.  ‘Product of the Year’ award for Airtel Digital TV (HD). Firewall Reconciliation 5
  • 7. FIREWALL RECONCILIATION  A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.  There are several types of firewall techniques: Packet filter Application gateway Circuit-level gateway Proxy server Firewall Reconciliation 7
  • 8. FUNCTIONS OF FIREWALL  A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.  It is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in. Firewall Reconciliation 8
  • 9. SOFTWARES USED FOR FIREWALL RECONCILIATION SOFTWARES BEING USED:  CHECKPOINT SMART DASHBOARD.  CHECKPOINT SMARTVIEW MONITOR.  CHECKPOINT SMARTVIEW TRACKER.  PUTTY SOFTWARE.  SUBNET CALCULATOR. Firewall Reconciliation 9
  • 10. SOFTWARES BEING USED CHECKPOINT SMART DASHBOARD  Smart Dashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security. CHECKPOINT SMARTVIEW MONITOR  SmartView Monitor centrally monitors Check Point and OPSEC devices, presenting a complete visual picture of changes to gateways, remote users and security activities. This enables administrators to immediately identify changes in network traffic flow patterns that may signify malicious activity. Firewall Reconciliation 10
  • 13. SOFTWARES BEING USED Continued … SMARTVIEW TRACKER  Administrators can use SmartView Tracker in order to ensure their products are operating properly, troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. SUBNET MASK CALCULATOR  With subnet mask you can split your network into subnets. Enter your IP address and play with the second netmask until the result matches your need. Firewall Reconciliation 13
  • 15. FIREWALL RECONCILIATION STEPS  In Firewall we apply rules to the network. These rules are applied so as to increase the security of the network. We have restricted the users from accessing the network by applying these rules in the firewall.  These rules are applied to the whole network, though only a few IP are being used in that network. So with this, it gives the other IP to use the service like http, Telnet etc.  Firewall reconciliation means dividing the rules on the network. By doing reconciliation we can apply the same rule on the that we want them to use the service and not the whole network. Firewall Reconciliation 15
  • 16. FIREWALL RECONCILIATION Continued … RULEBASE AT PRESENT Firewall Reconciliation 16 SOURCE DESTINATION PORT ACTION IT Tech IP 80 Accept Tech IT IP 8080 Accept Tech Tech DMZ 443 Accept Tech Internet 8080 Accept Tech network subnets group for circle 10.X.X.X Any Accept Any Any Any Drop
  • 17. FIREWALL RECONCILIATION STEPS Continued …  We do firewall reconciliation by taking logs from the firewall, from which we can come to know about the all the IPs are trying to use the service and who are using that service. From there we can take the necessary IPs and delete the unnecessary ones.  With this reconciliation the network security is increased as only the few IPs are allowed to use that particular service, thus avoiding the other IPs to use the same service to access the routes switches. Firewall Reconciliation 17
  • 18. FIREWALL RECONCILIATION Continued … PROPOSED RULEBASE Firewall Reconciliation 18 SOURCE DESTINATION PORT ACTION IT Tech subnets inside XX Accept IT Tech subnets DMZ XXX Accept Tech subnets Tech subnets DMZ / internet XXX Accept Tech DMZ Tech subnets XXX Accept Tech DMZ Tech DMZ XXX Accept 10.X.X.X Tech NW subnets group for circle Any Drop Tech NW subnets group for circle Any Accept Any Any Any Drop
  • 20. ACTIVITY PERFORMED  Requirement: Installation of two new Cisco 3750 Switches (in stack)  Host name: PUN_AS14_MOH  IP Address: 10.20.6.29  Description: Presently PUN_AS09_MOH (10.20.6.25) & PUN_AS10_MOH (10.20.6.26) are directly connected to PUN_CS01_MOH (10.20.6.2) & PUN_CS02_MOH (10.20.6.3) respectively.  Requirement is to connect the new Cisco 3750 switches in stack & connect the direct cables from Core switches to new switch as per attached PPT. PUN_AS09_MOH & PUN_AS10_MOH will take the connectivity from this new switch. Firewall Reconciliation 20
  • 21. DETAILED ANALYSIS OF INDIVIDUAL MODULE Firewall Reconciliation 21
  • 22. DETAILED ANALYSIS OF INDIVIDUAL MODULE INTERNETWORKING  Internetworking involves connecting two or more computer networks via gateways using a common routing technology. The result is called an internetwork (often shortened to internet).  The original term for an internetwork was catenet. Internetworking started as a way to connect disparate types of networking technology, but it became widespread through the developing need to connect two or more local area networks via some sort of wide area network. Firewall Reconciliation 22
  • 23. DETAILED ANALYSIS OF INDIVIDUAL MODULE Firewall Reconciliation 23
  • 24. DETAILED ANALYSIS OF INDIVIDUAL MODULE ETHERNET CABLING  Straight-through cable • Host to switch or hub • Router to switch or hub  Crossover cable • Switch to switch • Hub to hub • Host to host • Hub to switch • Router direct to host Firewall Reconciliation 24
  • 25. DETAILED ANALYSIS OF INDIVIDUAL MODULE ETHERNET CABLING Continued …  Rolled cable • For display Firewall Reconciliation 25
  • 26. IP ADDRESS CLASSES  Class A addresses begin with 0xxx, or 1 to 126 decimal.  Class B addresses begin with 10xx, or 128 to 191 decimal.  Class C addresses begin with 110x, or 192 to 223 decimal.  Class D addresses begin with 1110, or 224 to 239 decimal.  Class E addresses begin with 1111, or 240 to 254 decimal. Firewall Reconciliation 26
  • 27. SUBNETTING  204.17.5.0 255.255.255.224 host address range 1 to 30  204.17.5.32 255.255.255.224 host address range 33 to 62  204.17.5.64 255.255.255.224 host address range 65 to 94  204.17.5.96 255.255.255.224 host address range 97 to 126  204.17.5.128 255.255.255.224 host address range 129 to 158  204.17.5.160 255.255.255.224 host address range 161 to 190  204.17.5.192 255.255.255.224 host address range 193 to 222  204.17.5.224 255.255.255.224 host address range 225 to 254 Firewall Reconciliation 27
  • 28. BIBLIOGRAPHY  BOOKS • CCNA By Todd Lamle • Networking for dummies • CCENT by Matt Walker  INTERNET • Wikipedia.com • Computerhope.com • computer.howstuffworks.com • airtel.in • checkpoint.com Firewall Reconciliation 28