PR 12
PR 12
V Practical outcomes
Given information about installing and configuring firewall in operating system .
Page No : 1
The hardware firewall is the specialized appliances which are built to filter the packets between the
networks. Most of the common type of hardware firewalls is used to prevent an entire network or a
computer from an unauthorized access from an internet. The firewall can be used to control the data
flow in the same organizations. This firewall can also be programmed to filter the data packet based on
information which contained in a packet. The examples of the 3rd party hardware firewalls such as
Bluecoat and Barracuda.
X Precaution to be followed
1. Handle computer system and peripherals with care
Page No : 2
XI Procedure
Steps to install the firewall:
Step 1: Open any web browser.
Step 2: Search for particular firewall as per your requirement.
Step 3: Download the firewall software in your computer system.
Step 4: Install the firewall in your system.
Step 5: You have successfully installed the firewall in your desktop system.
Steps to Configure firewall:
Step 1: Secure your firewall
If an attacker is able to gain administrative access to your firewall it is “game over” for your
network security. Therefore, securing your firewall is the first and most important step of this
process. Never put a firewall into production that is not properly secured by at least the
following configuration actions:
Delete, disable, or rename any default user accounts and change all default passwords. Make
sure to use only complex and secure passwords.
If multiple administrators will manage the firewall, create additional administrator accounts with
limited privileges based on responsibilities. Never use shared user accounts.
In order to protect the valuable assets on your network, you should first identify what the assets
(for example, payment card data or patient data) are. Then plan out your network structure so
that these assets can be grouped together and placed into networks (or zones) based on similar
sensitivity level and function.
For example, all of your servers that provide services over the internet (web servers, email
servers, virtual private network (VPN) servers, etc.) should be placed into a dedicated zone that
will allow limited inbound traffic from the internet (this zone is often called a demilitarized zone
or DMZ). Servers that should not be accessed directly from the internet, such as database
servers, must be placed in internal server zones instead. Likewise, workstations, point of sale
devices, and voice over Internet protocol (VOIP) systems can usually be placed in internal
network zones.
Page No : 3
If you are using IP version 4, Internal IP addresses should be used for all of your internal
networks. Network address translation (NAT) must be configured to allow internal devices to
communicate on the Internet when necessary.
Once you have designed your network zone structure and established the corresponding IP
address scheme, you are ready to create your firewall zones and assign them to your firewall
interfaces or sub interfaces. As you build out your network infrastructure, switches that support
virtual LANs (VLANs) should be used to maintain level-2 separation between the networks.
This traffic will be permitted using firewall rules called access control lists (ACLs), which are
applied to each interface or subinterface on the firewall. Make your ACLs specific to the exact
source and/or destination IP addresses and port numbers whenever possible. At the end of every
access control list, make sure there is a “deny all” rule to filter out all unapproved traffic. Apply
both inbound and outbound ACLs to each interface and subinterface on your firewall so that
only approved traffic is allowed into and out of each zone.
To fulfill PCI DSS requirements, configure your firewall to report to your logging server, and
make sure that enough detail is included to satisfy requirement 10.2 through 10.3 of the PCI
DSS
Once you have finished testing your firewall, your firewall should be ready for production.
Always remember to keep a backup of your firewall configuration saved in a secure place so that
all of your hard work is not lost in the event of a hardware failure.
Page No : 4
XIII Observations
1. Define Firewall?
Page No : 5
1.
2.
3.
4.
Signature ofTeacher
Page No : 6