Industrial Attachment Project Report (Network) (1)
Industrial Attachment Project Report (Network) (1)
Industrial Attachment Project Report (Network) (1)
Submitted To
MD Badiuzzaman Biplob
Instructor
Department of Computer Technology
Daffodil Institute of IT, Chattogram
Submitted By
Net Fusion
Department of Computer Technology
Session: 2020-21
Batch:15th
Daffodil Institute of IT, Chattogram
Group Profile
Group Name
Net Fusion
Project Name
Network Cyber Security
Project Title
Managing website access by using IP addresses and
preventing entry to harmful websites
Course Title
Industrial Training (66681)
2
TABLE OF CONTENTS
INTRODUCTION…………………………………………………………………….1
PROJECT DESCRIPTION …………………………………………………………..2
3.1 ROUTER SETUP ……………………………………………………………….. 3
3.1.1 Router Connecting ……………………………………………………….….5
3.1.2 Accessing and Configuring Network Interfaces Using Winbox………….….6
3.1.3 Establishing a Bridge Between LAN Ports……………………………….…8
3.2 SETUP IP ADDRESSES, ROUTES AND NAT RULE ………………………....10
3.2.1 Setup IP Addresses…………………………………………………………10
3.2.2 Add Routes IP………………………………………………………………11
3.2.3 Setting up Nat Rule…………………………………………………………13
3.3 FIREWALL FILTER RULES…………………………………………………….14
3.4 CONTROLLING IP IN FILTER RULES………………………………………..14
3.4.1 Accept Rules………………………………………………………………..15
3.4.2 Drop Rules………………………………………………………………….16
3.5 CREATE ADDRESS LIST……………………………………………………….17
3.5.1 Create a New Address List………………………………………………….17
3.6 LAYER7 PROTOCOLS CONFIGURE…………………………………………..18
3.6.1 Command in Layer7 Protocols (Regexp)…………………………………...18
3.6.2 The way Layer7 Protocols Function………………………………………..19
3.7 TESTING BLOCKED WEBSITES………………………………………………20
3.7.1 There are Different Reasons to Block Websites…………………………….21
RESULTS AND DISCUSSION………………………………………………………23
CONCLUSION……………………………………………………………………….24
3
INTRODUCTION
In today’s interconnected digital world, protecting our online presence is essential. Network
cybersecurity safeguards computer networks and systems from various digital attacks, ranging
from simple phishing attempts to advanced, targeted cyberattacks. These attacks often aim to
steal sensitive data, disrupt operations, or even hold systems hostage. A crucial aspect of
network cybersecurity is risk site blocking. This practice restricts access to specific websites
or online resources through technical measures, primarily for cybersecurity purposes. It helps
protect users from harmful sites that could damage their devices or compromise sensitive
information. Site blocking can be implemented at various levels, such as network level (e.g.,
by internet service providers) or device level.
Blocking harmful websites is an essential measure for safeguarding users from various online
threats. This procedure often involves identifying and creating lists of specific domain names
or URLs that are known to host malicious content. In addition to blacklisting, organizations
can employ advanced content analysis techniques. This involves examining the content of
websites to identify certain keywords or patterns that can indicate potential dangers, such as
fraudulent schemes or harmful software.
The primary aim of these measures is to effectively prohibit users from accessing sites that
could endanger their devices and data. Many of these dangerous websites are designed to
distribute malware, which can infect computers and steal sensitive information, or to conduct
phishing scams, which trick users into revealing personal details like passwords or credit card
numbers. The consequences of accessing such websites can include identity theft, financial
loss, and significant disruptions to personal or organizational operations.
By implementing robust site-blocking strategies, both organizations and individual users can
greatly diminish their vulnerability to such cyber threats. These protective measures are critical
in preserving the confidentiality of sensitive information, ensuring the reliability of network
resources, and maintaining a secure online environment.
In summary, the use of techniques to block harmful websites is a fundamental component of a
thorough cybersecurity strategy. It plays a crucial role in defending digital assets from threats
and supports the safe and dependable functioning of network operations, ultimately fostering
a secure online experience for everyone involved.
4
PROJECT DESCRIPTION
This project aims to enhance network security by implementing a comprehensive solution that
combines IP address-based access control with web filtering capabilities. Specifically, it
involves managing website access using IP addresses to prevent users from entering harmful
websites. Each internet user has a unique IP address, which they use to access various websites.
Not all websites are appropriate for every user, especially minors, and some can present
significant risks. To address these concerns, our project aims to implement a comprehensive
system that controls access to unnecessary or harmful sites, thereby enhancing overall online
safety and creating a more secure browsing environment for users.
We will be utilizing the MikroTik RB941-2nD-TC (HAP lite TC) device, which is known for
its advanced networking capabilities. This device features a robust firewall, including Layer7
processing, which allows us to analyze data packets and block specific websites effectively
using precise command configurations. This feature is crucial for crafting a tailored web access
policy that meets our organization's needs.
The primary objectives of this project are multi-faceted. First, we plan to establish a stringent
IP address-based access control system, ensuring that only authorized users can access
specified websites. This involves configuring detailed firewall rules that permit or deny traffic
based on individual IP addresses or designated IP ranges. In addition to these access control
measures, we will implement web filtering policies that will enforce our access regulations.
This includes blocking websites categorized as malicious or phishing threats, as well as those
deemed inappropriate for our target users. By integrating a sophisticated web filtering solution,
we can proactively safeguard users from harmful online content.
Furthermore, through monitoring and reporting features provided by the MikroTik device, we
will gain insights into network usage patterns. This data will help us continuously refine our
filtering policies and access controls, ensuring they remain effective against emerging threats.
Overall, by executing this project, we aim to create a secure, user-friendly network
environment that not only protects valuable resources but also fosters a safe online experience
for all users, ultimately reducing potential risks associated with internet use.
5
METHODOLOGY
This project focuses on managing website access by utilizing IP address controls and blocking
access to potentially harmful websites. We will be using the MikroTik RB941-2nD-TC (HAP
lite TC), also known as the hAP lite, which is a compact yet powerful router suitable for small
to medium-sized networks.
To simplify our router management, we will employ the MikroTik Winbox application. This
intuitive graphical user interface (GUI) is specifically designed for MikroTik Router devices.
Winbox is recognized for its robust functionality and user-friendly design, making it accessible
for beginners while still offering advanced features for experienced network engineers.
In the following sections, you will find a detailed guide on how to effectively use Winbox to
configure and manage your MikroTik router, ensuring optimal network performance and
enhanced security measures.
3.1 Router Setup
Configuring the MikroTik RB941-2nD-TC (HAP lite TC) router requires several important
steps to ensure proper setup and functionality. First, you'll need to prepare the hardware by
unboxing the router and connecting it to a power source, followed by linking it to your internet
source via the appropriate ports.
3.1.1 Router Connecting
Plug the MikroTik RB941 router into a power source. Then, connect it to a PC or laptop to
access the configuration settings.
Figure 2: Winbox interface shows available MikroTik devices. You can connect using either the MAC
address or the IP address .
If everything is functioning properly, we can now log into the router and configure it as
needed. First, we should adjust the router's clock for accurate logging, scheduled tasks, and
network synchronization. Click on "System" in the left sidebar and then select "Clock."
Let's rename the interfaces for easier management. First, click on "Interfaces" in the left
sidebar. This will display the default names of all the interfaces. To change a name, click the
" + " icon on the interface whose name you want to edit.
imranalinisshat
Figure 5.1: Create and select LAN port a bridge interface as bridge1_LAN
Figure 6.1: Set Up IP Addresses for bridge1_LAN and ether1 WAN in Winbox
To ensure the network operates correctly, it is crucial to verify that both IP addresses are
accurately reflected in the Address List, along with their associated interfaces: bridge1_LAN
for the LAN and ether1_WAN for the WAN. This configuration not only establishes the LAN
gateway but also facilitates seamless communication between the router and external networks
through the WAN interface, thus enhancing the overall functionality and reach of the network.
3.2.2 Add Routes IP
To enable devices on the local area network (LAN) to connect to external networks, including
the Internet, it is essential to configure a default route on the router. A default route serves as
a guiding rule for the router, directing it on how to handle traffic that is destined for addresses
outside the local network.
When a device within the LAN attempts to communicate with an external address, it sends the
traffic to the router. If the router does not have a specific route for that particular address, it
will refer to the default route. This route essentially acts as a "catch-all," ensuring that any
12
outbound traffic that does not match existing routes is forwarded through the wide area
network (WAN) interface. By setting up this routing rule, we facilitate seamless
communication between devices on the LAN and the broader internet or other external
networks.
Routes List:
In WinBox, navigate to IP > Routes > Plus (+) icon. This opens the Route List window, which
displays current routes and allows us to add new ones.
Additionally, you can monitor and log traffic from specific IPs, gaining insights into user
behavior and network usage patterns.
In the following sections, we will take a closer look at the step-by-step process for setting up
IP-based filtering within your MikroTik Router’s firewall rules. This guidance will help you
customize your network settings effectively, allowing you to protect your infrastructure and
manage data flow according to your specific requirements.
3.4.1 Accept Rules
In MikroTik routers, acceptance rules play a critical role in configuring the firewall to control
network traffic effectively. These rules are essential for specifying the types of data packets
that are permitted to pass through the firewall, ensuring that only authorized traffic can access
the network. Acceptance rules typically include detailed criteria, such as source and destination
IP addresses, port numbers, and protocols (such as TCP, UDP, or ICMP). By setting these
parameters, network administrators can create granular control over the traffic flow and
enhance the security of the network.
▪ To add a new rule, click on the Plus (+) button. This will open the rule configuration
window.
▪ In the General tab, set the Chain to "Forward" to control the traffic that is being routed
through the router.
▪ Next, specify the Source Address by entering the IP addresses you want to allow (for
example, 101.10.10.3, 101.10.10.4, 101.10.10.5, and 101.10.10.6 for individual
devices).
▪ Then, go to the Action tab and set the Action to "Accept." This will permit traffic from
the specified IP addresses.
▪ Finally, click "Apply" and then "OK" to save each rule.
This action will effectively prevent access to specified websites, making it impossible
for users to reach these particular online locations.
▪ Click on the plus (+) icon. In the small window that opens, type a name (e.g.,
“Website Block”)
▪ In the Regexp box, type the domain expression.
^(.*)(prothomalo|thedailystar|cnn|news|espncricinfo)(.*)$
Testing Result
Network Security: Protecting the integrity of your network is crucial in today’s digital
landscape. This feature blocks access to malicious or harmful websites that can pose a threat
to your devices and data. By preventing access to phishing sites, malware distributors, and
other dangerous content, you can safeguard your network against potential cyberattacks and
ensure the security of sensitive information.
Content Filtering: This feature is designed to provide a safer browsing environment by
blocking websites that contain objectionable or harmful content. It can filter out adult material,
hate speech, and any other inappropriate content, making it easier for parents and organizations
to create a respectful and safe online space. Customizable filters can be set to meet specific
needs, enhancing the overall online experience for all users.
Bandwidth Management: Efficient management of internet bandwidth is vital for
maintaining optimal network performance. This feature allows you to monitor and limit
bandwidth usage by blocking access to websites that consume excessive bandwidth, such as
video streaming and large file-sharing sites. By controlling bandwidth allocation, you can
ensure that critical applications and services have the necessary resources for smooth
operation.
Restricting access to distracting websites can significantly enhance users' ability to concentrate
on their tasks and boost overall productivity. Utilizing tools like parental controls plays a
crucial role in safeguarding children from inappropriate content and potentially harmful
websites, ensuring a safer online experience. Although many browsers offer a quick, built-in
method for blocking specific sites, this approach often comes with limitations and only applies
to particular platforms. By implementing a more robust and comprehensive website-blocking
solution, we can foster a secure network environment that not only protects valuable resources
but also minimizes risks associated with online distractions and unsafe content.
23
System Efficiency
During testing, the system demonstrated strong stability and resilience. The MikroTik RB941-
2nD-TC (HAP lite TC) router maintained reliable connections across both LAN and WAN
interfaces, ensuring that devices on the local network could communicate effectively and
access external networks without interruptions. This device features a robust firewall,
including Layer7 processing, which allows us to analyze data packets and block specific
websites effectively using precise command configurations.
IP Control Performance
Mikrotik routers are highly regarded in the networking community for their versatility and
robust capabilities. These devices come equipped with advanced IP control features that play
a crucial role in optimizing network performance. By gaining a deeper understanding of these
features and taking the time to configure them effectively, you can significantly enhance both
the efficiency and security of your network. This means better traffic management, improved
reliability, and enhanced protection against potential threats, making your network stronger
and more reliable. Next, establish clear web filtering settings that align with your
organization’s access policies. This involves setting criteria for acceptable and unacceptable
websites. Additionally, deploy an advanced web filtering solution designed to proactively
block access to websites that are deemed malicious, phishing attempts, or any content that is
inappropriate for your network users.
Website Blocking Challenges and Solutions
Challenges:
HTTPS Encryption: Makes it difficult to inspect and block content.
Dynamic IP Addresses: Websites frequently change IP addresses, requiring constant rule
updates.
DNS Changes: Websites can bypass blocks by altering DNS records.
Bypass Techniques: Users might employ VPNs or proxies to circumvent restrictions.
Solutions:
Content Filtering: URL and keyword filtering, deep packet inspection.
DNS Manipulation: Static DNS, DNS blackholing.
Proxy Server: Transparent proxy for granular control.
User Authentication and Authorization: Control access based on user roles and permissions.
24
CONCLUSION
Achievements of Project
Our Net Fusion team has successfully concluded the project, marking a significant milestone
in our efforts to enhance network security and access control. We meticulously implemented
a robust IP address control management solution, which is pivotal for regulating website access
based on user IP addresses. Utilizing the MikroTik RB941-2nD-TC (HAP lite TC) model
router, we achieved our primary objective of safeguarding our online resources while ensuring
that only authorized users can access specific websites. This solution not only streamlines the
management of IP addresses but also fortifies our overall network integrity.
In today’s digital landscape, most websites use HTTPS encryption and dynamic IP addresses,
which makes it challenging to effectively block access to certain sites. To manage these
challenges, network administrators can implement various techniques to enhance control over
internet access. One effective method is URL filtering, which allows administrators to create
a blacklist of specific web addresses that users are not allowed to visit. Another approach is
keyword filtering, which enables the blocking of websites based on particular words or phrases
found in the URL or content, providing an additional layer of flexibility.
Future Work and Planning
This project is currently suitable for use in small offices and homes, effectively addressing
their needs. However, modern websites frequently use HTTPS encryption and dynamic IP
addresses, making effective blocking more challenging. Consequently, we plan to implement
special enhancements to improve future versions, making them smarter and more efficient.
Time-Based Blocking :
Enable time-based website blocking to restrict access to specific sites during certain hours of
the day or on particular days of the week.
AI-Powered URL Filtering :
Implement AI-driven URL categorization and filtering to accurately identify and block
malicious or unwanted websites, including those with dynamic content or changing URLs.
Geo-IP Blocking :
Allow users to block websites based on their geographic origin, providing more control over
internet traffic.
The End
Authorities- Net Fusion Team