Acn Report
Acn Report
Acn Report
Micro Projects
Report
(Group No. 07)
Submitted by
Sr.No. Student Name Roll Enrolment No.
No
1 YASH GUPTA ANIL 25 2112420263
2 VAISHNAVI PRABHUDAS MACHHIRKE 26 2112420265
3 DIKSHA MACHINDRA JAGNE 27 2112420268
4 RITIK MINESH DHODHARMAL 28 2112420269
Submitted to
Mr. Zhamesh Bhalare
MAHARASHTRA STATE BOARD
OF TECHNICAL EDUCATION
Certificate
This is to certify that,
Yash Gupta(25),Vaishnavi Machhirke(26)
Dikhsha Jagne(27), Ritik Dhodhasarmal(28)
of third Year Computer Technology students have submitted this Micro-Project
report on
During academic session 2023- 2024 in the practical fulfilment course for Diploma in
Computer Engineering.
Principal
We express our sincere gratitude to Mrs. Bhavana P. Bhagat, Head of Dept. of Computer
Technology, for his stimulating guidance, continuous encouragement and supervision
throughout the course of present work.
Micro-Project Report
Various generations of computer system and operating system
1.0 Rationale:
Generation of Firewall
Firewalls can be categorized based on their generation.
1. First Generation- Packet Filtering Firewall: Packet filtering firewall is used to
control network access by monitoring outgoing and incoming packets and allowing
them to pass or stop based on source and destination IP address, protocols, and ports. It
analyses traffic at the transport protocol layer (but mainly uses first 3 layers). Packet
firewalls treat each packet in isolation. They have no ability to tell whether a packet is
part of an existing stream of traffic. Only It can allow or deny the packets based on
unique packet headers. Packet filtering firewall maintains a filtering table that decides
whether the packet will be forwarded or discarded. From the given filtering table, the
packets will be filtered according to the following rules:
1. Project Topic Selection: The project topic, "Applying Firewall to Router" was chosen
based on Network security.
2. Project Implementation:
Created a network topology
Configured a network with network address i.e., 192.168.11.1 and 192.168.12.1
Configured a DHCP using Servers
Configured a Firewall in Server via inbound rules
Configured a HTTP
3. Testing and Debugging: Tested the features that is all features working of firewall on
router and its network.
4. Documentation: Documentation was created to provide instructions on how to we
configured this firewall in network and how its work.
3. Router -
Login credentials: username and password which are required for loging in a admin panel of router
Network Address: This address is a main address of network given to router. eg.(192.168.1.1)
Subnet Mask: identifier of subnet of class of network is using. eg.(255.255.255.0)
Default Gateway: Used for identifying a gateway for incoming and outgoing traffic. eg.
(192.168.1.1)
STEPS:
1. Gather Necessary Information: Before you start, gather all the necessary information, including
your Internet Service Provider (ISP) details, network devices, and any login credentials. You will
typically need your ISP username and password, the router's default IP address, and the router's admin
credentials.
2. Connect Hardware: a. Power off your modem, router, and any other network devices.
b. Connect the modem to the router's WAN (Internet) port using an Ethernet cable.
c. Connect your computer to one of the router's LAN ports using another Ethernet cable.
d. Power on the modem and wait for it to initialize.
e. Power on the router.
3. Access Router Interface: a. Open a web browser on your computer. b. Enter the router's default IP
address into the address bar (common addresses are 192.168.0.1 or 192.168.1.1). c. You'll be
prompted to enter the router's username and password. These are often set to default values (check
your router's manual). It's essential to change these credentials for security.
4. Initial Setup Wizard: a. Once logged in, many routers will prompt you to run an initial setup wizard.
Follow the on-screen instructions, which usually include configuring basic settings like your time
zone, Wi-Fi network name (SSID), and Wi-Fi password.
b. Choose a strong password for router admin access.
5. Internet Connection Settings: a. Depending on your ISP, you may need to select your connection
type (e.g., DHCP, PPPoE, Static IP). Your ISP should provide you with this information.
b. Enter the required information, such as the ISP username and password. For DHCP, the router will
typically obtain this information automatically.
c. Test your internet connection to ensure it's working.
6. Wireless Network Configuration: a. Set up your Wi-Fi network by configuring the SSID (network
name) and Wi-Fi password. Enable WPA2 or WPA3 security for a strong encryption.
b. Configure other wireless settings, such as the channel and frequency band (2.4GHz or 5GHz).
c. You may want to enable WPS (Wi-Fi Protected Setup) for easy device connections, but be cautious
about potential security risks.
7. Security Settings: a. Change the default login credentials to something strong and unique to prevent
unauthorized access to your router.
b. Disable remote administration unless necessary.
8. Port Forwarding and Quality of Service (QoS) (if needed): a. Configure port forwarding to allow
specific applications or services to work through the router.
b. Set up QoS to prioritize specific devices or types of network traffic for a smoother experience.
9. Firmware Updates: Check for firmware updates for your router and apply them. This ensures your
router has the latest security patches and features.
10. Save and Reboot: After making all the necessary configurations, save the settings, and reboot your
router to apply the changes.
11. Connect Devices: Connect your devices (computers, smartphones, smart TVs, etc.) to your Wi-Fi
network using the SSID and password you configured earlier.
12. Test the Network: Finally, test your network by accessing the internet and making sure all devices
are connected and working as expected.
Applying Firewall
Remember that configuring a firewall can impact the functionality of your network and certain
applications. Always be cautious when setting up rules, and make sure your configuration aligns with
your network's security and usability requirements
NETWORK TOPOLOGY-
INBOUND RULES-
Teacher Signature
Mr. Zhamesh Bhalare