Eight Weeks Industrial Training: "Network Security"
Eight Weeks Industrial Training: "Network Security"
TRAINING
REPORT
On
“NETWORK SECURITY”
In partial fulfillment of the Diploma in Computer Science Engineering
AT
Solitaire Infosys
Guided by Submitted by
NETWORK SECURITY HEAD
Mrs. Neetu Kunal Verma
ACKNOWLEDGEMENT
While presenting this report we would like to express my deep sense of
gratitude to entire Solitaire staff that were indispensable part of my training
giving me unending guidance, inspiration, encouragement and providing me
excellent environment throughout my training at Solitaire Infosys Pvt. LTD.
The training was an extremely productive & enriching experience, not only
technically but also from providing practical skills.
We are extremely thankful to Mrs.Neetu who had devoted a lot of time in
guiding and supervising me during my training. We place our gratitude
towards Mrs. Neetu for her valuable advice and guidance in carrying out this
enjoyable and productive experience, which provided me a great
opportunity to search new horizons.
COMPANY PROFILE
Solitaire Infosys Pvt. Ltd.
Complete IT Solution Provider
Overview
SOLITAIRE INFOSYS is a leading Software and Web Application
Development Company, based in Mohali (Chandigarh), that
provides high quality comprehensive services to enterprises across
a wide range of platforms and technologies. Our major areas of
expertise are in providing quality, cost effective software or web
development. Our focus is on understanding the diverse and
mission-critical needs of each of our clients. To understand is to be
able to deliver. The competence and experience of our company
gives us a competitive edge by making sure we provide the best
services and products to our clients. Our high quality standards
enable us to deliver reliable and error-free software applications,
despite their complexity. We provide Web design/Web
development, B2B & B2C E-commerce solutions, SEO & Web
Promotions strategies implementation consulting services to both
domestic as well as international clients at the most affordable
rates less
Courses offered
• WEBSITE DESIGN
• WEBSITE DESIGNING SERVICES
• PSD TO XHTML CONVERSION
• WP THEME CUSTOMIZATION
• FLASH AND 3D ANIMATION
• LOGO HYPERLINK
"HTTP://WWW.SLINFY.COM/LOGO-IDENTITY-
DESIGN"& HYPERLINK
"HTTP://WWW.SLINFY.COM/LOGO-IDENTITY-DESIGN"
IDENTITY DESIGN
• WEB DEVELOPMENT
• PHP DEVELOPMENT
• .NET DEVELOPMENT
• CMS DEVELOPMENT
• E-COMMERCE DEVELOPMENT
• MOBILE APPLICATIONS
• UNITY 3D
• PHONE GAP
• IPHONE APP DEVELOPMENT
• ANDROID APP DEVELOPMENT
• WI HYPERLINK
"HTTP://WWW.SLINFY.COM/WINDOW-APP-
DEVELOPMENT"NDOW APP DEVELOPMENT
• DIGITAL MARKETING
• SEO SERVICES
• SMO SERVICES
• PPC
• EMAIL MARKETING
• MAINTENANCE
• APP MAINTENANCE
• CMS HYPERLINK "HTTP://WWW.SLINFY.COM/CMS-
MAINTANANCE" APP MAINTENANCE
PREFACE
Technology has rapidly grown in past two-three decades. An engineer
without practical knowledge and skills cannot survive in this technical
area. Theoretical knowledge does matter but it is the practical knowledge
that is the difference between the best and the better. Routeranizations also
prefer experienced engineers than fresher ones due to practical knowledge
and industrial exposure of the former. The practical training is highly
conductive for solid foundation for:-
1. Introduction of Networking
3. Network Encoding
4. Project Implementation
5. Network Security
7. References
• Introduction of Networking
1.1 Network
• It is the interconnection of multiple devices, generally termed as
Hosts connected using multiple paths for the purpose of
sending/receiving data or media.
There are also multiple devices or mediums which helps in the
communication between two different devices which are known
as Network devices. Ex: Router, Switch, Hub, Bridge.
The layout pattern using which devices are interconnected is called
as network topology. Such as Bus, Star, Mesh, Ring, Daisy chain.
• OSI: OSI stands for Open Systems Interconnection. It is a
reference model that specifies standards for communications
protocols and also the functionalities of each layer.
• Protocol: A protocol is the set of rules or algorithms which define
the way how two entities can communicate across the network and
there exists different protocol defined at each layer of the OSI
model. Few of such protocols are TCP, IP, UDP, ARP, DHCP, FTP
and so on.
1.2 REQUIREMENTS
To complete the work on network security, I take help from some software
requirements. Software requirements as
Hardware Requirements:
Types of switch:-
• Manageable switch
• Unmanageable switch
Types:
• STP (Shielded Twisted Pair Cable): It is suitable for environments
with electrical interference. STP is used on networks using Token ring
Topology.
• Network encoding:
3.1 Interface
A server is a system (software and suitable computer hardware) that
responds to requests across a computer network to provide, or help to
provide, a network service. Servers can be run on a dedicated computer,
which is also often referred to as "the server", but many networked
computers are capable of hosting servers. In many cases, a computer can
provide several services and have several servers running. Many servers do
not have a graphical us HYPERLINK
"http://en.wikipedia.org/wiki/Graphical_user_interface"er interface (GUI) as
it is unnecessary and consumes resources that could be allocated elsewhere.
Similarly, audio and USB interfaces may be omitted. With the help of
GUI(Graphic User Interface), server works and perform multitasks.
3.2 Module Description
3.2.1 Server
3.2.2 Domain Name System
3.2.3 Dynamic Host Control Protocol
3.2.4 Network Switch
3.2.5 Internet Information Services
Operation:
• Address resolution mechanism- Domain name resolvers determine the
appropriate domain name servers responsible for the domain name in
question by a sequence of queries starting with the right-most (top-
level) domain label.
• DNS resolver- The client-side of the DNS is called a DNS resolver. It
is responsible for initiating and sequencing the queries that ultimately
lead to a full resolution (translation) of the resource sought, e.g.,
translation of a domain name into an IP address.
• PROJECT IMPLEMENTATIONS
4.1 ROUTING PROTOCOL
EIGRP (Enhanced Interior Gateway Routing Protocol): Advanced version
of IGRP developed by Cisco. Provides superior convergence properties and
operating efficiency, and combines the advantages of link state protocols
with those of distance vector protocols.
Features: -
• Cisco proprietary
• Hybrid protocol
• Link State
• Distance Vector
• Multicast Updates using
• Address 224.0.0.10
• Support VLSM
• Automatic Route Summarization
• Unequal path cost load balancing
• Metric (32 bit composite)
• Bandwidth
• Delay
• Load
• Reliability
• MTU
• Neighbor Recovery
• Triggered updates
• Backup Route
• Configuring EIGRP
Router (config) #router eigrp<as no>
Router (config-router) #network <net addr.>
Router (config-router) #network <net addr.>
Router (config-router) #exit
OSPF (Open Shortest Path First): Link-state, hierarchical IGP routing
protocol proposed as a successor to RIP in the Internet community. OSPF
features include least-cost routing, multipath routing, and load balancing.
OSPF was derived from an early version of the ISIS protocol.
• Commands to configure OSPF
Router#conf t
Router (config) #router ospf<process no>
Router (config-router) #network <net address><wild mask> area <area id>
Router (config-router) #network <net address><wild mask> area <area id>
Router (config-router) #exit
• Using commands:
• interface FastEthernet0/0
• ip address 50.0.0.1 255.0.0.0
• ip access-group hcl in
• ip access-group 10 out
• ip nat inside
• duplex auto
• speed auto
• !
• interface FastEthernet0/1
• no ip address
• duplex auto
• speed auto
• shutdown
• !
• interface Serial0/0/0
• ip address 40.0.0.2 255.0.0.0
• clock rate 2000000
• !
• interface Serial0/0/1
• no ip address
• clock rate 2000000
• shutdown
• !
• interface Vlan1
• no ip address
• shutdown
• !
• router rip
• version 1
• network 40.0.0.0
• !
• ip nat inside source static 50.0.0.2 30.0.0.3
• ip nat inside source static 50.0.0.3 30.0.0.4
• ip nat inside source static 50.0.0.4 30.0.0.5
• ip nat inside source static 50.0.0.2 40.0.0.3
• ip nat inside source static 50.0.0.3 40.0.0.4
• ip nat inside source static 50.0.0.4 40.0.0.5
• ip classless
• ip route 10.0.0.0 255.0.0.0 40.0.0.1
• ip route 20.0.0.0 255.0.0.0 40.0.0.1
• ip route 30.0.0.0 255.0.0.0 40.0.0.1
• !
• ip flow-export version 9
• !
• !
• access-list 10 deny 10.0.0.0 0.255.255.255
• access-list 10 permit any
• ip access-list extended hcl
• deny tcp host 50.0.0.2 host 30.0.0.4 eq www
• permit ip any any
• !
• !
• !
• !
• !
• line con 0
• !
• line aux 0
• !
• line vty 0 4
• login
• !
• !
• !
• End
4.2 DNS (DOMAIN NAME SERVER OR SYSTEM)
Domain Name Server The most basic task of DNS is to translate hostnames
to IP addresses. In very simple terms, it can be compared to a phone book.
DNS also has other important uses.
Above all, DNS makes it possible to assign Internet names to organizations
(or concerns they represent) independent of the physical routing hierarchy
represented by the numerical IP address.
Because of this, hyperlinks and Internet contact information can remain the
same, whatever the current IP routing arrangements may be, and can take a
human-readable form (such as "example.com"), which is easier to remember
than the IP address 208.77.188.166. People take advantage of this when they
recite meaningful URLs and e-mail addresses without caring how the
machine will actually locate them.
The Domain Name System distributes the responsibility for assigning
domain names and mapping them to IP networks by allowing an
authoritative name server for each domain to keep track of its own changes,
avoiding the need for a central register to be continually consulted and
updated.
DNS server:
Facebook server:
• Network Security
• Access-list
• NAT(Network Address Translation)
Access-list: Access Control List (ACL) are filters that enable you to control
which routing updates or packets are permitted or denied in or out of a
network.
They are specifically used by network administrators to filter traffic and to
provide extra security for the network. This can be applied to routers
(Cisco).
ACLs provide a powerful way to control traffic into and out of your
network; this control can be as simple as permitting or denying network
hosts or addresses. You can configure ACLs for all routed network
protocols.
The most important reason to configure ACLs is to provide security for your
network. However, ACLs can also be configured to control network traffic
based on the TCP port being used.
Working: A router acts as a packet filter when it forwards or denies packets
according to filtering rules. As a Layer 3 device, a packet-filtering router
uses rules to determine whether to permit or deny traffic based on source and
destination IP addresses, source port and destination port, and the protocol of
the packet.
These rules are defined using access control lists or ACLs.
To simplify how ACL or a router uses packet filtering work:
Imagine a guard stationed at a locked door. The guard’s instruction is to
allow only people whose names appear on a guest list to pass through the
door. The guard is filtering people based on the condition of having their
names on the authorized list.
When a packet arrives at the router, the router extracts certain information
from the packet header and makes decisions according to the filter rules as to
whether the packet can pass through or be dropped.
Packet filtering process works at the Network layer of the Open Systems
Interconnection (OSI) model or the Internet layer of TCP/IP.
For example: we have blocked dark web website in one country (INDIA)
and in one estate of America by using access-list.
When we enter the URL, the website will not open and after few second a
message will display “request timeout”.
• References
• Training from solitaire Infosys, Mohali.
• Ellis, J. and Speed, T. (2001) the Internet Security Guidebook,
Academic Press.
• Anderson, R. (2001) Security Engineering: A Guide to Building
• Dependable Distributed Systems, Wiley.
****************