06 Firewall Implementation Lab Manual
06 Firewall Implementation Lab Manual
Objective
This lab teaches the fundamentals of implementing firewall policies and
understanding its effect on application performance and link utilizations.
Overview
Standard Chartered Bank’s headquarters network connects to the Internet
through a CISCO PIX Firewall. Users use various online applications
including e-mail, web browsing, and credit card authorization. In addition,
some users are doing illegal file transfers for pirated music and videos. First
we’ll evaluate the application performance with no firewall policies. Thus, no
illicit traffic is blocked.
Lab Instructions
Step 1: Open Lab 1
1. Start IT Guru.
View the credit card authorization response time for all the users and also the
WAN link utilization. As mentioned earlier, the critical credit card authorization
application’s response time is required to be less than 2 seconds.
7. Right-click on the WAN link and select View Results to view its utilization.
Note: To toggle the graphs on and off, use the hide or show all graphs
button.
Rerun the simulation for a busy hour of the day to see if implementing the
firewall improves application performance.
• Refer to previous steps for setting the duration and running the simulation.
Compare the Credit Card Authorization Application Response Time and also
the WAN link utilization.
3. Click Show and then click Close in the View Results window.
• The utilization graph shows significant reduction in the WAN link utilization
due to the firewall policy, thereby improving the application performance.
• By mandating the firewall policy to stop illicit peer-to-peer file transfers, the
company is able to achieve the required performance for the critical credit
card authorization.
Advanced Scenario