Skip to content

RyanKennon/Network-Traffic-Analysis-Firewall-Management

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 

Repository files navigation

image

Network Traffic Analysis & Firewall Management

This project focuses on analyzing network traffic and observing how firewall rules affect communication within a networked environment. I installed a packet sniffer, used Wireshark to monitor live network traffic, and initiated a perpetual ping to generate continuous ICMP activity. I then created a network firewall to observe how traffic patterns changed once rules were applied and later deleted the firewall to restore normal connectivity. This project demonstrates practical skills in packet analysis, network monitoring, and firewall behavior in a real-world environment.


Environments and Technologies Used

  • Microsoft Azure
  • Windows 10 Pro
  • Ubuntu Server 22
  • Windows PowerShell
  • Wireshark
  • Remote Desktop Protocol (RDP)
  • Azure Network Security Groups (NSG)

Table of Contents


1) Create Virtual Machines

  1. In Microsoft Azure search Resource Groups in the search bar and select Create then give the Resource Group the following settings then create the Resource Group
  • Name: RG-01
  • Reigon: South Central US

Untitled Diagram-Page-1 drawio

  1. Seach Virtual Machines then create then give the Virtual Machine the following settings then create the Virtual Machine
  • Basics
    • Resource Group: RG-01
    • Name: Windows-VM
    • Image: Windows 10 Pro
    • Size: 2vcpus
    • Username: userryan
    • Password: Cyberlab123!
  • Networking
    • Virtual Network: vnet-southcentralus (RG-01)
    • Subnet: snet-southcentralus-1

Untitled Diagram-Page-2 drawio Untitled Diagram-Page-3 drawio

  1. Seach Virtual Machines then create then give the Virtual Machine the following settings then create the Virtual Machine
  • Basics
    • Resource Group: RG-01
    • Name: Linux-VM
    • Image: Ubuntu Server 22
    • Size: 2vcpus
    • Username: userryan
    • Password: Cyberlab123!
  • Networking
    • Virtual Network: vnet-southcentralus (RG-01)
    • Subnet: snet-southcentralus-1

Untitled Diagram-Page-4 drawio
Untitled Diagram-Page-5 drawio Untitled Diagram-Page-1 drawio


2) Install a Packet Sniffer

  1. On the Windows Virtual Machine go to Wireshark.org
  2. Select the Windows x64 Installer

Untitled Diagram-Page-2 drawio

  1. When asked check the box that says Install Npcap

Untitled Diagram-Page-3 drawio

  1. Complete Install

3) View Network Traffic in Wireshark

  1. Open PowerShark
  2. Select Ethernet
  3. Click the Sharkfin in the upper left corner

Untitled Diagram-Page-4 drawio


4) Start and Observe a Perpetual Ping

  1. To retrieve the Private IP Address for the linux Virtual Machine
  • Click on the linux Virtual Machine in Azure
  • Scroll down to the Networking Properties
  • Check where it says Private IP Address

Untitled Diagram-Page-15 drawio

  1. Open Windows PowerShell
  2. Run the command ping <linux VM private IP address> -t

Untitled Diagram-Page-5 drawio

  1. In Wireshark search icmp in the search bar
  2. Observe the ICMP traffic

Untitled Diagram-Page-6 drawio


5) Deploy a Network Firewall

  1. In Microsoft Azure click the linux VM
  2. Open Networking and select Network Settings
  3. Click the Network Security Group

Untitled Diagram-Page-7 drawio

  1. Open Settings then Inbound Security Rules
  2. Select Add

Untitled Diagram-Page-8 drawio

  1. For the rule make the following changes:
    • Change Destination Port Ranges to *
    • For Protocol choose ICMPv4
    • For Action select Deny
    • Set the Priority to 290
  2. Add rule

Untitled Diagram-Page-9 drawio

  1. Observe the changes in network traffic in Windows PowerShell and Wireshark

Untitled Diagram-Page-10 drawio

Untitled Diagram-Page-11 drawio


6) Delete a Network Firewall

  1. Navigate back to the page where the firewall was created
  2. Click the trashcan to the right of the rule

Untitled Diagram-Page-12 drawio

  1. Confirm the deletion
  2. Observe the changes in network traffic in Windows PowerShell and Wireshark

Untitled Diagram-Page-13 drawio

Untitled Diagram-Page-14 drawio

About

Lab focused on network traffic analysis and firewall behavior, including capturing packets with a sniffer, monitoring traffic in Wireshark, generating ICMP activity, deploying a network firewall, and observing traffic changes before and after filtering.

Topics

Resources

Stars

Watchers

Forks

Contributors