WILDCARD MASK SEBAGAI FILTERING IP ADDRESS MENGGUNAKAN METODE ACCESS LIST CONTROL PADA ROUTER CISCO
Abstract
Implementation of a firewall in the computer network is important. In national newspapers proclaiming dated May 12, 2015 that Indonesia's second largest order of Origin Cyber Crime in the World. Furthermore, a report issued in 2014 the period of January to Desmber by Indonesia Security Incident Response Team on Internet Infrastructure / Coordination Center (id-SIRTII) that there was an attack ± 350,000 times in May in the form of an exploit. Exploit code is a computer security attack specifically. Exploit widely used for penentrasi either legally or illegally to find the weaknesses (Vulnerability) on the destination computer. Web attacks and attack-misc at its peak in August as much as ± 41,000 times. The first step to anticipate the occurrence of such attacks is a firewall application. Implementation firewall one of them by utilizing the Cisco Router. Cisco Router in the device that applies the concept of Access Control List (ACL) and included some content, such as: Application wildcard mask, specify the source IP address, destination IP address and define the final data package.
Keyword—Firewall, Access Control List, the Destination IP Address, Wildcard Mask.
Full Text:
PDFReferences
A Jesin. 2014. Packet Tracer Network Simulator. Packt Publishing : Birmingham-UK.
Hartpence, Bruce. 2011. Packet Guide to Core Network Protocols. O,Reilly Media : California-USA.
Hikmaturokhman, Alfin, etc. 2010. Analisa Perancangan dan Implementasi Firewall dan Traffic Filtering menggunakan Cisco Router. Seminar Nasional Informatika 2010 (senmasIF 2010) UPN “Veteran” Yogyakarta, 22 Mei 2010. ISSN : 1979-2328.
Komar, Brian etc. 2003. Firewall for Dummies, 2nd Edition. Wiley Publishing : New York-USA.
Moraes, Alexandre M.S.P. 2011. Cisco Firewall. Cisco Press : Indianapolis-USA.
Networking, ProCurve. 2005. Configuration Guide 5991-2119. HP Innovation
Paquet, Catherine. 2013. Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide (2nd Edition). Cisco Press : Indianapolis-USA.
Simamora, S.N.M.P, et all. 2011. Metode Access Control List sebagai Solusi Alternatif Seleksi Permintaan Layanan Data pada Koneksi Internet. Jurnal Teknologi Informasi Politeknik Telkom Vol.1, No.1, Mei 2011
Santos, Omar dan Stuppi, John. 2015. CCNA Security 210-260 Official Cert Guide. Cisco Press : Indianapolis-USA.
Syafina, Dea Chadiza. 2015. Indonesia Urutan Kedua Terbesar Negara Asal "Cyber Crime" di Dunia http://nasional.kompas.com/read/2015/05/12/06551741/Indonesia.Urutan.Kedua.Terbesar.Negara.Asal.Cyber.Crime.di.Dunia.
Tittel, Ed. 2002. Schaum's Outline : Computer Networking (Jaringan Komputer). Jakarta : Penerbit Erlangga.
Zwicky, Elizabeth D, etc. 200. Building Internet Firewalls. ISSBN : 1-56592-871-7.
DOI: https://doi.org/10.31294/jtk.v3i1.1344
Copyright (c) 1969 Aziz Setyawan Hidayat
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
ISSN: 2442-2436 (print), and 2550-0120