KAJIAN PENGGUNAAN PACKET FILTERING FIREWALL MENGGUNAKAN CISCO IP ACCESS CONTROL LIST

Imam Sutoyo, Mochamad Wahyudi

Abstract


A computer network has become a necessity for any organization implementing a computer-based information system. Hence, keeping the security aspect is important to maintain the network performance so as to provide optimum service to its users and to be up against any attacks especially when it is connected to the Internet. This paper is intended to give input to computer network administrators who implement IP Access Control List (ACL) network security system as firewall. It
discusses the strengths and vulnerabilities of packet filtering firewall using Cisco IP Access Control List (ACL). The findings of this study will give computer network administrators better understanding on implementing Packet filtering firewall with Cisco IP ACL and comprehending the potential security holes due to its vulnerabilities.


Keywords : Vulnerabilities, Packet Filtering Firewall, Cisco IP Access Control List (ACL), Cracker


Full Text:

PDF

References


Al-Wabel Abdulelah A. dan Al-Shayea Hamid I. 2009. ACL Analysis Tool. King Saud University. Arab Saudi.

Benardi, Beny. 2004. Membangun Firewall dengan Cisco Router. Penerbit PT Elex Media Komputindo. Jakarta.

Brenton, Chris dan Hunt, Cameron. 2005. Network Security. Penerbit PT Elex Media Komputindo. Jakarta.

Cisco System, Inc. Cisco IOS Security Configuration Guide Release 12.2SX [http://www.cisco.com/en/US/docs/ios/security/configuration/guide/12_2sx/sec_12_2sx_book.html] (Accessed November 17, 2008)

Cisco System, Inc. TACACS+ and RADIUS Comparison [http://www.cisco.com/en/US/tech/tk59/ technologies_tech_note09186a0080094e99.shtml] (Accessed January 14, 2008)

Habtamu, Abie. 2000. An Overview of Firewall Technologies. Norwegian Computing Center. Norwegia.

Ivan Victor, Krsul. 1998. Software Vulnerability Analysis. Purdue University. Amerika Serikat.

Kamara, Seny dkk. 2003. Analysis of Vulnerabilities in Internet Firewalls.

Purdue University. Amerika Serikat.

Wright, Craig S.. 2007. A Taxonomy of Information Systems Audits,

Assessments and Reviews. SANS Institute. Amerika Serikat




DOI: https://doi.org/10.31294/p.v11i3.4732

Copyright (c) 2009 Imam Sutoyo, Mochamad Wahyudi

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

ISSN2579-3500

Dipublikasikan oleh LPPM Universitas Bina Sarana Informatika

Jl. Kramat Raya No.98, Kwitang, Kec. Senen, Kota Jakarta Pusat, DKI Jakarta 10450
Telepon: 021-21231170, ext. 704 / 705
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License
https://jpc.unik-kediri.ac.id/slot-pulsa/ http://cbtdikpora2.bantulkab.go.id/slot-maxwin/ https://kotasehat.depok.go.id/-/slot-pulsa/ https://kotasehat.depok.go.id/-/slot-gacor/ https://kotasehat.depok.go.id/-/slot-gopay/ https://smkppnmataram.distanbun.ntbprov.go.id/-/slot-kamboja/ https://smkppnmataram.distanbun.ntbprov.go.id/-/slot-deposit-pulsa/ https://ebphtb.karimunkab.go.id/log/slot4d/ https://ebphtb.karimunkab.go.id/log/bandar-togel/ http://conference.fortei.unp.ac.id/public/slot-dana/ http://conference.fortei.unp.ac.id/public/slot88/ https://diskop.ntbprov.go.id/.tmb/slot-pulsa/ https://diskop.ntbprov.go.id/.tmb/slot-hoki/ https://simasn.malutprov.go.id/vendor/slot-bonus/ https://simasn.malutprov.go.id/vendor/slot-thailand/ https://asnunggul.lan.go.id/assets/components/components1/ https://asnunggul.lan.go.id/assets/components/components2/ sundaempire787 Poskobet