jump to navigation

Aplikasi Model Sistem Keamanan Jaringan Berbasis De-Militarised Zone – ADDY SUYATNO 01 Feb 2010

Posted by dc09 in Jurnal Vol 4 Feb 2009.
De-Militarized Zone (DMZ) is a “sacrificial lamb” for hackers applied to protect internal system relating to hack attack (hack attack). DMZ works for all service base of network requiring access to network “external world” to part of network the other. That way, all ” open port” is relating to external world will stay at network, so that if a hacker did attack and does crack at server using system DMZ, the hacker will only can access its(the host is only, not at internal network. In General DMZ is built based on three fruit of concept,
that is: NAT (Network Address Translation), PAT (Port Addressable Translation), and Access  List. NAT functions to show again coming packages “real address” to internal address. For example: if wes own “real address”, we can form a direct NAT automatically at data coming to (an internal network address). Then PAT functions menunjukan data to coming at particular port, or range a port and protocol (TCP/UDP or other) and address IP to a particular port or range a port to an internal address of IP. While access list functions to control in precise what is coming and going out from network in a question. For example: we can refuse or enables all ICMP is coming to all address IP except for an undesirable ICMP.
Keywords: NAT, real address, PAT, Access List, Port, Protocol, DMZ, ICMP
Jurnal Vol 4 No 1-2009 v.4.1 (hal6-12)


No comments yet — be the first.

Tinggalkan Balasan

Isikan data di bawah atau klik salah satu ikon untuk log in:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout /  Ubah )

Foto Google+

You are commenting using your Google+ account. Logout /  Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout /  Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout /  Ubah )


Connecting to %s

%d blogger menyukai ini: