This document discusses firewalls and their architecture. It covers common firewall threats like viruses, worms, and denial of service attacks. It explains the differences between internal and external threats and provides examples of common firewall rules. It also summarizes common firewall architectures like screening routers, screened hosts, and DMZ setups with one or two firewalls. Finally, it lists some common firewall attacks like DNS spoofing, session hijacking, and buffer overflows.
1. SETIA JULI IRZAL ISMAIL,
jul@tass.telkomuniversity.ac.id
TK 3193-KEAMANAN JARINGAN
Semester Ganjil 2015/2016
FIREWALLFIREWALL
Hanya dipergunakan untuk kepentingan pengajaran di lingkungan Telkom University
5. Contoh RulesContoh Rules
● Blok paket masuk dari alamat pengirim/ penerima
tertentu
●Blok paket keluar dari alamat pengirim/ penerima
tertentu
●Blok paket berdasarkan isi paket
●Membuka akses ke internal resource tertentu
●Membuka koneksi ke jaringan internal
●Melaporkan semua aktifitas jaringan
9. Contoh RulesContoh Rules
●Allow semua akses ke semua Website
●Allow outgoing email dari internal mail server
●Drop semua akses outgoing kecuali ke email dan website
●Drop semua incoming akses kecuali ke public web server
●Log semua akses ke website luar
●Log semua koneksi yang diblok Firewall
24. REFERENSIREFERENSI
Buku Bacaan Wajib (BW)
1 Engebretson, P. (2011). The Basic of Hacking and Penetration
Testing: Ethical Hacking and Penetration Testing Made Easy.
Syngress.
2 Stallings, W. (2010). Network Security Essentials:Applications
and Standards 4th Edition. Prentice Hall.
Buku Bacaan Anjuran (BA)
3 Beale, J. (2007). Snort IDS and IPS Toolkit. Syngress.
4 Rash, M. (2007). Linux Firewalls: Attack Detection and
Response with Iptables, psad and fwsnort. No Starch.