Firewall of a home network in Cisco Packet Tracer: Case Study
Abstract
Technological advances have allowed the installation of WLAN networks for intercommunication between devices, which in turn presents vulnerability due to cyber-attacks, which is considered a problem in relation to the use of smart devices, as well as the configuration not suitable for the protection of confidential data. The purpose of this study was to determine an appropriate firewall configuration in a home network by simulating a WLAN network to avoid possible external connections that present a cyber threat without compromising the connection. The methodology used was based on the design, analysis of connections and simulation of the structure in a home network, using the CISCO Packet Tracer software in which the behavior of data packet transfer between all devices and Subsequently, the firewall configuration was implemented that allowed data transmission to be blocked between all devices and a series of processes were followed to restrict external data from the network, correcting the connections in the process. The results obtained determined that the firewall configuration allowed the blocking of unwanted external traffic, avoiding intrusion by sending packets
Downloads
References
Cortes D, Firewalls de nueva generación: La seguridad informática vanguardista. 2016. [Tesis de Grado]. Universidad Piloto de Colombia.
Oviedo, B. Visualizador de tráfico de red de comunicación basada en la Arquitectura TCP/IP, 2020, Retrieved from http://scielo.sld.cu/scielo.php?script=sci_arttext&pid=S2218-36202019000200193.
Kaylani Bochie, , Vista do Detecção de Ataques a Redes IoT Usando Técnicas de Aprendizaje Profundo. Retrieved from, 2020 https://sol.sbc.org.br/index.php/sbseg/article/view/19242/19071.
Monje, R.. Seguridad informática y el malware. Universidad Piloto de Colombia, 2017.
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. Firewalls and internet security: Repelling the Wily Hacker. Addison-Wesley Professional, 2003.
Estrada, A. Protocolos Tcp/Ip De Internet. Revista Digital Universitaria, 2002.https://www.revista.unam.mx/vol.5/num8/art51/sep_art51.pdf
Muelaner, J. Opciones de protocolo de la capa de aplicación para la funcionalidad M2M e IoT. DigiKey, 2021. Retrieved from https://www.digikey.com/es/articles/application-layer-protocol-options-for-m2m-and-iot-functionality.
Proaño, M.. Propuesta de aplicaciones futuras en hogares digitales utilizando el protocolo IPv6”. repositorio.puce.edu.ec, 2014.
Smartekh. Informe de Amenazas IoT 2020, (2020). Recuperado el 27 de septiembre de 2023, de https://info.smartekh.com/hubfs/IoT/Informe%20de%20Amenazas%20IoT%202020.pdf
Copyright (c) 2024 Ciencias de la Ingeniería y Aplicadas
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The authors who publish in this journal agree to the following terms:
- Creative Commons Attribution-NonCommercial-NoDerivatives License allows others to share the work with acknowledgment of authorship of the work and initial publication in this journal.
- Authors may separately establish additional agreements for the non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to disseminate their work electronically (for example, in institutional repositories or on their own website) before and during the submission process, as it can lead to productive exchanges, as well as further citation. earliest and largest of published works (See The Effect of Open Access) (in English).