Firewall of a home network in Cisco Packet Tracer: Case Study

  • Andres Paul Delgado Sornoza Universidad Laica Eloy Alfaro de Manabí
  • Washington Xavier Garcia Quilachamin Universidad Laica Eloy Alfaro de Manabí
  • Mikel Angelo Ubillus Amalla Universidad Laica Eloy Alfaro de Manabí
Keywords: Firewall, Optimization, Cisco Packet Tracer, Network security, Home network

Abstract

Technological advances have allowed the installation of WLAN networks for intercommunication between devices, which in turn presents vulnerability due to cyber-attacks, which is considered a problem in relation to the use of smart devices, as well as the configuration not suitable for the protection of confidential data. The purpose of this study was to determine an appropriate firewall configuration in a home network by simulating a WLAN network to avoid possible external connections that present a cyber threat without compromising the connection. The methodology used was based on the design, analysis of connections and simulation of the structure in a home network, using the CISCO Packet Tracer software in which the behavior of data packet transfer between all devices and Subsequently, the firewall configuration was implemented that allowed data transmission to be blocked between all devices and a series of processes were followed to restrict external data from the network, correcting the connections in the process. The results obtained determined that the firewall configuration allowed the blocking of unwanted external traffic, avoiding intrusion by sending packets

Downloads

Download data is not yet available.

References

Cortes D, Firewalls de nueva generación: La seguridad informática vanguardista. 2016. [Tesis de Grado]. Universidad Piloto de Colombia.

Oviedo, B. Visualizador de tráfico de red de comunicación basada en la Arquitectura TCP/IP, 2020, Retrieved from http://scielo.sld.cu/scielo.php?script=sci_arttext&pid=S2218-36202019000200193.

Kaylani Bochie, , Vista do Detecção de Ataques a Redes IoT Usando Técnicas de Aprendizaje Profundo. Retrieved from, 2020 https://sol.sbc.org.br/index.php/sbseg/article/view/19242/19071.

Monje, R.. Seguridad informática y el malware. Universidad Piloto de Colombia, 2017.

Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. Firewalls and internet security: Repelling the Wily Hacker. Addison-Wesley Professional, 2003.

Estrada, A. Protocolos Tcp/Ip De Internet. Revista Digital Universitaria, 2002.https://www.revista.unam.mx/vol.5/num8/art51/sep_art51.pdf

Muelaner, J. Opciones de protocolo de la capa de aplicación para la funcionalidad M2M e IoT. DigiKey, 2021. Retrieved from https://www.digikey.com/es/articles/application-layer-protocol-options-for-m2m-and-iot-functionality.

Proaño, M.. Propuesta de aplicaciones futuras en hogares digitales utilizando el protocolo IPv6”. repositorio.puce.edu.ec, 2014.

Smartekh. Informe de Amenazas IoT 2020, (2020). Recuperado el 27 de septiembre de 2023, de https://info.smartekh.com/hubfs/IoT/Informe%20de%20Amenazas%20IoT%202020.pdf

Published
2024-07-22
How to Cite
Delgado SornozaA. P., Garcia QuilachaminW. X., & Ubillus AmallaM. A. (2024). Firewall of a home network in Cisco Packet Tracer: Case Study. Ciencias De La Ingeniería Y Aplicadas, 8(2), 75-83. https://doi.org/10.61236/ciya.v8i2.794
Section
Artículo de investigación