Professional Documents
Culture Documents
KEAMANAN KOMPUTER
FIREWALL
Disusun Oleh :
Ahmad Shofi (1412120049)
Wiyanto (1412120300)
Sulistiyo (1412120051)
2015KATA PENGANTAR
Penyusun
DAFTAR ISI
Hal
JUDUL...............................................................................................................i
KATA PENGANTAR........................................................................................ii
DAFTAR ISI......................................................................................................iii
BAB I PENDAHULUAN
1.1 Latar Belakang............................................................................................1
1.2 Tujuan..........................................................................................................2
1.3 Batasan Masalah..........................................................................................2
BAB II PEMBAHASA
2.1. Firewall......................................................................................................3
2.2. Membatasi, Menolak Dan Menyaring Lalu lintas jaringan.......................3
2.2.1. Proses Inspeksi/Penyaringan Paket...................................................4
2.2.2. Fungsi Firewall..................................................................................5
2.2.3. Konsep Kerja Firewall......................................................................6
2.2.4. Stateful Packet Inspection.................................................................8
2.2.5. Melakukan autentikasi terhadap akses..............................................9
2.2.6. Melindungi sumber daya dalam jaringan privat..............................10
2.3. Prinsip Kerja Firewall..............................................................................11
2.5. Tipe-tipe Firewall.....................................................................................19
2.6. Konfigurasi Firewall Linux......................................................................21
2.6.1 Konfigurasi firewall sederhana menggunakan shorewall................22
BAB III PENUTUP
3.1. Kesimpulan..............................................................................................25
3.2. Saran.........................................................................................................26
DAFTAR PUSTAKA.....................................................................................27