Implementation of Management and Network Security Using Endian UTM Firewall

  • Muhammad Arifin F
  • Andriana Mutiara G
  • Ismail I
N/ACitations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Internet is a source of information which is widely used today. However, the mode of internet abused becomes more various and unavoidable. The internet abused can be done from external or internal networks. Unified Threat Management (UTM) is one of a good solution to secure the networks, because it has several security features such as firewall, proxy, Intrusion Prevention System (IPS) and several other security features in one package. Endian is an UTM distro which is an open source in large community. Besides having some security features, Endian also has some network management features such as DHCP, routing, and VPN. This research put Endian as the center of a network topology that connected to the internal network/LAN, DMZ Server, and Internet Network/WAN. The tests are conducted in the form of implementation of DHCP feature, content filtering, port restrictions on interzone, and the response of the IPS features that exist on the Endian while receiving the attack. The results showed that Endian UTM is quite well in maintaining the security of the networks.

Cite

CITATION STYLE

APA

Muhammad Arifin, F., Andriana Mutiara, G., & Ismail, I. (2017). Implementation of Management and Network Security Using Endian UTM Firewall. IJAIT (International Journal of Applied Information Technology), 1(02), 43–51. https://doi.org/10.25124/ijait.v1i02.874

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free