Red perimetral segura de la Cámara Nacional de Comercio
Cargando...
Archivos
Fecha
2011
Autores
Profesor/a Guía
Idioma
es
Título de la revista
ISSN de la revista
Título del volumen
Editor
Universidad Andrés Bello
Nombre de Curso
Licencia CC
Licencia CC
Resumen
RESUMEN: El siguiente Trabajo de Tftulo, aborda el tema de la seguridad perimetral en redes
empresariales, la cual hoy en día es importante desarrollar. La seguridad perimetral
consiste en entregar algunos parámetros de seguridad como lo es, bloqueo de URL,
paquetes, conexiones o aplicaciones, Anti-malware, anti-spam, o mantener vigilada
nuestra red por medio de IPS.
Cada uno de estos puntos son implementados según las amenazas detectadas en la
Cámara Nacional de Comercio. Generando pruebas y recolectando información del
funcionamiento de la red, se implementa un cortafuegos o más bien conocido en ingles
como Firewa11, el cual fue elegido previo contrato existente antes de la realización de
este proyecto, el cual realizará las funcionalidades que se necesitan para poder tener
una red segura perimetralmente.
Este dispositivo es un cortafuego WatchGuard, el cual posee las características
necesarias para dar la solución de seguridad perimetra!. Este dispositivo tiene la
capacidad de generar registros y con estos a su vez generar reportes entendibles para
cualquier usuario que los desee revisar. Con esto podemos estar revisando la red y
encontrar ciertas vulnerabilidades en algunos puntos de la red.
Con esta red segura los usuarios pudieron aumentar su calidad de trabajo, ya que los
sistemas mejoraron en tiempos de respuesta, al igual que los enlaces de intemet. Esto
ayudo en mejorar el uso del ancho de banda hacia la nube.
ABSTRACT: The next Working Title, addresses the issue of perimeter security in enterprise networks, which today is important to develop. The perimeter security is to provide some security settings as it is, URL blocking, packets, connections orapplications, Anti-malware, antispam, or keep an eye on our network using IPS. Each of these points are implemented according to identified threats in the National Chamber of Commerce. Generating testing and information gathering network performance, we implement a firewall or more well known in English as Firewall, which was chosen before the existing contract before the completion of this project, which will perform the functions that are needed in order to have a secure perimeter. This device is a WatchGuard firewall, which possesses the characteristics necessary for perimeter security solution. This device has the ability to generate logs and these in tum generate reports understandable to any user who want to review. With this we may be checking the net and found some vulnerabilities in some parts of the network. Wlth this secure network users could increase their quality of work, as the systems improved response times, as well as intemet Iinks. This helped to improve the use of bandwidth to the cloud.
ABSTRACT: The next Working Title, addresses the issue of perimeter security in enterprise networks, which today is important to develop. The perimeter security is to provide some security settings as it is, URL blocking, packets, connections orapplications, Anti-malware, antispam, or keep an eye on our network using IPS. Each of these points are implemented according to identified threats in the National Chamber of Commerce. Generating testing and information gathering network performance, we implement a firewall or more well known in English as Firewall, which was chosen before the existing contract before the completion of this project, which will perform the functions that are needed in order to have a secure perimeter. This device is a WatchGuard firewall, which possesses the characteristics necessary for perimeter security solution. This device has the ability to generate logs and these in tum generate reports understandable to any user who want to review. With this we may be checking the net and found some vulnerabilities in some parts of the network. Wlth this secure network users could increase their quality of work, as the systems improved response times, as well as intemet Iinks. This helped to improve the use of bandwidth to the cloud.
Notas
Tesis (Ingeniero en redes y comunicación de datos)
Palabras clave
Redes de Computadores -- Medidas de Seguridad., Computadores -- Medidas de Seguridad.