Please use this identifier to cite or link to this item:
https://repository.unad.edu.co/handle/10596/77045Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.advisor | Duarte Pacheco, Ivan Guillermo | |
| dc.coverage.spatial | ccav_-_neiva | |
| dc.creator | Villa Guerra, Alexandra Marieta | |
| dc.creator | Santibáñez Parra, Diana Paola | |
| dc.creator | Vargas Ramírez, Jonathan stivens | |
| dc.creator | Losada Rivera, Hernan Camilo | |
| dc.creator | Dueñas Pérez, Gerson Andrés | |
| dc.date.accessioned | 2025-12-11T16:01:08Z | |
| dc.date.available | 2025-12-11T16:01:08Z | |
| dc.date.created | 2025-11-24 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/77045 | |
| dc.description | Tabla 1, Imágenes 55 | |
| dc.description.abstract | En este artículo se diseñó e implementó una arquitectura de seguridad perimetral para proteger los servidores de intranet (LAN) y extranet (WAN) mediante el uso de una zona DMZ, empleando Endian Firewall Community como plataforma central en VirtualBox; se configuraron tres interfaces de red: GREEN para la LAN, ORANGE para la DMZ y RED para la WAN simulada, definiendo un direccionamiento IP coherente para toda la infraestructura y común para los integrantes del grupo; se instaló una estación de trabajo GNU/Linux en la LAN con puerta de enlace hacia Endian y un servidor GNU/Linux en la DMZ destinado a hospedar servicios web finalmente se corroboró en la interfaz de Endian la creación y funcionamiento de las reglas NAT, dejando la plataforma lista para continuar con las temáticas de habilitación/denegación de servicios, reglas inter-zona y proxy. | |
| dc.format | ||
| dc.title | Diseño e Implementación de una Arquitectura Perimetral Segura con Dmz y Nat en Endian Firewall | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | Endian | |
| dc.subject.keywords | Firewall | |
| dc.subject.keywords | NAT | |
| dc.subject.keywords | GNU/Linux | |
| dc.subject.keywords | DMZ | |
| dc.subject.keywords | LAN | |
| dc.description.abstractenglish | In this article, a perimeter security architecture was designed and implemented to protect intranet (LAN) and extranet (WAN) servers through the use of a DMZ zone, Using Endian Firewall Community as the central platform in VirtualBox, three network interfaces were configured: GREEN for the LAN, ORANGE for the DMZ, and RED for the simulated WAN, defining consistent IP addressing for the entire infrastructure and common for the group members. A GNU/Linux workstation was installed on the LAN with a gateway to Endian, and a GNU/Linux server was installed in the DMZ to host web services. Finally, the creation and operation of the NAT rules were verified in the Endian interface, leaving the platform ready to continue with the topics of service enablement/denial, inter-zone rules, and proxy. | |
| dc.subject.category | Seguridad informatica | |
| dc.subject.category | Redes informaticas | |
| dc.subject.category | programación | |
| dc.subject.category | sistemas | |
| Appears in Collections: | Diplomado De Profundización En Administración De Sistemas Operativos Open Source Con Certificación En Linux | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| gaduenasp.pdf | 8.4 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
