specializationThesis
Implantação de ferramenta livre para controle e segurança de rede local
Fecha
2018-11-24Registro en:
SOUZA, Gian Marcel de. Implantação de ferramenta livre para controle e segurança de rede local. 2019. Trabalho de Conclusão de Curso (Especialização em Redes de Computadores) - Universidade Tecnológica Federal do Paraná, Pato Branco, 2019.
Autor
Souza, Gian Marcel de
Resumen
Technology has revolutionized and made life and business easier for everyone. The expansion and use of the most diverse services of search and generation of digital information occurs in a frantic way, consuming a dependence between people, corporations and Information Technology. In this way, seeking alternatives to promote security and increase the guarantee of continuity of services and access to information used within an organization, restricting access to only authorized persons, has become an elementary question for all business segments and dimensions of institutions . Thus, a study of Firewall tools was carried out that could provide additional layers of security to the local network of a company, to become the target of functional tests, finalizing in the implantation and configuration of this technique in the network of the organization. Due to the company under study being characterized as SOHO, at the moment it was chosen a security solution that did not involve high investments for acquisition of equipment, prerequisite of feasibility for project continuity. The distributions chosen for simulations were pfSense and Endian Firewall, both free tools and used in several scenarios, as verified during the development of the project. During the labs, it was possible to prove that the two distributions have a very good performance, additional packages that help in the configuration of network services, like FailOver, managed through administrative panel made available in web environment. After completing the tests in the distributions, there was the choice of Endian Firewall for use in the company network. With the correct configurations in the modules, evidenced in the results section, a more secure and controlled environment for the company was promoted, achieving success in the purposes initially identified and that would need to be remedied with the implementation of the security tool.