Modul 2b

Anda mungkin juga menyukai

Anda di halaman 1dari 3

Network Security

Lab. Modul 2 -- Assignment : Securing Router and Layer 2 Computer Network


Task 1 -- Router Security Element
a. Apa saja yang mendasari keamanan router baik dari segi internal dan eksternal?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
b. Sebutkan elemen-elemen yang baik untuk keamanan router!
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
c. Pada router cisco kemanan tidak hanya segi pemberian password terhadap akses namun juga
dibutuhkan untuk mengaktifkan enable secret. Bagaimana pemberian secret dapat membuat
router lebih aman?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
d. Pada router cisco kunci keamanan RSA dapat diset dengan angka 1024, 512, 2048. Apa maksud
angka tersebut dan bagaimana pengaruhnya pada keamanan router?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
e. Pada router cisco dimana kunci RSA tepat digunakan?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................

Dokumen Laboratorium Teknik Informatika


Universitas Muhammadiyah Malang @ 2012 -- Modul Praktikum Keamanan Jaringan

[1]

Task 2 -- Brute Force Handler


a. Lakukanlah tahapan konfigurasi pada cisco router untuk mencegah terjadinya bruteforce pada Lab.
Modul 2 -- Enhancement. Buat agar waktu yang dapat diterima untuk re-attack detection minimum
adalah 80 dan login dimatikan selama 30 detik. Tuliskan perintah yang anda gunakan!
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
b. Lakukan login sebanyak mungkin dengan waktu yang cukup dekat (<40s) melalui SSH atau Telnet.
Apa hasil output dari SSH?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
c. Aktifkan sistem log untuk merekam kegiatan router pada login. Lakukan serangan sekali lagi dan
lihat hasil log pada router. Bagaimana hasilnya?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
d. Lakukan modifikasi setting pada block-for dengan waktu yang anda tentukan!
minimum time

: .......

shutdown time

: .......

banyak serangan

: ..........

analisa :
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
e. Kesimpulan untuk penanganan bruteforce dan pandangan untuk sistem yang lain?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................

Dokumen Laboratorium Teknik Informatika


Universitas Muhammadiyah Malang @ 2012 -- Modul Praktikum Keamanan Jaringan

[2]

Task 3 : Switch Security and Layer 2 Security


a. Mengapa dibutuhkan keamanan akses pada mekanisme perangkat switch?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
b. Apa saja elemen yang perlu dipertimbangkan dalam mengamankan sebuah switch?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
c. Apa yang dimaksud trunk pada switch dan mengapa harus diamankan?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
d. Apa fungsi dari Bridge Protocol Data Unit (BPDU) dan mengapa harus diamankan?
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
e. Jelaskan kesimpulan untuk keamanan layer 2 yang anda pahami!
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................

Dokumen Laboratorium Teknik Informatika


Universitas Muhammadiyah Malang @ 2012 -- Modul Praktikum Keamanan Jaringan

[3]

Anda mungkin juga menyukai