Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara

 (*)Bil Klinton Sihotang Mail (STIKOM Tunas Bangsa, Pematangsiantar, Indonesia)
 Sumarno Sumarno (STIKOM Tunas Bangsa, Pematangsiantar, Indonesia)
 Bahrudi Efendi Damanik (STIKOM Tunas Bangsa, Pematangsiantar, Indonesia)

(*) Corresponding Author

DOI: http://dx.doi.org/10.30865/jurikom.v7i2.2010

Abstract

The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements

Keywords


Computer Network, Access Control List, Microtik, Router, Winbox

Full Text:

PDF


Article Metrics

Abstract view : 147 times
PDF - 93 times

References

I. K. Bayu, M. Yamin, and L. F. Aksara, “Analisa Keamanan Jaringan Wlan Dengan Metode Penetration Testing (Studi Kasus: Laboratorium Sistem Informasi dan Programming Teknik Informatika UHO,” SemanTIK, vol. 3, no. 2, pp. 69–78, 2017.

P. Simanjuntak et al., “Analisis Penggunaan Access Control List ( Acl ) Dalam Jaringan Komputer Di Kawasan,” J. Teknol. Inf. Politek. Telkom, vol. 1, no. 1, pp. 1–35, 2019, doi: .1037//0033-2909.I26.1.78.

Herawati and N. Mintarsih, “PENINGKATAN KEAMANAN APLIKASI KONTROL DENGAN MENGGUNAKAN METODE FIREWALLDAN KASPERSKY ENDPOINT SECURITY 8 ABSTRAK,” vol. 7, no. 11, pp. 30–33, 2014.

S. Suman and A. Agrawal, “IP Traffic Management With Access Control List Using Cisco Packet Tracer,” Int. J. Sci. Eng. Technol. Res., vol. 5, no. 5, pp. 2278–7798, 2016.

A. Malik, L. F. Aksara, and M. Yamin, “Perbandingan Metode Simple Queues Dan Queues Tree Untuk Optimasi Manajemen Bandwidth Menggunakan Mikrotik (Studi Kasus: Pengadilan Tinggi Agama Kendari),” semanTIK, vol. 3, no. 2, pp. 1–8, 2017.

E. D. Meutia, “Internet of Things – Keamanan dan Privasi,” Semin. Nas. dan Expo Tek. Elektro 2015, pp. 85–89, 2015.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 JURIKOM (Jurnal Riset Komputer)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JURIKOM (Jurnal Riset Komputer)

STMIK BUDI DARMA
Website : http://ejurnal.stmik-budidarma.ac.id/index.php/jurikom
Email : jurikom.stmikbd@gmail.com

Creative Commons License
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Attribution 4.0 International.