Implementasi Packet Filtering Menggunakan Metode Extended Access Control List (ACL) Pada Protokol EIGRP

Authors

  • Muhammad Hafizhan Universitas Nasional, Jakarta
  • Moh Iwan Wahyuddin Universitas Nasional, Jakarta
  • Ratih Titi Komalasari Universitas Nasional, Jakarta

DOI:

https://doi.org/10.30865/mib.v4i1.1926

Keywords:

ACL, Access Control List, Penyaringan Paket, ACL Extended, Access List

Abstract

Maintaining security aspects is important for managing network performance so that it can provide optimal services for its users. The difficulty of managing data transmission on a local network (LAN) between two or more divisions, without disrupting data traffic on other divisions, is a major problem for companies. One effort that can be done is to implement an extended access list which is one part of the Access Control List (ACL) method. The extended ACL will be used as packet filtering for each workspace, such as the employee workspace and the manager's workspace. ACL will later run on the EIGRP protocol. the EIGRP protocol will be tested with delay parameters, and the results obtained that by applying the ACL method on EIGRP can provide the availability of networks that have smaller delays with an average of 90.4 ms.

Author Biographies

Muhammad Hafizhan, Universitas Nasional, Jakarta

Fakultas Teknologi Komunikasi dan Informatika, Informatika

Moh Iwan Wahyuddin, Universitas Nasional, Jakarta

Fakultas Teknologi Komunikasi dan Informatika, Informatika

Ratih Titi Komalasari, Universitas Nasional, Jakarta

Fakultas Teknologi Komunikasi dan Informatika, Informatika

References

I. Riadi, “Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik,†JUSI, vol. 1, no. 1, pp. 71–80, 2011.

A. D. Purwanto and M. Badrul, “Implementasi Access List Sebagai Filter Traffict Jaringan,†J. Tek. Komput. AMIK BSI, vol. II, no. 1, pp. 78–88, 2016.

S. Alabady, “Design and Implementation of a Network Security Model for Cooperative Network,†Int. Arab J. e-Technology, vol. 1, no. 2, pp. 26–36, 2009.

D. Thelis, R. S.; Lakshani, H. G. S.; Samarawickrama, S. S.; KavinMukesh, A.; Wickramasinghe, W. A. S. M.; Dhammearatchi, “Access-Agent-Improving-The-Performance-Of-Access-Control-Lists.pdf,†Int. J. Sci. Technol. RESEARCE, vol. 5, no. 04, pp. 143–150, 2016.

H. A. Musril, “Extended Access List untuk Mengendalikan Trafik Jaringan,†J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 129–135, 2016, doi: 10.26418/jp.v2i2.17436.

Y. D. J. Wismoaji and I. Riadi, “ANALISIS PERANCANGAN FIREWALL PAKET FILTERING DAN PROXY SERVER UNTUK OPTIMASI BANDWIDTH (Studi Kasus di Laboratorium Riset Universitas Ahmad Dahlan Kampus 3),†JSTIE (Jurnal Sarj. Tek. Inform., vol. 3, no. 1, pp. 89–97, 2015, doi: 10.12928/jstie.v3i1.2926.

I. Sutoyo and M. Wahyudi, “Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik,†PARADIGMA, vol. XI, no. 2, pp. 110–121, 2009.

S. Suman and E. A. Agrawal, “IP Traffic Management With Access Control List Using Cisco Packet Tracer,†Int. J. Sci. Eng. Technol. Res., vol. 5, no. 5, pp. 1556–1561, 2016.

S. K. Vishesh, S.; Tejas, C.; Tejaswini, V.; Apoorva, M.G.; Siddarth, S. B.; Samarth, “Access Control List: Route-Filtering and Traffic Control,†Int. J. Adv. Res. Comput. Commun. Eng., no. 7, pp. 364–369, 2017.

M. Ariq Istiqlal, L. O. Sari, and I. T. Ali, “Perancangan Sistem Keamanan Jaringan TCP/IP Berbasis Virtual LAN dan Access Control List,†Jom FTEKNIK, vol. 3, no. 1, pp. 1–9, 2016.

Downloads

Published

2020-01-29