Implementasi Packet Filtering Menggunakan Metode Extended Access Control List (ACL) Pada Protokol EIGRP
DOI:
https://doi.org/10.30865/mib.v4i1.1926Keywords:
ACL, Access Control List, Penyaringan Paket, ACL Extended, Access ListAbstract
Maintaining security aspects is important for managing network performance so that it can provide optimal services for its users. The difficulty of managing data transmission on a local network (LAN) between two or more divisions, without disrupting data traffic on other divisions, is a major problem for companies. One effort that can be done is to implement an extended access list which is one part of the Access Control List (ACL) method. The extended ACL will be used as packet filtering for each workspace, such as the employee workspace and the manager's workspace. ACL will later run on the EIGRP protocol. the EIGRP protocol will be tested with delay parameters, and the results obtained that by applying the ACL method on EIGRP can provide the availability of networks that have smaller delays with an average of 90.4 ms.
References
I. Riadi, “Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik,†JUSI, vol. 1, no. 1, pp. 71–80, 2011.
A. D. Purwanto and M. Badrul, “Implementasi Access List Sebagai Filter Traffict Jaringan,†J. Tek. Komput. AMIK BSI, vol. II, no. 1, pp. 78–88, 2016.
S. Alabady, “Design and Implementation of a Network Security Model for Cooperative Network,†Int. Arab J. e-Technology, vol. 1, no. 2, pp. 26–36, 2009.
D. Thelis, R. S.; Lakshani, H. G. S.; Samarawickrama, S. S.; KavinMukesh, A.; Wickramasinghe, W. A. S. M.; Dhammearatchi, “Access-Agent-Improving-The-Performance-Of-Access-Control-Lists.pdf,†Int. J. Sci. Technol. RESEARCE, vol. 5, no. 04, pp. 143–150, 2016.
H. A. Musril, “Extended Access List untuk Mengendalikan Trafik Jaringan,†J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 129–135, 2016, doi: 10.26418/jp.v2i2.17436.
Y. D. J. Wismoaji and I. Riadi, “ANALISIS PERANCANGAN FIREWALL PAKET FILTERING DAN PROXY SERVER UNTUK OPTIMASI BANDWIDTH (Studi Kasus di Laboratorium Riset Universitas Ahmad Dahlan Kampus 3),†JSTIE (Jurnal Sarj. Tek. Inform., vol. 3, no. 1, pp. 89–97, 2015, doi: 10.12928/jstie.v3i1.2926.
I. Sutoyo and M. Wahyudi, “Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik,†PARADIGMA, vol. XI, no. 2, pp. 110–121, 2009.
S. Suman and E. A. Agrawal, “IP Traffic Management With Access Control List Using Cisco Packet Tracer,†Int. J. Sci. Eng. Technol. Res., vol. 5, no. 5, pp. 1556–1561, 2016.
S. K. Vishesh, S.; Tejas, C.; Tejaswini, V.; Apoorva, M.G.; Siddarth, S. B.; Samarth, “Access Control List: Route-Filtering and Traffic Control,†Int. J. Adv. Res. Comput. Commun. Eng., no. 7, pp. 364–369, 2017.
M. Ariq Istiqlal, L. O. Sari, and I. T. Ali, “Perancangan Sistem Keamanan Jaringan TCP/IP Berbasis Virtual LAN dan Access Control List,†Jom FTEKNIK, vol. 3, no. 1, pp. 1–9, 2016.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).
