IMPLEMENTASI METODE ACCESS CONTROL LIST PADA MIKROTIK DALAM MENGAMANKAN JARINGAN INTERNET DI KANTOR LURAH AIR SELEMBA

Authors

  • Rahmat Sulaiman ISB Atma Luhur
  • Rab Sahf Al Fathul ISB Atma Luhur
  • Agustina Mardeka Raya ISB Atma Luhur

DOI:

https://doi.org/10.55606/jutiti.v4i1.2880

Keywords:

Mikrotik, Method Access Control List, Internet, NDLC, ACL

Abstract

To meet the minnimum requirements of people who want to get information quickly and easily, the need for internet access is very high. Thus, we must continue to look for and strive for quality. There is a delay in communication and there is no filtering for devices connected to Office of Salemba’s internet. This is because there is no way to regulate the access rights for each device on the network, therefore it is necessary to implement the Access Control List (ACL) method on computer networks with the aim of making staff or employees more stable when working. In getting internet access, the development used is NDLC consisting of Analysis, Design, Prototyping Simulation, Implementation, Monitoring and Management. Data collection methods are literature study, observation and interviews. The routerboard that has been used is RB941-2nd. The results obtained from this research are that this method is very helpful in limiting the number of clients who get the internet and filtering unauthorized packets.

References

M. Hafizhan, M. I. Wahyuddin, and R. T. Komalasari, “Implementasi Packet Filtering Menggunakan Metode Extended Access Control List ( ACL ) Pada Protokol EIGRP,” vol. 4, pp. 185–192, 2020, doi: 10.30865/mib.v4i1.1926.

B. K. Sihotang and B. E. Damanik, “Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara,” vol. 7, no. 2, pp. 229–234, 2020, doi: 10.30865/jurikom.v7i2.2010.

A. T. Laksono and M. A. H. Nasution, “Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X,” J. Sist. Komput. dan Inform., vol. 1, no. 2, p. 83, 2020, doi: 10.30865/json.v1i2.1920.

A. A. Saputra and I. W. Degeng, “Implementasi Access Control List Menggunakan Mikrotik Pada Smk Budi Mulia Tangerang,” Jurr n a l I D E A L I S, vol. 1, no. 5, pp. 401–408, 2019.

R. Amar, “Optimalisasi Menggunakan Access Control List Berbasis Mikrotik pada Amami Event Organizer,” vol. 7, no. 1, pp. 117–123, 2022.

F. Azmi, T. U. Kalsum, and H. Alamsyah, “Analysis and Application of Access Control List ( ACL ) Methods on Computer Networks Analisa dan Penerapan Metode Access Control List ( ACL ) pada Jaringan Komputer,” vol. 2, no. 1, pp. 81–88, 2022.

F. Yohaness, “Analisa Dan Perancangan Keamanan Jaringan Lokal Menggunakan Security Onion Dan Mikrotik,” J. Inf. Syst. Technol., vol. 01, no. 02, pp. 37–61, 2020, [Online]. Available: https://journal.uib.ac.id/index.php/joint/article/view/4309

M. Zhafir Rifqi, I. Sistem Keamanan Jaringan, M. Syahroni, and P. Teknologi Rekayasa Jaringan Telekomunikasi Jurusan Teknik Elektro Politeknik Negeri Lhokseumawe, “Implementasi Sistem Keamanan Jaringan Pada Mikrotik Rb-951 Menggunakan Metode Port Knocking,” J. Tektro, vol. 05, no. 02, pp. 165–173, 2021.

T. Gunawan, P. Studi, M. Informatika, P. Studi, M. Informatika, and I. K. Pesawaran, “Konfigurasi Gateway Server Pada Dinas Komunikasi Dan Informatika Kabupaten Pesawaran,” vol. 02, no. 01, pp. 1–7, 2021.

Downloads

Published

2024-01-19

How to Cite

Sulaiman, R., Al Fathul, R. S. ., & Raya, A. M. (2024). IMPLEMENTASI METODE ACCESS CONTROL LIST PADA MIKROTIK DALAM MENGAMANKAN JARINGAN INTERNET DI KANTOR LURAH AIR SELEMBA. Jurnal Teknik Informatika Dan Teknologi Informasi, 4(1), 75–85. https://doi.org/10.55606/jutiti.v4i1.2880

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.