IMPLEMENTASI METODE ACCESS CONTROL LIST PADA MIKROTIK DALAM MENGAMANKAN JARINGAN INTERNET DI KANTOR LURAH AIR SELEMBA
DOI:
https://doi.org/10.55606/jutiti.v4i1.2880Keywords:
Mikrotik, Method Access Control List, Internet, NDLC, ACLAbstract
To meet the minnimum requirements of people who want to get information quickly and easily, the need for internet access is very high. Thus, we must continue to look for and strive for quality. There is a delay in communication and there is no filtering for devices connected to Office of Salemba’s internet. This is because there is no way to regulate the access rights for each device on the network, therefore it is necessary to implement the Access Control List (ACL) method on computer networks with the aim of making staff or employees more stable when working. In getting internet access, the development used is NDLC consisting of Analysis, Design, Prototyping Simulation, Implementation, Monitoring and Management. Data collection methods are literature study, observation and interviews. The routerboard that has been used is RB941-2nd. The results obtained from this research are that this method is very helpful in limiting the number of clients who get the internet and filtering unauthorized packets.
Downloads
References
M. Hafizhan, M. I. Wahyuddin, and R. T. Komalasari, “Implementasi Packet Filtering Menggunakan Metode Extended Access Control List ( ACL ) Pada Protokol EIGRP,” vol. 4, pp. 185–192, 2020, doi: 10.30865/mib.v4i1.1926.
B. K. Sihotang and B. E. Damanik, “Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara,” vol. 7, no. 2, pp. 229–234, 2020, doi: 10.30865/jurikom.v7i2.2010.
A. T. Laksono and M. A. H. Nasution, “Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X,” J. Sist. Komput. dan Inform., vol. 1, no. 2, p. 83, 2020, doi: 10.30865/json.v1i2.1920.
A. A. Saputra and I. W. Degeng, “Implementasi Access Control List Menggunakan Mikrotik Pada Smk Budi Mulia Tangerang,” Jurr n a l I D E A L I S, vol. 1, no. 5, pp. 401–408, 2019.
R. Amar, “Optimalisasi Menggunakan Access Control List Berbasis Mikrotik pada Amami Event Organizer,” vol. 7, no. 1, pp. 117–123, 2022.
F. Azmi, T. U. Kalsum, and H. Alamsyah, “Analysis and Application of Access Control List ( ACL ) Methods on Computer Networks Analisa dan Penerapan Metode Access Control List ( ACL ) pada Jaringan Komputer,” vol. 2, no. 1, pp. 81–88, 2022.
F. Yohaness, “Analisa Dan Perancangan Keamanan Jaringan Lokal Menggunakan Security Onion Dan Mikrotik,” J. Inf. Syst. Technol., vol. 01, no. 02, pp. 37–61, 2020, [Online]. Available: https://journal.uib.ac.id/index.php/joint/article/view/4309
M. Zhafir Rifqi, I. Sistem Keamanan Jaringan, M. Syahroni, and P. Teknologi Rekayasa Jaringan Telekomunikasi Jurusan Teknik Elektro Politeknik Negeri Lhokseumawe, “Implementasi Sistem Keamanan Jaringan Pada Mikrotik Rb-951 Menggunakan Metode Port Knocking,” J. Tektro, vol. 05, no. 02, pp. 165–173, 2021.
T. Gunawan, P. Studi, M. Informatika, P. Studi, M. Informatika, and I. K. Pesawaran, “Konfigurasi Gateway Server Pada Dinas Komunikasi Dan Informatika Kabupaten Pesawaran,” vol. 02, no. 01, pp. 1–7, 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Jurnal Teknik Informatika dan Teknologi Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.