Network Security System Analysis Using Access Control List (ACL)

Oris Krianto Sulaiman(1*), Darjat Saripurna(2),

(1) Universitas Islam Sumatera Utara
(2) STMIK Triguna Dharma
(*) Corresponding Author

Abstract


Communication using internet media is a mandatory requirement today to carry out various activities. Communication through the internet will pass through public access, where many people use public access. When communication is in progress, many things can happen before the message reaches its destination. One of them is the occurrence of hacking attempts from irresponsible parties. Therefore, it is necessary to secure the communication process, and many network security methods can be used to secure the communication process in the internet network. Access Control List or ACL is one method that can be used to secure communication in the network. ACL makes it easy to block specific devices and ports to prevent network communication. The results of the ACL implementation have the impact of avoiding access so that not all devices or protocols can access certain communications, thereby increasing network security in the process.


Full Text:

PDF

References


I. Anugrah and R. H. Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone,” PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic, vol. 5, no. 2, pp. 91–106, 2018, doi: 10.33558/piksel.v5i2.271.

D. B. Rendro, Ngatono, and W. N. Aji, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Software Nmap,” PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer, vol. 7, no. 2, pp. 108–115, 2020.

Z. Munawar, M. Kom, and N. I. Putri, “Keamanan Jaringan Komputer Pada Era Big Data,” Jurnal Sistem Informasi-J-SIKA, vol. 2, no. 1, pp. 1–7, 2020.

S. Ramadhani, U. Sultan Syarif Kasim Alamat, J. Koto Kociak Kecamatan Latina Payakumbuh Sumatera Barat, J. H. Soebrantas Kelurahan Simpang Baru No, and K. Tampan, “Analisis Sistem Keamanan Web Server Dan Database Server Menggunakan Suricata,” Seminar Nasional Teknologi Informasi Komunikasi dan Industri, vol. 0, no. 0, pp. 2579–5406, 2017, [Online]. Available: http://ejournal.uin-suska.ac.id/index.php/SNTIKI/article/view/3368.

M. I. S. Aryo Nur Utomo, ST, M.Kom1, “Implementasi Sistem Keamanan Server Menggunakan Honeypot Dan Raspberry Pi Terhadap Attacker,” Jurnal Rekayasa Informasi, vol. 7, no. 2, pp. 71–77, 2018.

S. Sudaryanto, “Implementation Port Security for Security Systems Network at the Computing Laboratory of Adisutjipto College of Technology,” Conference SENATIK STT Adisutjipto Yogyakarta, vol. 4, 2018, doi: 10.28989/senatik.v4i0.239.

A. Sutiman, Gunawan, “Firewall Port Security Switch Untuk Keamanan

Jaringan Komputer Menggunakan Cisco Router 1600S Pada Pt. Tirta Kencana Tata Warna Sukabumi,” CONTEN (Computer and Network Technology), vol. 1, no. 1, pp. 13–22, 2021.

O. K. Sulaiman, “Analisis Sistem Keamanan Jaringan dengan Menggunakan Switch Port Securitu,” Computer Engineering, System And Science, vol. 1, no. 1, pp. 9–14, 2016.

A. sopian Ahmad Fitriansyah, Alarik Andreansyah, “Penerapan Static Vlan Dan Access List,” vol. 5, no. 2, pp. 1–6, 2019, [Online]. Available: http://journal.thamrin.ac.id/index.php/jtik/article/view/176/120.

C. E. Suharyanto, “Analisis Penggunaan Access Control List (Acl) Dalam Jaringan Komputer Di Kawasan Batamindo Industrial Park Batam,” vol. 2, no. 2, pp. 122–128, 2019, doi: 10.31227/osf.io/8mt59.

M. Ariq Istiqlal, L. O. Sari, and I. T. Ali, “Perancangan Sistem Keamanan Jaringan TCP/IP Berbasis Virtual LAN dan Access Control List,” Jom FTEKNIK, vol. 3, no. 1, pp. 1–9, 2016.




DOI: https://doi.org/10.30645/ijistech.v5i2.131

Refbacks

  • There are currently no refbacks.







Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: