Simulasi Extended ACL pada Jaringan VLAN Menggunakan Aplikasi Cisco Packet Tracer
DOI:
https://doi.org/10.24246/aiti.v20i1.32-47Keywords:
network, ACL, Extended ACL, Cisco Packet Tracer, VLANAbstract
Quality, appropriate, and good network security tools are needed to improve network quality and limit security threats on a computer network. This paper discusses the simulation of using Extended ACLs on VLAN networks using the Cisco Packet Tracer application on a computer network in order to be able to control each network user's access rights so that attack patterns and prevention are known. There are six stages carried out in this research: network analysis, network design, network development, network configuration, network testing, and analysis of test results. The results of the Extended ACL configuration that have been carried out can be used to identify and overcome spam by limiting the access rights of the VLAN network or access point network that has been used. Configured Extended ACLs can help routers precisely limit access rights on each VLAN network or access point network in determining which network addresses can connect and communicate with each other to access the FTP server and web server FTP.
Downloads
Metrics
References
I. Chaidir and R. R. Wirawan, “Pembatasan Akses Jaringan Internet Pada Clearos Menggunakan Metode Access Control List,” J. Tek. Komput. AMIK BSI, vol. 4, no. 1, pp. 212–216, 2018.
P. Simanjuntak et al., “Analisis Penggunaan Access Control List (ACL) Dalam Jaringan Komputer Di Kawasan,” J. Teknol. Inf. Politek. Telkom, vol. 1, no. 1, pp. 1–35, 2019, doi: .1037//0033-2909.I26.1.78.
P. M. Informatika, “Penerapan Static Vlan Dan Access List,” J. Teknol. Inform. Komput. Mohammad Husni Thamrin, vol. 5, no. 2, pp. 1–6, 2019.
L. Z. A. Mardedi and K. Marzuki, “Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP Dan Routing Protokol OSPF,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 18, no. 2, pp. 202–210, 2019, doi: 10.30812/matrik. v18i2.372.
S. A. Widodo and H. M. Jumasa, “Perancangan Jaringan LAN Pada Gedung Baru Smk Muhammadiyah Purwodadi Dengan Metode Waterfall Menggunakan Software Cisco Packet Tracer,” J. INTEK, vol. 2, pp. 1–7, 2019.
Z. Miftah, “Simulasi Keamanan Jaringan Dengan Metode Dhcp Snooping Dan Vlan,” Fakt. Exacta, vol. 11, no. 2, p. 167, 2018, doi: 10.30998/faktorexacta. v11i2.2456.
Rahmawati, “Konfigurasi Keamanan Jaringan Komputer Pada Router Dengan Metode Acl’ S,” J. Am. Chem. Soc., vol. 137, no. 5, pp. 1782–1785, 2015, doi: 10.1021/ja512498u.
M. Ariq Istiqlal, L. O. Sari, and I. T. Ali, “Perancangan Sistem Keamanan Jaringan TCP/IP Berbasis Virtual LAN dan Access Control List,” Jom FTEKNIK, vol. 3, no. 1, pp. 1–9, 2016.
H. A. Musril, “Extended Access List untuk Mengendalikan Trafik Jaringan,” J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 129–135, 2016, doi: 10.26418/jp.v2i2.17436.
E. S. Negara, “Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma,” J. Ilm., vol. 16, no. 1, p. 4, 2014.
A. T. Laksono and M. A. H. Nasution, “Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X,” J. Sist. Komput. dan Inform., vol. 1, no. 2, p. 83, 2020, doi: 10.30865/json.v1i2.1920.
Downloads
Published
How to Cite
Issue
Section
License
All articles published in AITI: Jurnal Teknologi Informasi is licensed under a Creative Commons Attribution 4.0 International License.