Main Article Content

Niar Adisty Putra
Verry Riyanto
Ganda Wijaya
Nuraeni Herlinawati

Abstract

The need for real-time information is very important, to get it quickly and even in real time it must be supported by a fast and stable internet network connection. In addition, it must also be able to protect the network connection from all kinds of threats that can interfere with the connectivity of the connection. In implementing the firewall within the company, the concern is the device used, because the implementation of the firewall on each device is different. Utilization of this firewall is used to filter data packets that will enter the network, using the ACL feature. By using ACL data filtering can be done or as a site blocker that is considered unnecessary to be accessed by all clients on the local network. In addition, as security in the local network, the logical division of network groups can be applied using VLANs, the application of VLANs is found on Catalist Switches or Multilayer Switches. As a security for the physical path of the VLAN connection, a special physical connection path is given to important network devices, so that if there is a down or disconnected physical path, it does not interfere with other VLAN connections

Downloads

Download data is not yet available.

Article Details

How to Cite
Putra, N. A. . ., Riyanto, V. . ., Wijaya, G. and Herlinawati, N. . . (2021) “Firewall Design Using Access Control List Method As Data Filtering”, Jurnal Mantik, 5(3), pp. 1684-1693. Available at: https://iocscience.org/ejournal/index.php/mantik/article/view/1745 (Accessed: 24April2026).
References
[1] D. B. Rendro, Ngatono, and W. N. Aji, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Software Nmap,” PROSISKO J. Pengemb. Ris. dan Obs. Sist. Komput., vol. 7, no. 2, pp. 108–115, 2020.
[2] J. E. W. Prakasa, “Konsep Dasar jaringan,” no. Oktober, p. 106, 2018.
[3] D. Alfurqon and S. Assegaff, “Analisis Dan Perancangan Jaringan Local Area Network Pada Laboratorium Smk Negeri 1 Kota Jambi,” J. Manaj. Sist. Inf., vol. 3, no. 3, pp. 1149–1163, 2018.
[4] Y. Faodiansyah, K. Amron, and E. S. Pramukantoro, “Analisis dan Perbandingan Performansi File Sharing Peer-to-Peer Menggunakan Framework JXTA dan Gnutella,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 10, pp. 3771–3778, 2018, [Online]. Available: https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/2732/1016.
[5] Putra, “TOPOLOGI JARINGAN?: Pengertian, Macam Macam Topologi & Kelebihan Kekurangannya,” Salamadian, 2019, [Online]. Available: https://salamadian.com/topologi-jaringan-komputer/.
[6] M. R. Redi Mulyana, “APLIKASI PENGGAJIAN KARYAWAN BERBASIS CLIENT-SERVER PADA PT RADIO NASIONAL BUANA SUARA,” J. Ilm. Ilmu Ekon., vol. 4, pp. 9–15, 2017, [Online]. Available: http://eprints.ummi.ac.id/64/3/Aplikasi Penggajian Karyawan Berbasis Client-Server Pada PT. Radio Nasional Buana Suara.pdf.
[7] I. Efendi, “Apa yang dimaksud dengan server,” [Online]. Available: https://www.it-jurnal.com/apa-yang-di-maksud-dengan-server/.
[8] Zakaria, “15 Perangkat Jaringan Komputer Beserta Pengertian,” [Online]. Available: https://www.it-jurnal.com/apa-yang-di-maksud-dengan-server/.
[9] Y. Ardian, “Buku Ajar Modul 1 Mikrotik Operating System Jaringan Komputer,” Univ. Kanjuruhan Malang - Fak. Teknol. Inf., pp. 1–105, 2015, [Online]. Available: https://repository.unikama.ac.id/378/1/Modul Jarkom ISBN.pdf.
[10] A. Hidayat, “Perancangan Virtual Local Area Network (VLAN) Pada Lab Komputer D-III Sistem Informasi Universitas Muhammadiyah Metro (UM Metro),” Konf. Nas. Sist. Inf., pp. 739–745, 2018, [Online]. Available: http://jurnal.atmaluhur.ac.id/index.php/knsi2018/article/view/442.
[11] Y. D. Noviani, “Analisis Pengembangan Virtual Local Area Network ( VLAN ) di SMK Asy-Syarifiy Pandanwangi - Lumajang,” vol. 02, no. 02, pp. 61–66, 2020, [Online]. Available: https://jurnal.stmik-amikbandung.ac.id/joint/article/download/31/22/105.
[12] M. Sabara and M. Sungkar, “Flashing Interconnecting Operating System (Ios) Pada Router Cisco 1841 Series Untuk Membangun Isp Dengan Sistem Pppoe Pada Client Di Arg Media Data,” Power Elektron. J. Orang Elektro, vol. 8, no. 1, pp. 1–4, 2019, doi: 10.30591/polektro.v8i1.1495.
[13] A. Setyawan, “Address Menggunakan Metode Access List Control Pada Router Cisco,” J. Tek. Komput. Amik BSI, vol. III, no. 1, pp. 60–73, 2017, [Online]. Available: https://ejournal.bsi.ac.id/ejurnal/index.php/jtk/article/view/1344/1093.
[14] S. Samuel Tampi, S. Raharjo, and M. Sholeh, “PERANCANGAN JARINGAN KOMPUTER PADA RUMAH SAKIT SOEDARSONO DARMOSOEWITO DI BATAM DESIGN OF COMPUTER NETWORK AT SOEDARSONO DAMOSOEWITO IN BATAM Stefanus Samuel Tampi,” J. JARKOM, vol. 7, no. 1, pp. 137–152, 2018, [Online]. Available: http://download.garuda.ristekdikti.go.id/article.php?article=975068&val=6284&title=PERANCANGAN JARINGAN KOMPUTER PADA RUMAH SAKIT SOEDARSONO DARMOSOEWITO DI BATAM DESIGN OF COMPUTER NETWORK AT SOEDARSONO DAMOSOEWITO IN BATAM.
[15] J. Pastima Simanjuntak, Cosmas Eko Suharyanto, “Analisis Penggunaan Access Control List (Acl) Dalam Jaringan Komputer Di Kawasan Batamindo Industrial Park Batam,” vol. 2, no. 2, pp. 122–128, 2019, doi: 10.31227/osf.io/8mt59.
[16] I. W. D. Alfian Aji Saputra, “Implementasi Access Control List Menggunakan Mikrotik Pada Smk Budi Mulia Tangerang,” Jurr n a l I D E A L I S, vol. 1, no. 5, pp. 401–408, 2019.
[17] S. N. M. P. Simamora, N. Hendrarini, E. Lya, and U. Sitepu, “Metode Access Control List sebagai Solusi Alternatif Seleksi Permintaan Layanan Data pada Koneksi Internet,” J. Teknol. Inf. Politek. Telkom, vol. 1, no. 1, 2011.
[18] R. R. R. B. Wijonarko, “Implementasi Virtual Local Area Network Dengan Switch,” vol. 14, no. 2, pp. 203–210, 2020, [Online]. Available: https://ejournal.nusamandiri.ac.id/index.php/inti/article/view/1225/613.