Pemanfaatan Firewall dan Metode Queue Tree Sebagai Traffic Filtering Akses Pengguna Jaringan Internet

ilham Faisal(1*), T.M. Diansyah(2),

(1) Universitas Harapan Medan, Indonesia
(2) Universitas Harapan Medan, Indonesia
(*) Corresponding Author

Abstract


The use of internet networks that are not monitored and controlled with policies will certainly cause violations. Violations can include prohibited access, theft, and excessive bandwidth usage. Such as accessing sites that require bandwidth usage when opening online videos, games, downloading videos and so on. If in an office or workspace there are several computer users who do this, then other computers will experience problems with access to work. This research analyzes the use of firewalls in performing traffic filtering on the internet network with a focus on Layer 7 protocol filters. This research is expected to provide practical guidance for organizations or companies in making the right decisions regarding the use of Layer 7 protocol filters in their organization's network security strategy. In addition, the test results provide valuable insights for network administrators to optimize firewall configuration and improve internet access control as well as protection against network security threats. The test results show that the average traffic limit successfully implemented using Layer 7 protocol filters is approximately 14.5%. This result reflects the firewall's ability to distinguish and block certain applications or services running over the same application protocol.


Full Text:

PDF

References


S. Agustini And A. Mudzakir, “Rancang Bangun Jaringan Komputer Dengan Bandwidth Management Menggunakan Teknik Brust Limit Dan Firewall Sebagai Pengaman Jaringan,” Netw. Eng. Res. Oper., Vol. 4, No. 3, Pp. 189–195, 2019, [Online]. Available: Https://Nero.Trunojoyo.Ac.Id/Index.Php/Nero/Article/View/138.

A. Ainurridho And A. Suprianto, “Simulasi Jaringan Wireless Dan Management Bandwdith Dengan Metode Firewall Mangle Dan Queue Tree Untuk Priority Traffic,” J. Rekayasa Inf., Vol. 11, No. 1, Pp. 73–78, 2022, [Online]. Available: Https://Ejournal.Istn.Ac.Id/Index.Php/Rekayasainformasi/Article/View/1238.

Alfred And J. C. Chandra, “Pemanfaatan Firewall Pada Jaringan Komputer Smk Fadilah,” J. I D E A L I S, Vol. 1, No. 5, Pp. 422–428, 2018, [Online]. Available: Http://Jom.Fti.Budiluhur.Ac.Id/Index.Php/Idealis/Article/Download/1037/263.

T. M. Diansyah, I. Faisal, And D. Siregar, “Manajemen Pencegahan Serangan Jaringan Wireless Dari Serangan Man In The Middle Attack,” Kesatria J. Penerapan Sist. Inf. (Komputer Dan Manajemen), Vol. 4, No. 1, Pp. 224–233, 2023, [Online]. Available: Http://Tunasbangsa.Ac.Id/Pkm/Index.Php/Kesatria/Article/View/134.

F. Fitriastuti And D. P. Utomo, “Implementasi Bandwdith Management Dan Firewall System Menggunakan Mikrotik Os 2 . 9 . 27 Menurut Apjii , Meski Terjadi Pertumbuhan Pengguna Internet 2013 Dalam Jumlah Signifkan , Namun Untuk Dapat Memenuhi Tuntutan International Telecom Union ( Itu ) Yang,” J. Tek., Vol. 4, No. 1, Pp. 1–9, 2014.

E. A. P. Hadimirawan, “Analisis Manajemen Bandwidth Menggunakan Metode Htb (Hierarchical Token Bucket) Pada Dinas Pariwisata Provinsi Lampung,” J. Teknol. Pint., Vol. 3, No. 5, 2023, [Online]. Available: Http://Teknologipintar.Org/Index.Php/Teknologipintar/Article/View/405%0ahttp://Teknologipintar.Org/Index.Php/Teknologipintar/Article/Download/405/391

Mohammad Ferry Kurniawan And Sony Panca Budiarto, “Peningkatan Performa Jaringan Internet Rt Rw Net Di Dusun Warengan Desa Bubuk Menggunakan Metode Hierarchical Token Bucket,” Jikom J. Inform. Dan Komput., Vol. 9, No. 1, Pp. 72–90, 2022, Doi: 10.55794/Jikom.V9i1.39.

E. Sutanta And U. Lestari, “Perancangan Dan Implementasi User Manager Pada Hotspot Mikrotik Menggunakan Metode Queue Tree Tipe Pcq,” Jarkom, Vol. 7, No. 2, Pp. 2–9, 2019, [Online]. Available: Www.Speedtest.Net.

D. Wicaksono, “Firewall Sistem Keamanan Jaringan Menggunakan Firewall Dengan Metode Port Blocking Dan Firewall Filtering,” Jatisi (Jurnal Tek. Inform. Dan Sist. Informasi), Vol. 9, No. 2, Pp. 1380–1392, 2022, Doi: 10.35957/Jatisi.V9i2.2103.

S. Wildan Arif Hidayatulloh1, Hamzah Setiawan2, “Implementasi Jaringan Rt / Rw Net Menggunakan Metode Ip Binddings Dan Htb Untuk Usaha Menengah Kecil Mikro,” Kesatria Jurnalpenerapan Sist. Inf. (Komputer Manajemen), Vol. 4, No. 2, Pp. 323–332, 2023.




DOI: https://doi.org/10.30645/kesatria.v5i1.323

DOI (PDF): https://doi.org/10.30645/kesatria.v5i1.323.g320

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: