Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941

Randi Rizal, Ruuhwan Ruuhwan, Kelvin Ajie Nugraha

Abstract

An important aspect of a network security system is maintaining data integrity and ensuring that it can be used by users safely. All types of attacks and countermeasures against network discovery attempts by unauthorized parties must be able to overcome efforts to protect network security systems. Firewall systems are used to solve this problem, but software-level attack errors cannot be protected by firewall systems. In this study, the implementation of port knocking and port blocking methods in the network was successfully carried out for data privacy issues. The port blocking method on the Mikrotik router permanently blocks the www port and the Winbox port using the services provided by the Mikrotik router. The port knocking method is more effective because it has rules for being able to enter the proxy server and access it remotely on the local network. The port knocking network implementation experiment applied to the Mikrotik router has enforced the winbox port, and www with 1-2-3 authentication flows with each authentication has a predetermined timeout time.

Keywords

keamanan jaringan; port blocking; port knocking; mikrotik; winbox

Full Text:

PDF

References

D. Irawan, “Keamanan jaringan komputer dengan metode blocking port pada laboratorium komputer program diploma-iii sistem informasi universitas muhammadiyah metro,” Manaj. Inform. Progr. Diploma III UM Metro, vol. 02, no. 05, pp. 1–9, 2015.

C. A. Pamungkas, “Manajemen bandwith menggunakan mikrotik routerboard di politeknik indonusa surakarta,” Inf. Politek. Indonusa Surakarta, vol. 1, pp. 3–8, 2016.

D. R. Suchendra, A. F. Rahman, and S. J. I. Ismail, “Penerapan sistem pengamanan port pada layanan jaringan menggunakan port knocking,” J. Lpkia, vol. 10, no. 2, pp. 45–50, 2017.

N. Firdaus and A. Fitriawan, “Implementasi Keamanan Mikrotik Menggunakan Metode Simple Port Knocking Pada SMAN 1 Ngantang,” vol. 9, pp. 133–140, 2018.

M. S. Maulana and M. Ryansyah, “Malware Security Menggunakan Filtering Firewall Dengan Metode Port Blocking Pada Mikrotik RB 1100AHx2,” J. Sist. dan Teknol. Inf., vol. 6, no. 3, p. 112, 2018.

A. Amarudin, “Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking,” J. Teknoinfo, vol. 12, no. 2, p. 72, 2018.

A. P. A. Kusuma and Asmunin, “Implementasi Simple Port Knocking Pada Dynamic Routing (OSPF) Menggunakan Simulasi GNS3,” J. Manaj. Inform., vol. 5, no. 2, pp. 7–17, 2016.

Wilman, I. Fitri, and N. D. Nathasia, “Port Knocking Dan Honeypot Sebagai Keamanan Jaringan Pada Sever Ubuntu Virtual,” vol. 3, no. 1, pp. 27–33, 2018.

A. Harbani and M. Apriani, “Pengembangan Notifikasi Email Untuk Keamanan Port Menggunakan Metode Port Knocking,” Teknois J. Ilm. Teknol. Inf. dan Sains, vol. 8, no. 2, pp. 25–36, 2019.

H. Muhammad, I. W. A. Arimbawa, and A. H. Jatmika, “Analisis Perbandingan Sistem Autentikasi Port Knocking Dan Single Packet Authorization Pada Server Raspbian,” J. Inform. dan Rekayasa Elektron., vol. 2, no. 1, p. 28, 2019.

Refbacks

  • There are currently no refbacks.