PEMODELAN IMPLEMENTASI FIREWALL SECURITY PORT DAN ACCESS CONTROL LIST UNTUK PENINGKATAN KEAMANAN JARINGAN INTRANET AUTOMATIC TERMINAL INFORMATION SERVICE
DOI:
https://doi.org/10.31004/jrpp.v8i2.46627Keywords:
Keamanan Jaringan, Firewall Security Port, Access Control List, ATIS, Cisco Packet Tracer.Abstract
Keamanan jaringan merupakan aspek penting dalam sistem informasi, khususnya pada infrastruktur vital seperti Automatic Terminal Information Service (ATIS). Sistem ini menyampaikan informasi navigasi dan komunikasi penerbangan yang bersifat sensitif dan kritikal. Penelitian ini bertujuan untuk memodelkan dan mengimplementasikan fitur firewall security port pada switch manageable serta Access Control List (ACL) pada router untuk meningkatkan keamanan jaringan intranet ATIS. Metode penelitian yang digunakan adalah eksperimen dengan simulasi jaringan melalui Cisco Packet Tracer. Pengujian dilakukan dalam dua skenario: sebelum dan sesudah penerapan fitur keamanan. Hasil penelitian menunjukkan bahwa firewall security port efektif dalam membatasi akses tidak sah dengan mengatur port switch, sedangkan ACL mampu menyaring lalu lintas berdasarkan aturan tertentu. Kombinasi kedua fitur ini terbukti meningkatkan keamanan jaringan, mengurangi risiko penyusupan, serta menjaga integritas dan kerahasiaan data.References
D. Dandegaokar, S. Katre, and S. V. More, “Automatic Terminal Information System (ATIS),” Int. J. Sci. Eng. Res., vol. 4, no. 4, 2016, [Online]. Available: https://www.ijser.in/archives/v4i4/IJSER15764.pdf?utm_source=chatgpt.com
W. Zhang, X. Li, and M. Chen, “A Study on Network Security via ACL Implementation,” IEEE Trans. Netw. Serv. Manag., 2020.
R. Gupta, D. Sharma, and N. Kumar, “Port Security Mechanisms in Network Switches,” J. Netw. Comput. Appl., pp. 231–245, 2022.
International Civil Aviation Organization (ICAO), Annex 11 to the Convention on International Civil Aviation – Air Traffic Services, 15th Editi. International Civil Aviation Organization (ICAO), 2019. [Online]. Available: https://www.icao.int/airnavigation
R. A. Al-Dhamari and M. Othman, “Design and Simulation of Network Security Using Cisco Packet Tracer,” vol. 11, no. 6, pp. 506–515, 2020, [Online]. Available: https://doi.org/10.14569/IJACSA.2020.0110659
S. McLeod, “Experimental Research,” Simply Psychol., 2019.
Cisco Systems, Cisco Networking Academy Course Materials on Access Control Lists (ACL). Cisco Systems, 2022. [Online]. Available: https://www.cisco.com
H. Chen, J. Wang, M. Zhang, and Z. Liu, A Comprehensive Study on Firewall and ACL Integration for Network Security. Journal of Information Security and Applications, 2018.
A. Kaur and S. Reddy, “Integration of Firewall and ACL for Enhanced Network Security,” Int. J. Comput. Appl., vol. 175,23, pp. 30–35, 2021.
J. W. Creswell and J. D. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 5th ed. Sage Publications, 2018.
D. Johnson, S. Williams, and A. Patel, “Advanced Network Defense Using Firewall and ACL,” Int. J. Cyber-Security Digit. Forensics, pp. 57–68, 2021.
S. William, Principles of Network and Security. McGraw-Hill Education, 2018.
M.-H. Lee and J.-H. Kim, “Enhancing Firewall Performance in Modern Networks,” pp. 102–110, 2019.
M. Raj and R. P. Gorthi, “Review on Modern Firewalls: Concepts, Types and Challenges,” IEEE Xplore, 2020.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 La Ode Muhammad Azlan, Muhammad Arif Sulaiman, Didik Sulistyo

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.




