Pengembangan Firewall Mikrotik dalam Blocking Akses untuk Meningkatkan Keamanan Jaringan Kantor Desa Cibalandong Subang
DOI:
https://doi.org/10.30646/sinus.v23i1.853Keywords:
Firewall, Mikrotik, Blocking, Security, NetworkAbstract
Network security is a crucial aspect in protecting data and communications from external threats, especially in a village office environment that manages important information. This study aims to develop and implement a Mikrotik firewall to improve network security at the Cibalandong Village Office, Subang, with a focus on optimizing access blocking. The research methodology includes a literature study on the basic principles of firewalls and Mikrotik, analysis of specific needs of the Cibalandong Village Office, design and implementation of firewall configurations, and evaluation of system performance. The Mikrotik firewall configuration is designed to block unauthorized access while ensuring stable and efficient network connectivity. The test results show that the Mikrotik firewall successfully blocks unwanted access according to the rules applied, without reducing network performance. In addition, functional testing such as NAT, VPN, and QoS ensure that these features function as expected, and the system shows good recovery capabilities in the face of potential disruptions. Thus, the Mikrotik firewall proves to be an effective solution to improve network security at the Cibalandong Village Office. This study emphasizes the importance of implementing a proper network security system and shows that the Mikrotik firewall can be relied on to meet the needs of protection and access management in the context of a village office network. These findings support the use of Mikrotik firewall as an optimal tool to ensure network security and performance in similar environments.
References
Diansyah, T. M., Faisal, I., Lubis, A. J., & Chailoto, C. (2019). Pemanfaatan Layer 7 Pada Mikrotik Untuk Manajemen Bandwidth dan Blocking Situs. Seminar Nasional Teknologi Komputer & Sains (SAINTEKS), 610–614. https://seminar-id.com/semnas-sainteks2019.html
Fritz Gamaliel, & P. Yudi Dwi Arliyanto. (2022). Perancangan Manajemen Jaringan Komputer Berbasis Mikrotik Dengan Menggunakan Top Down Network Design. Jurnal Informatika Dan Rekayasa Elektronik, 5(2), 230–243. https://doi.org/10.36595/jire.v5i2.693
I. P. Saputra, E. U. and A. H. M. (2022). Comparison of Anomaly Based and Signature Based Methods in Detection of Scanning Vulnerability. 2022 9th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 221–225. https://doi.org/10.23919/EECSI56542.2022.9946485
Jamalul’ain, A., & Nurdiawan, O. (2022). OPTIMALISASI KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN METODE KNOCKING PORT BERBASIS MIKROTIK (Studi Kasus: CV. Mitra Indexindo Pratama). Jurnal Mahasiswa Teknik Informatika), 6(2), 560–570.
Muzakir, A., & Ulfa, M. (2019). Analisis Kinerja Packet Filtering Berbasis Mikrotik Routerboard Pada Sistem Keamanan Jaringan. Simetris: Jurnal Teknik Mesin, Elektro Dan Ilmu Komputer, 10(1), 15–20. https://doi.org/10.24176/simet.v10i1.2646
Rozan, M. A., Tahir, M., Qirani, A. P., Rizqiullah, N., Veranda, M., Puji, R., & Ghaffar, A. (2024). Implementasi Web Proxy Pada Mikrotik Untuk Mengoptimalkan Keamanan Jaringan Wireless Lan Di Lingkungan Sekolah Man 1 Gresik. Jurnal Pendidikan Teknologi Informasi (JUKANTI), 7(1), 180–188. https://doi.org/10.37792/jukanti.v7i1.1280
Sulistyo, W., & Sartomo, S. (2022). Model Keamanan Jaringan Menggunakan Firewall Port Blocking. Krea-TIF: Jurnal Teknik Informatika, 10(1), 10–18. https://doi.org/10.32832/kreatif.v10i1.6678
Sutarti, Siswanto, & Bachtiar, A. (2023). Analisis Web Phishing Menggunakan Metode Network Forensic Dan Block Access Situs Dengan Router Mikrotik. PROSISKO: Jurnal Pengembangan Riset Dan Observasi Sistem Komputer, 10(1), 71–83. https://doi.org/10.30656/prosisko.v10i1.7048
Syaripudin, A., & Nugraha, A. (2023). Analisa Dan Implementasi Blocking Website Dengan Metode 7 Layer Pada Perangkat Mikrotik Di Garage Freshmart: Analisa Dan Implementasi Blocking Website Dengan Metode 7 Layer Pada Perangkat Mikrotik Di …. Jurnal Informatika MULTI, 1(4), 447–455. https://jurnal.publikasitecno.id/index.php/multi/article/view/91%0Ahttps://jurnal.publikasitecno.id/index.php/multi/article/download/91/59
Yel, M. B., Mulyana, D. I., F, J. R., Nurfaishal, M. D., & B, M. H. T. (2023). Optimalisasi Keamanan Firewall Pada Infrastruktur Jaringan Smk Idn Bogor. Jurnal Cahaya Mandalika, 4(1), 594–610. https://www.ojs.cahayamandalika.com/index.php/JCM/article/view/1393
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Â

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.









