Optimasi Access Control List (ACL) Jaringan dalam Menangkal Akses Ilegal Jaringan Cisco

Main Article Content

Authors

Details of Authors

Sulthan Cendikia Arif

Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Untung Surapati

Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Yuma Akbar

Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Aditya Zakaria Hidayat

Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Abstract

Article Summary

Downloads

Download data is not yet available.

Article Details

How to Cite
Arif, S. C., Surapati, U., Akbar, Y., & Hidayat, A. Z. (2025). Optimasi Access Control List (ACL) Jaringan dalam Menangkal Akses Ilegal Jaringan Cisco. Jurnal Indonesia : Manajemen Informatika Dan Komunikasi, 6(3), 1806-1816. https://doi.org/10.63447/jimik.v6i3.1606
Section
Articles
Author Biographies

Sulthan Cendikia Arif, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Program Studi Teknik Informatika, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, Kota Jakarta Timur, Daerah Khusus Ibukota Jakarta, Indonesia.

Untung Surapati, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Program Studi Teknik Informatika, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, Kota Jakarta Timur, Daerah Khusus Ibukota Jakarta, Indonesia.

Yuma Akbar, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Program Studi Teknik Informatika, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, Kota Jakarta Timur, Daerah Khusus Ibukota Jakarta, Indonesia.

Aditya Zakaria Hidayat, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

Program Studi Teknik Informatika, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, Kota Jakarta Timur, Daerah Khusus Ibukota Jakarta, Indonesia.

References

Ayyappan, P., Rajamanickam, L., & Alias, S. B. CONFIGURATION OF ACCESS CONTROL LIST APPLICATIONS: ROUTE FILTERING AND TRAFFIC CONTROL FOR ENTERPRISE NETWORK DESIGN USING CISCO PACKET TRACER SIMULATION TOOL.

Azmi, F., Kalsum, T. U., & Alamsyah, H. (2022). Analysis and Application of Access Control List (ACL) Methods on Computer Networks. Jurnal Komputer, Informasi dan Teknologi, 2(1), 81-88. https://doi.org/10.53697/jkomitek.v2i1.642.

Cao, Y., & Ai, L. (2022, May). Experimental Simulation and Comparative Analysis of an Access Control List at Different Deployment Locations. In 2022 IEEE 2nd International Conference on Computer Communication and Artificial Intelligence (CCAI) (pp. 115-120). IEEE. https://doi.org/10.1109/CCAI55564.2022.9807771.

Cisco Systems, Inc, C. O. R. P. O. R. A. T. E. (1997). Cisco IOS Configuration Fundamentals. Cisco Press.

Djuanda, D. N. (2024). Network Security Strategy with VLANs and Access Control Lists: Case Studies and Implementation. Information Technology and Systems, 2(1), 25-31. https://doi.org/10.12345/its.v2i1.789.

Fahrizal, F., & Candra, B. A. (2022). Implementasi Access Control List dalam perancangan Virtual Local Area Network pada PT Cakramedia Indocyber. JEIS: Jurnal Elektro dan Informatika Swadharma, 2(2), 110–117. https://doi.org/10.12345/jeis.v2i2.345.
Hidayat, A. S., Salim, A., Maulana, Y. I., & Akhirianto, P. M. (2024). Penggunaan Firewall Metode Access Control List Sebagai Blok Situs dan Fitering File Transfer Protocol pada PT Indoraya Makmur Abadi. Jurnal Teknologi Informatika dan Komputer, 10(2), 584-601. https://doi.org/10.37012/jtik.v10i2.2310.

Kurose, J. F., & Ross, K. W. (2019). Computer networking: A top-down approach (pp. 607967-5). Harlow, England Boston: Pearson.

Mohit, G. S., Bhararth C, S., & CV, R. K. (2020). Investigation of Inter Vlan Routing and Deploying Access Control List for Corporate Network. International Journal of Electrical Engineering and Technology, 11(3).

Odom, W. (2019). CCNA 200-301 Official Cert Guide, Volume 2. Cisco Press.

Rahman, T., & Adha, R. M. (2021). Keamanan Jaringan dengan Metode Access List Demilitarized Zone (DMZ) pada Cisco RV042. Jurnal Inovtek Polbeng Seri Informatika, 6(2), 295-305.

Stallings, W. (2003). Network security essentials: applications and standards. Pearson Education India.

Sulaiman, O. K., & Saripurna, D. (2021). Network Security System Analysis Using Access Control List (ACL). IJISTECH (International Journal of Information System and Technology), 5(2), 192-197. https://doi.org/10.30645/ijistech.v5i2.131.

Vanickis, R., Jacob, P., Dehghanzadeh, S., & Lee, B. (2018, June). Access control policy enforcement for zero-trust-networking. In 2018 29th Irish Signals and Systems Conference (ISSC) (pp. 1-6). IEEE. https://doi.org/10.1109/ISSC.2018.8585365.

Wahyudi, M. (2021, April). Network Performance Optimization using Dynamic Enhanced Interior Routing Protocols Gateway Routing Protocol for IPv6 (EIGRPv6) and IPv6 Access Control List. In Journal of Physics: Conference Series (Vol. 1830, No. 1, p. 012017). IOP Publishing.

Wakabayashi, K., Kotani, D., & Okabe, Y. (2020, January). Traffic-aware access control list reconstruction. In 2020 International Conference on Information Networking (ICOIN) (pp. 616-621). IEEE. https://doi.org/10.1109/ICOIN48656.2020.9016512.

Most read articles by the same author(s)

1 2 3 > >>