Optimasi Access Control List (ACL) Jaringan dalam Menangkal Akses Ilegal Jaringan Cisco
Main Article Content
Abstract
Article Summary
This study examines how to block unauthorized access while keeping services available in an enterprise network. The approach combines Access Control Lists (ACLs) allow/deny rules on routers and Policy-Based Routing (PBR), which steers specific traffic without changing the main routing setup. The object of study is a lab simulation with four understandable parts: a central network (head office), an applications/services network, a provider/carrier network, and an external network (internet/partners). The method evaluates three scenarios: baseline, ACL, and ACL + PBR, in a virtual environment using straightforward measurements (ping, traceroute, and rule/route activity logs). Results show the internal subnet is closed in both directions as required; the legitimate path from the central network to the services network remains available and balanced via the provider network; there is no route leakage from the external network to unauthorized areas; and PBR successfully guides specific flows without disrupting the primary path. In conclusion, combining ACL + PBR effectively strengthens security while maintaining service availability, serving as a practical guide for multi-domain enterprise networks.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-BY 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
References
Azmi, F., Kalsum, T. U., & Alamsyah, H. (2022). Analysis and Application of Access Control List (ACL) Methods on Computer Networks. Jurnal Komputer, Informasi dan Teknologi, 2(1), 81-88. https://doi.org/10.53697/jkomitek.v2i1.642.
Cao, Y., & Ai, L. (2022, May). Experimental Simulation and Comparative Analysis of an Access Control List at Different Deployment Locations. In 2022 IEEE 2nd International Conference on Computer Communication and Artificial Intelligence (CCAI) (pp. 115-120). IEEE. https://doi.org/10.1109/CCAI55564.2022.9807771.
Cisco Systems, Inc, C. O. R. P. O. R. A. T. E. (1997). Cisco IOS Configuration Fundamentals. Cisco Press.
Djuanda, D. N. (2024). Network Security Strategy with VLANs and Access Control Lists: Case Studies and Implementation. Information Technology and Systems, 2(1), 25-31. https://doi.org/10.12345/its.v2i1.789.
Fahrizal, F., & Candra, B. A. (2022). Implementasi Access Control List dalam perancangan Virtual Local Area Network pada PT Cakramedia Indocyber. JEIS: Jurnal Elektro dan Informatika Swadharma, 2(2), 110–117. https://doi.org/10.12345/jeis.v2i2.345.
Hidayat, A. S., Salim, A., Maulana, Y. I., & Akhirianto, P. M. (2024). Penggunaan Firewall Metode Access Control List Sebagai Blok Situs dan Fitering File Transfer Protocol pada PT Indoraya Makmur Abadi. Jurnal Teknologi Informatika dan Komputer, 10(2), 584-601. https://doi.org/10.37012/jtik.v10i2.2310.
Kurose, J. F., & Ross, K. W. (2019). Computer networking: A top-down approach (pp. 607967-5). Harlow, England Boston: Pearson.
Mohit, G. S., Bhararth C, S., & CV, R. K. (2020). Investigation of Inter Vlan Routing and Deploying Access Control List for Corporate Network. International Journal of Electrical Engineering and Technology, 11(3).
Odom, W. (2019). CCNA 200-301 Official Cert Guide, Volume 2. Cisco Press.
Rahman, T., & Adha, R. M. (2021). Keamanan Jaringan dengan Metode Access List Demilitarized Zone (DMZ) pada Cisco RV042. Jurnal Inovtek Polbeng Seri Informatika, 6(2), 295-305.
Stallings, W. (2003). Network security essentials: applications and standards. Pearson Education India.
Sulaiman, O. K., & Saripurna, D. (2021). Network Security System Analysis Using Access Control List (ACL). IJISTECH (International Journal of Information System and Technology), 5(2), 192-197. https://doi.org/10.30645/ijistech.v5i2.131.
Vanickis, R., Jacob, P., Dehghanzadeh, S., & Lee, B. (2018, June). Access control policy enforcement for zero-trust-networking. In 2018 29th Irish Signals and Systems Conference (ISSC) (pp. 1-6). IEEE. https://doi.org/10.1109/ISSC.2018.8585365.
Wahyudi, M. (2021, April). Network Performance Optimization using Dynamic Enhanced Interior Routing Protocols Gateway Routing Protocol for IPv6 (EIGRPv6) and IPv6 Access Control List. In Journal of Physics: Conference Series (Vol. 1830, No. 1, p. 012017). IOP Publishing.
Wakabayashi, K., Kotani, D., & Okabe, Y. (2020, January). Traffic-aware access control list reconstruction. In 2020 International Conference on Information Networking (ICOIN) (pp. 616-621). IEEE. https://doi.org/10.1109/ICOIN48656.2020.9016512.