Extended Access List

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 9 Experts worldwide ranked by ideXlab platform

Hari Antoni Musril - One of the best experts on this subject based on the ideXlab platform.

  • Extended Access List untuk mengendalikan trafik jaringan
    Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2016
    Co-Authors: Hari Antoni Musril
    Abstract:

    Keamana jaringan komputer saat ini menjadi hal penting untuk diterapkan. Banyak organisasi yang telah menjadikan teknologi informasi sebagai bahagian penting dalam menunjang aktivitasnya. Akses pengguna yang tidak dibatasi menjadi ancaman bagi sebuah organisasi, karena banyak data dan informasi penting yang tersebar dalam perangkat jaringan komputer di organisasi tersebut dapat disusupi oleh pihak yang tidak berwenang. Salah satu usaha yang dapat dilakukan adalah dengan menerapkan Extended Access List yang merupakan salah satu bagian dari metode Access control List . Extended Access List dapat menyaring lalu lintas data suatu jaringan dengan mengontrol apakah paket-paket tersebut dilewatkan atau dihentikan. Extended Access List juga dapat menjamin keamanan untuk setiap komputer sehingga jalur komunikasi serta hak akses setiap komputer dapat berjalan dengan baik. Extended Access List memungkinkan penyaringan berdasarkan sumber atau alamat tujuan, protokol yang dipilih, port yang digunakan, dan apakah koneksi sudah ditetapkan. Tulisan ini membahas penerapan Extended Access List dalam jaringan supaya dapat melakukan filter terhadap paket data yang melewati jaringan. Penerapannya menggunakan software Packet Tracer 6.1.1 untuk membuat prototipe jaringan dan mensimulasikannya. Sehingga nanti dapat diterapkan pada jaringan yang sebenarnya. List yang dibangun pada penelitian ini diterapkan untuk protokol antara lain : TCP (WWW, FTP, Telnet, SMTP, POP3), UDP (DNS), dan ICMP (Ping). Hasilnya didapatkan Extended Access List yang dikonfigurasi pada router dalam topologi penelitian ini mampu melakukan filter terhadap paket yang melewati jaringan. Hasil konfigurasinya sangat spesifik, sehingga penerapan hak akses permit dan deny dapat dilakukan sesuai dengan aturan dan skenario yang dirancang.

Yulia Charli - One of the best experts on this subject based on the ideXlab platform.

  • Extended Access List generator applications using delphi
    Faculty of Industrial Technology, 2011
    Co-Authors: Justus Pradana Adityawan, Yulia Charli
    Abstract:

    Security is one requirement for a network. Moreover, when the network accommodates data traffic is important. One first step is to use network security Access control List (ACL) on routers. This program can generate a command line Access control Lists in accordance with the needs of the network. Method for making Access control Lists using the interface which shaped wizard for easy use. Users just choose the Access control Lists from the menu that is available then the program makes the results of data entered. In making this program, used Delphi programming language and an additional software network simulator, namely the Packet Tracer. The reason the author using Delphi, since Delphi language comes from the PASCAL language easy to learn. In addition DELPHI has an intuitive syntax. Bibliography (2001 2005).

Justus Pradana Adityawan - One of the best experts on this subject based on the ideXlab platform.

  • Extended Access List generator applications using delphi
    Faculty of Industrial Technology, 2011
    Co-Authors: Justus Pradana Adityawan, Yulia Charli
    Abstract:

    Security is one requirement for a network. Moreover, when the network accommodates data traffic is important. One first step is to use network security Access control List (ACL) on routers. This program can generate a command line Access control Lists in accordance with the needs of the network. Method for making Access control Lists using the interface which shaped wizard for easy use. Users just choose the Access control Lists from the menu that is available then the program makes the results of data entered. In making this program, used Delphi programming language and an additional software network simulator, namely the Packet Tracer. The reason the author using Delphi, since Delphi language comes from the PASCAL language easy to learn. In addition DELPHI has an intuitive syntax. Bibliography (2001 2005).

Ratih Titi Komalasari - One of the best experts on this subject based on the ideXlab platform.

  • implementasi packet filtering menggunakan metode Extended Access control List acl pada protokol eigrp
    JURNAL MEDIA INFORMATIKA BUDIDARMA, 2020
    Co-Authors: Muhammad Hafizhan, Moh Iwan Wahyuddin, Ratih Titi Komalasari
    Abstract:

    Maintaining security aspects is important for managing network performance so that it can provide optimal services for its users. The difficulty of managing data transmission on a local network (LAN) between two or more divisions, without disrupting data traffic on other divisions, is a major problem for companies. One effort that can be done is to implement an Extended Access List which is one part of the Access Control List (ACL) method. The Extended ACL will be used as packet filtering for each workspace, such as the employee workspace and the manager's workspace. ACL will later run on the EIGRP protocol. the EIGRP protocol will be tested with delay parameters, and the results obtained that by applying the ACL method on EIGRP can provide the availability of networks that have smaller delays with an average of 90.4 ms.

Muhammad Hafizhan - One of the best experts on this subject based on the ideXlab platform.

  • implementasi packet filtering menggunakan metode Extended Access control List acl pada protokol eigrp
    JURNAL MEDIA INFORMATIKA BUDIDARMA, 2020
    Co-Authors: Muhammad Hafizhan, Moh Iwan Wahyuddin, Ratih Titi Komalasari
    Abstract:

    Maintaining security aspects is important for managing network performance so that it can provide optimal services for its users. The difficulty of managing data transmission on a local network (LAN) between two or more divisions, without disrupting data traffic on other divisions, is a major problem for companies. One effort that can be done is to implement an Extended Access List which is one part of the Access Control List (ACL) method. The Extended ACL will be used as packet filtering for each workspace, such as the employee workspace and the manager's workspace. ACL will later run on the EIGRP protocol. the EIGRP protocol will be tested with delay parameters, and the results obtained that by applying the ACL method on EIGRP can provide the availability of networks that have smaller delays with an average of 90.4 ms.