Implementasi Metode Port Knocking pada MikroTik RouterOS untuk Mendukung Keamanan Jaringan
DOI:
https://doi.org/10.61220/scientist.v1i1.235Keywords:
Port Knocking, Network Security, MikroTik RouterOS, AutentikasiAbstract
This study aims to implement the Port Knocking security method in a local network using MikroTik RouterOS. The Port Knocking method is employed to enhance system security by closing access to specific ports in the network and only allowing access to these ports when a predefined sequence of port knocks is performed. The research encompasses several stages, including the analysis of the port data to be tested, the configuration of the MikroTik router, and the security system testing. The results of this study demonstrate the successful securing of the Winbox and WWW ports on the MikroTik server using the Port Knocking method. Users are required to execute the predetermined port knocking sequence before accessing these services. Furthermore, the Port Knocking method effectively blocks ping access to the MikroTik server for users who have not completed the authentication process. These findings indicate that the implementation of the Port Knocking method significantly enhances the local network security on the MikroTik server.
Downloads
References
A. Amarudin, “Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking,” J. Teknoinfo, 2018, doi: 10.33365/jti.v12i2.121.
N. A. Santoso, K. B. Affandi, and R. D. Kurniawan, “Implementasi Keamanan Jaringan Menggunakan Port Knocking,” J. Janitra Inform. Dan Sist. Inf., 2022, doi: 10.25008/janitra.v2i2.156.
Y. Mulyanto, M. Julkarnain, and A. J. Afahar, “Implementasi Port Knocking Untuk Keamanan Jaringan SMKN 1 Sumbawa Besar,” J. Inform. Teknol. Dan Sains, 2021, doi: 10.51401/jinteks.v3i2.1016.
A. Harbani and M. Apriani, “Pengembangan Notifikasi Email Untuk Keamanan Port Menggunakan Metode Port Knocking,” Teknois J. Ilm. Teknol. Inf. Dan Sains, 2019, doi: 10.36350/jbs.v8i2.12.
A. B. Pratomo, “Pengembangan Sistem Firewall Pada Jaringan Komputer Berbasis Mikrotik Routeros,” Bull. Netw. Eng. Informatics, 2023, doi: 10.59688/bufnets.v1i2.10.
S. M. Bellovin, “Security Problems in the TCP/IP Protocol Suite,” Acm Sigcomm Comput. Commun. Rev., 1989, doi: 10.1145/378444.378449.
K. A. Scarfone and P. Hoffman, “Guidelines on Firewalls and Firewall Policy,” 2009, doi: 10.6028/nist.sp.800-41r1.
Downloads
Published
Citation
Issue
Section
License
Copyright (c) 2023 Fadhlirrahman Baso, Muhammad Ardiansyah (Author)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.