Manajemen Penjadwalan Waktu Blokir Akses Internet pada Mikrotik RouterOS
DOI:
https://doi.org/10.61220/scientist.v1i1.232Keywords:
MikroTik, RouterOS, Internet, FirewallAbstract
Restricting internet access at certain hours allows for more efficient allocation of network resources and bandwidth. This limitation ensures that internet usage is not excessive, preventing the network from slowing down or being burdened by unproductive activities during critical hours. The research methodology employed involves the analysis of hardware and software requirements, network topology design, and network configuration. The research findings demonstrate the effectiveness of limiting internet access at specific times, supporting remote learning, and enhancing internet usage efficiency. System testing was conducted on Windows 10 and Debian 10, demonstrating the successful implementation of the scheduled blocking system. Although successful in simulation, this study has the potential to provide further benefits in real-world network environments.
Downloads
References
L. N. Alfiah, D. A. Rokhim, and I. A. I. Wulandari, “Analisis Dampak Anjuran Pemerintah Terhadap Belajar Di Rumah Bagi Pelaku Pendidikan,” Jamp J. Adm. Dan Manaj. Pendidik., 2020, doi: 10.17977/um027v3i32020p216.
A. O. Samura and M. Noho, “Reformasi Pembelajaran Era Covid-19: Pembelajaran Online Berbasis Masalah Dalam Meningkatkan Kemampuan Berpikir Kreatif Siswa SMP,” J. Didact. Math., 2022, doi: 10.34007/jdm.v3i3.1526.
R. Panjaitan, “Jaringan Hotspot Berbasis Mikrotik,” 2023, doi: 10.31219/osf.io/3gbm7.
A. B. Pratomo, “Pengembangan Sistem Firewall Pada Jaringan Komputer Berbasis Mikrotik Routeros,” Bull. Netw. Eng. Informatics, 2023, doi: 10.59688/bufnets.v1i2.10.
K. Mukiman, A. Fadhil, and M. H. Asyrofi, “Penerapan Limit Akses Browsing Internet Pada Saat Jam Kerja Di PT XYZ,” J. Teknol. Terpadu, 2021, doi: 10.54914/jtt.v7i1.342.
A. Syukur, “Analisis Management Bandwidth Menggunakan Metode Per Connection Queue (PCQ) Dengan Authentikasi RADIUS,” It J. Res. Dev., 2018, doi: 10.25299/itjrd.2018.vol2(2).1260.
M. Eichelberg and K. Kleber, “Cybersecurity in PACS and Medical Imaging: An Overview,” J. Digit. Imaging, 2020, doi: 10.1007/s10278-020-00393-3.
M. Ali and F. N. Latifah, “IMPLEMENASI BLOCK ACCESS PENGGUNA LAYANAN INTERNET DENGAN METODE FILTER RULE Dan LAYER 7 PROTOCOL,” J. Inf. Syst. Appl. Manag. Account. Res., 2021, doi: 10.52362/jisamar.v5i2.422.
Downloads
Published
Citation
Issue
Section
License
Copyright (c) 2023 Atika Dwiyanti Yusuf (Author)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.