scholarly journals Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941

2020 ◽  
Vol 19 (1) ◽  
pp. 1-8
Author(s):  
Randi Rizal ◽  
Ruuhwan Ruuhwan ◽  
Kelvin Ajie Nugraha

An important aspect of a network security system is maintaining data integrity and ensuring that it can be used by users safely. All types of attacks and countermeasures against network discovery attempts by unauthorized parties must be able to overcome efforts to protect network security systems. Firewall systems are used to solve this problem, but software-level attack errors cannot be protected by firewall systems. In this study, the implementation of port knocking and port blocking methods in the network was successfully carried out for data privacy issues. The port blocking method on the Mikrotik router permanently blocks the www port and the Winbox port using the services provided by the Mikrotik router. The port knocking method is more effective because it has rules for being able to enter the proxy server and access it remotely on the local network. The port knocking network implementation experiment applied to the Mikrotik router has enforced the winbox port, and www with 1-2-3 authentication flows with each authentication has a predetermined timeout time.

SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 147-154
Author(s):  
Deuis Nur Astrida ◽  
Agung Restu Saputra ◽  
Akhmad Ikhza Assaufi

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe


2020 ◽  
Vol 8 (5) ◽  
pp. 01-09
Author(s):  
Bassey Ele ◽  
Umoh, E. E. ◽  
Egete, D. O.

It is eminent that the Internet is far from being secure. Insecure networks have caused organizations to lose lots of money as a result of data loss or data corruption, and even worse, some organizations have also lost their reputation hence reduce the client’s confidence. Therefore, this research focused on the development of an improved network security system using a firewall that can secure both the internal and external network of an organization. The system was developed using both packet filtering and proxy server architectures to prevent unauthorized connection or access to the organization server or resources thereby reducing the risk of attacks to the network and loss of organizational data. The system was implemented using PHP and python programming languages and the backend was developed using MySQL as the database server; HTML, CSS, and JavaScript for the frontend layout. The implementation of this firewall system includes a monitoring admin interface from where most activities within the private network can be monitored and also this system can prevent or deny the unauthorized request of services either by an intruder from an external network or personnel within the network. Based on the findings of this study, the developed system is recommended for any organization that depends on computer networks for the running of their daily activities.


2014 ◽  
Vol 1044-1045 ◽  
pp. 965-967 ◽  
Author(s):  
Lan Jiang

With the rapid development of economy and society, the growing prosperous computer network technology has now become one of the indispensable elements in human life. Small to every household personal computer systems, large to computer systems concerned countries, they are incorporated into the scope of computer network security systems. Enterprises are social living cells, with important role of financial intermediation, the mining technology and training personnel. Corporate computer systems is an important part to ensure high-speed operation of enterprises, summarize business information and protect trade secrets, therefore, the more developed computer network technology is, the more important the development and maintenance of corporate computer network security systems is. This article will explore the design and function of enterprise computer network security system implementations based on the characteristics of computer network security and enterprise computer network system.


Sign in / Sign up

Export Citation Format

Share Document