{"title":"Optimalisasi Keamanan Jaringan Wireless Menggunakan Firewall Filtering MAC Address","authors":"Rachmat Adi Purnama Ubsi","doi":"10.2311/IJNS.V8I4.1608","DOIUrl":null,"url":null,"abstract":"Abstrak – Penggunaan layanan jaringan nirkabel 802.11 semakin meningkat, hal ini akan berbanding lurus dengan celah keamanan yang digunakan. Marak terjadinya pencurian dan kebobolan hak akses didalam wireless dikarenakan banyaknya tools yang mudah didapat didalam jaringan internet. Dengan menggunakan keamanan jaringan wireless model WEP/WPA2 yang hanya menerapkan single login untuk melakukan akses kini sudah mudah dibobol, penggunaan keamanan jaringan wireless model Hotspot Login yang melakukan verifikasi terhadap user dan password pun sudah rentan dengan kebobolan hak aksesnya. Untuk meminimalisir terjadinya kebobolan hak akses, penulis menerapkan optimalisasi keamanan jaringan wireless menggunakan metode firewall rule. Metode ini akan melakukan filtering hak akses berdasarkan MAC Address perangkat yang akan terhubung kedalam jaringan. Jadi jika terdapat user yang mencoba melakukan akses kedalam jaringan namun MAC Address dari perangkat tersebut tidak didaftarkan maka perangkat tersebut tidak akan terkoneksi kedalam jaringan internet. Setiap perangkat yang ingin terhubung kedalam jaringan internet harus didaftarkan MAC Addressnya terlebih dahulu. \nKata Kunci:Filtering, MAC Address, Firewall Rule, Wireless \n \nAbstract - The use of 802.11 wireless network services is increasing, this will be directly proportional to the security gap used. The occurrence of theft and conceding access rights in wireless due to the many tools that are easily available on the internet network. By using wireless network security, the WEP / WPA2 model that only applies a single login to access is now easy to break into, the use of wireless network security Hotspot Login model that verifies users and passwords is already vulnerable to access rights. To minimize the occurrence of conceding access rights, the author applies the optimization of wireless network security using the firewall rule method. This method will filter the access rights based on the MAC Address of the device to be connected to the network. So if there is a user who tries to access the network but the MAC Address of the device is not registered, the device will not be connected to the internet network. Every device that wants to be connected to the internet network must be registered with the MAC Address first. \nKeywords: Filtering, MAC Address, Firewall Rule, Wireless","PeriodicalId":13263,"journal":{"name":"IJNS - Indonesian Journal on Networking and Security","volume":"84 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IJNS - Indonesian Journal on Networking and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2311/IJNS.V8I4.1608","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Abstrak – Penggunaan layanan jaringan nirkabel 802.11 semakin meningkat, hal ini akan berbanding lurus dengan celah keamanan yang digunakan. Marak terjadinya pencurian dan kebobolan hak akses didalam wireless dikarenakan banyaknya tools yang mudah didapat didalam jaringan internet. Dengan menggunakan keamanan jaringan wireless model WEP/WPA2 yang hanya menerapkan single login untuk melakukan akses kini sudah mudah dibobol, penggunaan keamanan jaringan wireless model Hotspot Login yang melakukan verifikasi terhadap user dan password pun sudah rentan dengan kebobolan hak aksesnya. Untuk meminimalisir terjadinya kebobolan hak akses, penulis menerapkan optimalisasi keamanan jaringan wireless menggunakan metode firewall rule. Metode ini akan melakukan filtering hak akses berdasarkan MAC Address perangkat yang akan terhubung kedalam jaringan. Jadi jika terdapat user yang mencoba melakukan akses kedalam jaringan namun MAC Address dari perangkat tersebut tidak didaftarkan maka perangkat tersebut tidak akan terkoneksi kedalam jaringan internet. Setiap perangkat yang ingin terhubung kedalam jaringan internet harus didaftarkan MAC Addressnya terlebih dahulu.
Kata Kunci:Filtering, MAC Address, Firewall Rule, Wireless
Abstract - The use of 802.11 wireless network services is increasing, this will be directly proportional to the security gap used. The occurrence of theft and conceding access rights in wireless due to the many tools that are easily available on the internet network. By using wireless network security, the WEP / WPA2 model that only applies a single login to access is now easy to break into, the use of wireless network security Hotspot Login model that verifies users and passwords is already vulnerable to access rights. To minimize the occurrence of conceding access rights, the author applies the optimization of wireless network security using the firewall rule method. This method will filter the access rights based on the MAC Address of the device to be connected to the network. So if there is a user who tries to access the network but the MAC Address of the device is not registered, the device will not be connected to the internet network. Every device that wants to be connected to the internet network must be registered with the MAC Address first.
Keywords: Filtering, MAC Address, Firewall Rule, Wireless