{"title":"在 SMK N 3 Seluma 使用 Mikrotik 和代理服务器实现网络管理和安全","authors":"Indra Saputra, Toibah Umi Kalsum, H. Alamsyah","doi":"10.37676/jmcs.v3i1.5422","DOIUrl":null,"url":null,"abstract":"The aim of this research is to carry out computer network management and security at SMK Negeri 3 Seluma by using a proxy device and a sequid proxy server as an external proxy server. The research method used in this research is PPDIO method consisting of Prepare, Plan, Design, Implement, Operate and Optimize. The hardware used to configure network management is Mikrotik Roadboard, while the software used to configure network management and security is Winbox and Squid proxy server. The results of research on the implementation of network management were the formation of a network using a proxy configuration at SMKN 3 Seluma. toward network security, filtering of social media websites and websites suspected of containing viruses can be carried out according to the design and the blocking is successful.","PeriodicalId":517517,"journal":{"name":"Jurnal Media Computer Science","volume":"204 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Implementation Of Network Management And Security Using Mikrotik And Proxy Server At SMK N 3 Seluma\",\"authors\":\"Indra Saputra, Toibah Umi Kalsum, H. Alamsyah\",\"doi\":\"10.37676/jmcs.v3i1.5422\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this research is to carry out computer network management and security at SMK Negeri 3 Seluma by using a proxy device and a sequid proxy server as an external proxy server. The research method used in this research is PPDIO method consisting of Prepare, Plan, Design, Implement, Operate and Optimize. The hardware used to configure network management is Mikrotik Roadboard, while the software used to configure network management and security is Winbox and Squid proxy server. The results of research on the implementation of network management were the formation of a network using a proxy configuration at SMKN 3 Seluma. toward network security, filtering of social media websites and websites suspected of containing viruses can be carried out according to the design and the blocking is successful.\",\"PeriodicalId\":517517,\"journal\":{\"name\":\"Jurnal Media Computer Science\",\"volume\":\"204 \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Jurnal Media Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37676/jmcs.v3i1.5422\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Media Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37676/jmcs.v3i1.5422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Implementation Of Network Management And Security Using Mikrotik And Proxy Server At SMK N 3 Seluma
The aim of this research is to carry out computer network management and security at SMK Negeri 3 Seluma by using a proxy device and a sequid proxy server as an external proxy server. The research method used in this research is PPDIO method consisting of Prepare, Plan, Design, Implement, Operate and Optimize. The hardware used to configure network management is Mikrotik Roadboard, while the software used to configure network management and security is Winbox and Squid proxy server. The results of research on the implementation of network management were the formation of a network using a proxy configuration at SMKN 3 Seluma. toward network security, filtering of social media websites and websites suspected of containing viruses can be carried out according to the design and the blocking is successful.