Metode Block Access Serta Memanejemen Bandwith Pada Mikrotik Rb951ui Dan Mikrotik Rb 941-2ND Di Caffe Ready Jombang Jawa Timur
Abstract
The most important aspect of a network security system is to maintain data integrity and ensure the availability of services that are used by users safely. All types of attacks and attempts to abuse network resources by irresponsible parties must be overcome in an effort to protect the network security system. As in the case that occurred at Cafe Ready Stadion, it shows that network security at Café Ready Jombang Stadium is still relatively low. Such as abusing an unhealthy network, causing the entry of viruses into the ISP's Internet Service Provider, resulting in unstable Internet Service Provider (ISP) lines. However, this can be overcome by utilizing the block access method and bandwidth management. With the Management Banwith it can limit any use of internet services and can be configured on the MikroTik router software, where there are 2 different MikroTik namely MikroTik RB951Ui-2HnD and MikroTik RB941-2nD. So that there will be a significant difference between the two Mikrotik routers. Namely in terms of capacity and processor of each router. Thus, the purpose of this research is to show the difference between a combination of dividing internet access by providing bandwidth to each user in the form of a hotspot and closing an internet access permanently, so that only certain users cannot access the internet network.
Downloads
References
[2] R. Rizal, R. Ruuhwan, and K. A. Nugraha, “Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941,” J. ICT Inf. Commun. Technol., vol. 19, no. 1, pp. 1–8, 2020, doi: 10.36054/jict-ikmi.v19i1.119.
[3] A. Restu Mukti and R. Novrianda Dasmen, “Prototipe Manajemen Bandwidth pada Jaringan Internet Hotel Harvani dengan Mikrotik RB 750r2,” J. Inform. J. Pengemb. IT, vol. 4, no. 2, pp. 87–92, 2019, doi: 10.30591/jpit.v4i2.1322.
[4] A. Nurfauzi, E. R. Nainggolan, S. N. Khasanah, and A. Setiadi, “Implementasi Firewall Filtering Web Dan Manajemen Bandwith Menggunakan Mikrotik,” Snit 2018, vol. 1, no. 1, pp. 162–167, 2018, [Online]. Available: http://seminar.bsi.ac.id/snit/index.php/snit-2018/article/view/74.
[5] F. Alwafi, “ANALISIS DAN IMPLEMENTASI KEAMANAN JARINGAN PADA PT . DAE MYUNG HIGHNESS INDONESIA Pendahuluan Kemajuan di bidang teknologi lainnya instansi dan bentuk usaha dengan dalam berinteraksi karyawan informasi khususnya internet kantor cabang , maupun di lapanga,” vol. 3, no. 1, pp. 1–10, 2015.
[6] M. R. Ridho, “Review keunggulan router mikrotik rb951ui-2hnd,” 2015.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) that allows others to share — copy and redistribute the material in any medium or format and adapt — remix, transform, and build upon the material for any purpose, even commercially with an acknowledgment of the work's authorship and initial publication in this journal.