Sistem Keamanan Jaringan Komputer Bridge Firewall Menggunakan Router Board Mikrotik Rb750
Currently to get a strong firewall is still constrained by expensive costs. Only large companies or agencies can obtain these devices, while small and medium-sized companies are still unable to obtain reliable firewall devices. Therefore, it is necessary to need inexpensive security devices or firewalls for medium and small companies and agencies to protect computer networks from outside interference. Mikrotik RB 750 is a router that can be used to make a network security system that is reliable, inexpensive and easy to configure. In this study, the author tries to provide a network security system solution using Packet Filter Firewall with the router in bridge mode and compares network security systems in other research journals. From the results of the comparison, several series of network security protections are produced, namely changing the proxy to bridge mode, IP address protection, content protection with mangle, Mikrotik device protection, traceroute protection, port scanner protection, Bogon IP protection, and Bruteforce FTP protection. After conducting a series of tests from the results of the network protection setup using the Mikrotik RB 750 in bridge mode, the authors conclude that not all packets that pass through the bridge firewall device can be filtered. One of them is ICMP flooding packets. Mikrotik devices with Firewall bridge mode cannot calculate the number of ICMP packets that pass, so the author blocks ICMP packets with the 8:0 option (echo request) that goes to the local network.
Sujito, Fatkhur Roji, “Sistem Keamanan Internat Dengan Menggunakan IP
Tables Sebagai Firewall,” Sistem Informasi STMIK Pradnya Paramita. Jurnal
Ilmiah DINAMIKA DOTCOM Vol. 1 No.1 Januari 2010, [Online]. Available:
Haerudin, “Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS” Universitas Internasional Batam. Jurnal Media Informatika Budidarma Volume 5, Nomor 3, Juli 2021, Page 848-855, [Online]. Available Online at https://ejurnal.stmikbudidarma.ac.id/index.php/mib.
Ino Anugrah, R.Hengki Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone” Universitas Islam 45. Jurnal Penelitian Ilmu Komputer, Sistem Embedded & Logic
(2) : 91-106 (2017).
Fadlil, A., Riadi, I., & Aji, S. (2017). Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan. Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI) , 3 (1), 1119
Amarudin, A., & Ulum, F. (2018). Desain Keamanan Jaringan Pada Mikrotik Router Os Menggunakan Metode Port Knocking. JURNAL TEKNOINFO, 12 (2), 72-75.
Muzakir, A., & Ulfa, M. (2019). Analisis Kinerja Packet Filtering Berbasis Mikrotik Routerboard Pada Sistem Keamanan Jaringan. Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 10 (1), 15-20
Juardi, D. (2017). Kajian Vulnerability Keamanan Jaringan Internet Menggunakan Nessus. SYNTAX: Jurnal Informatika , 6 (1), 11-19.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) that allows others to share — copy and redistribute the material in any medium or format and adapt — remix, transform, and build upon the material for any purpose, even commercially with an acknowledgment of the work's authorship and initial publication in this journal.