Sistem Keamanan Jaringan Komputer Bridge Firewall Menggunakan Router Board Mikrotik Rb750

  • Ahmad Robbahul Barra Universitas Darul Ulum Jombang
  • Arif Rahman Sujatmika Teknik Informatika, Universitas Darul ‘Ulum, Mojongapit, Jombang
  • Izzatul Umami Teknik Informatika, Universitas Darul ‘Ulum, Mojongapit, Jombang


Currently to get a strong firewall is still constrained by expensive costs. Only large companies or agencies can obtain these devices, while small and medium-sized companies are still unable to obtain reliable firewall devices. Therefore, it is necessary to need inexpensive security devices or firewalls for medium and small companies and agencies to protect computer networks from outside interference. Mikrotik RB 750 is a router that can be used to make a network security system that is reliable, inexpensive and easy to configure. In this study, the author tries to provide a network security system solution using Packet Filter Firewall with the router in bridge mode and compares network security systems in other research journals. From the results of the comparison, several series of network security protections are produced, namely changing the proxy to bridge mode, IP address protection, content protection with mangle, Mikrotik device protection, traceroute protection, port scanner protection, Bogon IP protection, and Bruteforce FTP protection. After conducting a series of tests from the results of the network protection setup using the Mikrotik RB 750 in bridge mode, the authors conclude that not all packets that pass through the bridge firewall device can be filtered. One of them is ICMP flooding packets. Mikrotik devices with Firewall bridge mode cannot calculate the number of ICMP packets that pass, so the author blocks ICMP packets with the 8:0 option (echo request) that goes to the local network.


Download data is not yet available.


Sujito, Fatkhur Roji, “Sistem Keamanan Internat Dengan Menggunakan IP

Tables Sebagai Firewall,” Sistem Informasi STMIK Pradnya Paramita. Jurnal

Ilmiah DINAMIKA DOTCOM Vol. 1 No.1 Januari 2010, [Online]. Available:


Haerudin, “Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS” Universitas Internasional Batam. Jurnal Media Informatika Budidarma Volume 5, Nomor 3, Juli 2021, Page 848-855, [Online]. Available Online at

Ino Anugrah, R.Hengki Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone” Universitas Islam 45. Jurnal Penelitian Ilmu Komputer, Sistem Embedded & Logic

(2) : 91-106 (2017).

Fadlil, A., Riadi, I., & Aji, S. (2017). Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan. Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI) , 3 (1), 1119

Amarudin, A., & Ulum, F. (2018). Desain Keamanan Jaringan Pada Mikrotik Router Os Menggunakan Metode Port Knocking. JURNAL TEKNOINFO, 12 (2), 72-75.

Muzakir, A., & Ulfa, M. (2019). Analisis Kinerja Packet Filtering Berbasis Mikrotik Routerboard Pada Sistem Keamanan Jaringan. Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 10 (1), 15-20

Juardi, D. (2017). Kajian Vulnerability Keamanan Jaringan Internet Menggunakan Nessus. SYNTAX: Jurnal Informatika , 6 (1), 11-19.

How to Cite
Barra, A., Sujatmika, A. R., & Umami, I. (2022). Sistem Keamanan Jaringan Komputer Bridge Firewall Menggunakan Router Board Mikrotik Rb750. Jurnal Teknologi Dan Sistem Informasi Bisnis, 4(2), 427-431.