SISTEM KEAMANAN OPERASI LINUX UBUNTU IPTABLES SEBAGAI FIREWALL DI DINAS PENDIDIKAN KABUPATEN SERANG

Desmira Desmira

Sari


Abstract - Network security is needed by both individuals and agencies. Threats from intruders who intend to destroy or steal important information or data through computer networks. Several types of network security consist of several ways, one of which is a firewall, many firewalls are chosen because they are more effective and easier to implement. Implementation of a firewall security system using the Iptables configuration as an alternative way to secure data from unscrupulous persons or parties. The purpose of this research is to make a firewall operating system using linux-based iptables that can meet the need for a computer network system, the benefit of this research is to reduce the level of risk of destruction or theft of files or information. The method used is in observation research, interviews and designing the Linux operating security system Ubuntu iptables as a firewall in the education office of the Serang district. The results obtained from this study are the use of Iptables configuration on the Ubuntu linux operating system can be done on LAN and Wifi cable connections, as long as all clients are in the same class, Iptables configuration can block client access to the server and can be done the other way around, namely blocking server access. towards the client. From the results of research conducted on several PCs with multiple network connectors, Iptables configuration can work and does not affect the OS used, because the Iptables configuration uses Linux OS where the client uses Windows OS.

 


Kata Kunci


Ubuntu Linux Operation, Iptables, Firewall

Teks Lengkap:

PDF

Referensi


A Method for Observing and Evaluating Writing Lab Tutorials on JSTOR. (n.d.).

Aini, Q., & Amrizal, V. (2010). Implementasi IP-Tables Firewall pada Linux sebagai Sistem Keamanan Jaringan yang Handal, 3(1), 1–10.

Al-haj, S., & Al-shaer, E. (n.d.). Measuring Firewall Security, 2–5.

Amien, J. Al, Komputer, F. I., & Riau, U. M. (2020). Implementasi keamanan jaringan dengan iptables sebagai firewall menggunakan metode port knocking 1, 10(2), 159–165.

ANALISA DAN KONFIGURASI NETWORK INTRUSION PREVENTION SYSTEM ( NIPS ) PADA LINUX UBUNTU 10 . 04 LTS ANALISA DAN KONFIGURASI NETWORK INTRUSION PREVENTION SYSTEM ( NIPS ). (2011).

Diekmann, C., Hupel, L., Michaelis, J., Haslbeck, M., & Carle, G. (2018). Verified iptables Firewall Analysis and Verification. Journal of Automated Reasoning. https://doi.org/10.1007/s10817-017-9445-1

Diekmann, C., Michaelis, J., Haslbeck, M., & Carle, G. (2016). Verified iptables Firewall Analysis, 252–260.

Huraj, L. (2015). Performance Evaluations of IPTables Firewall Solutions under DDoS attacks, 11(2), 35–45.

Lyu, M. R., & Lau, L. K. Y. (2000). Firewall Security : Policies , Testing and Performance Evtaluation, 116–121.

Papini, D. R., Studies, F., & Building, E. (1988). An Observational Study of Affective and Assertive Family Interactions During Adolescence, 17(6), 477–492.

Sondakh, G., Najoan, M. E. I., & Lumenta, A. S. (2014). Perancangan Filtering Firewall Menggunakan Iptables Di Jaringan Pusat Teknologi Informasi Unsrat, 19–27.

Tran, T., Al-shaer, E., & Boutaba, R. (n.d.). PolicyVis : Firewall Security Policy Visualization and Inspection, 1–16.




DOI: https://doi.org/10.31294/jki.v9i1.9854

DOI (PDF): https://doi.org/10.31294/jki.v9i1.9854.g4869

##submission.copyrightStatement##

p-ISSN 2339-1928

e-ISSN 2579-633X



Dipublikasikan oleh LPPM Universitas Bina Sarana Informatika

Email : jurnalkhatulistiwainformatika@bsi.ac.id

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License

 

Jurnal Khatulistiwa Informatika Indexed by:

Image result for logo index sinta