Rancang Bangun Jaringan Hotspot Menggunakan LINUX ClearOS Dengan Konsep Security Gateway

  • Arie Gunawan Universitas Nasional Jakarta
  • Rosyidah Rahmah Bina Nusantara University Jakarta
  • Agus Iskandar Universitas Nasional Jakarta
Keywords: hotspot, linux, clearos, gateway

Abstract

Hotspot checks certain places (usually public places) that have Internet services with wireless LAN technology, like universities, shopping malls, squares, libraries, restaurants or airports. Internet services like these are available for a fee and free. a sensible approach is required to manage server protection, namely by protecting the prevailing network. Where there's level of security to secure access and access rights to existing hotspots. A gateway may be a tool that's wont to connect a network to at least one or more computer networks that use different communication protocols, so information from an system is provided to other computer networks that use different protocols. to form this method, the author uses Linux ClearOS for the protection concept. this method is applied to the case study of PT. XYZ, which uses the hotspot. The author describes how security systems are installed and built on network servers, and describes gateways as network infrastructure. so the present hotspot medium can maximize its working system by using Linux software, which is another hotspot.

Downloads

Download data is not yet available.

References

[1] S. A. Pamuji, R. Y. Rachmawati, and C. Iswahyudi, “Jurnal JARKOM Vol . 5 No . 2 Desember 2017 ANALISIS DAN PERANCANGAN JARINGAN NIRKABEL BERBASIS CAPTIVE PORTAL MENGGUNAKAN SIMPLE QUEUE PADA MIKROTIK DI SMP AL - AZHAR 26 YOGYAKARTA Jurnal JARKOM Vol . 5 No . 2 Desember 2017 E- ISSN : 2338-6304,” Jarkom, vol. 5, no. 2, pp. 85–95, 2017.
[2] Y. W. Aswin, M. Mudjianto, and R. Ningsih, “Sistem Informasi Inventory Pada Hotel Maharani,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 3, pp. 289–295, 2020, doi: 10.32672/jnkti.v3i3.2488.
[3] A. A. Mamusung, N. B. Anshary, and R. A. Sumarni, “Perancangan Sistem Monitoring Gangguan Akses Wifi.Id PT Telkom Wilayah Jakarta Timur Berbasis Netbeans,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 3, pp. 255–261, 2020, doi: 10.32672/jnkti.v3i3.2477.
[4] S. H. Hadad, “Rancang Bangun Sistem Jaringan Menggunakan Linux Sabily pada Laboraturium Akademi Ilmu Komputer (AIKOM) Ternate,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 2, no. 1, pp. 24–31, 2019, doi: 10.47324/ilkominfo.v2i1.17.
[5] A. Fadlil, I. Riadi, and S. Aji, “Development Of Computer Network Security Systems So That Network Forensic Analysis,” J. Ilmu Tek. Elektro Komput. Dan Inform., vol. 3, no. 1, pp. 11–18, 2017.
[6] Y. Yanti, N. Pramita, and Maulizar, “Analisa Pengukuran Interferensi Pada Acces Point (Ap) Untuk Mengetahui Kualitas Quality of Service (Qos),” J. Nas. Komputasi dan Teknol. Inf., vol. 1, no. 1, pp. 17–21, 2018.
[7] M. M, Z. Zulfan, S. Susmanto, and F. Furqan, “Analisis Quality Of Service (Qos) Layanan Video Streaming Youtube Pada Jaringan Wireless,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 1, pp. 67–74, 2020, doi: 10.32672/jnkti.v3i1.2013.
[8] S. Wijayanto, “Analisa perancangan model sistem monitoring, pencatatan dan pengiriman hasil produksi truk dengan Remote File Transfer System (RFTS) pada perusahaan XYZ menggunakan metode System Development Life Cycle,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 1, pp. 1–8, 2020, doi: 10.32672/jnkti.v3i1.1766.
[9] E. Al-Shaer, Automated firewall analytics: Design, configuration and optimization. In Automated Firewall Analytics: Design, Configuration and Optimization. 2014.
[10] S. Hidayatulloh, “Analisis Dan Optimalisasi Keamanan Jaringan Menggunakan Protokol Ipsec,” J. Inform., vol. 1, no. 2, pp. 93–104, 2014, [Online]. Available: https://doi.org/10.31311/ji.v1i2.47.
[11] F. Adhi Purwaningrum, A. Purwanto, E. Agus Darmadi, P. Tri Mitra Karya Mandiri Blok Semper Jomin Baru, and C. -Karawang, “Optimalisasi Jaringan Menggunakan Firewall,” vol. 2, no. 3, pp. 17–23, 2018.
[12] I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” J. Teknol. Inf. Indones., vol. 2, no. 2, pp. 18–24, 2019, doi: 10.30869/jtii.v2i2.312.
Published
2023-02-23
How to Cite
[1]
A. Gunawan, R. Rahmah, and A. Iskandar, “Rancang Bangun Jaringan Hotspot Menggunakan LINUX ClearOS Dengan Konsep Security Gateway”, jtim, vol. 4, no. 4, pp. 272-280, Feb. 2023.
Section
Articles