Rancang Bangun Jaringan Hotspot Menggunakan LINUX ClearOS Dengan Konsep Security Gateway
Abstract
Hotspot checks certain places (usually public places) that have Internet services with wireless LAN technology, like universities, shopping malls, squares, libraries, restaurants or airports. Internet services like these are available for a fee and free. a sensible approach is required to manage server protection, namely by protecting the prevailing network. Where there's level of security to secure access and access rights to existing hotspots. A gateway may be a tool that's wont to connect a network to at least one or more computer networks that use different communication protocols, so information from an system is provided to other computer networks that use different protocols. to form this method, the author uses Linux ClearOS for the protection concept. this method is applied to the case study of PT. XYZ, which uses the hotspot. The author describes how security systems are installed and built on network servers, and describes gateways as network infrastructure. so the present hotspot medium can maximize its working system by using Linux software, which is another hotspot.
Downloads
References
[2] Y. W. Aswin, M. Mudjianto, and R. Ningsih, “Sistem Informasi Inventory Pada Hotel Maharani,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 3, pp. 289–295, 2020, doi: 10.32672/jnkti.v3i3.2488.
[3] A. A. Mamusung, N. B. Anshary, and R. A. Sumarni, “Perancangan Sistem Monitoring Gangguan Akses Wifi.Id PT Telkom Wilayah Jakarta Timur Berbasis Netbeans,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 3, pp. 255–261, 2020, doi: 10.32672/jnkti.v3i3.2477.
[4] S. H. Hadad, “Rancang Bangun Sistem Jaringan Menggunakan Linux Sabily pada Laboraturium Akademi Ilmu Komputer (AIKOM) Ternate,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 2, no. 1, pp. 24–31, 2019, doi: 10.47324/ilkominfo.v2i1.17.
[5] A. Fadlil, I. Riadi, and S. Aji, “Development Of Computer Network Security Systems So That Network Forensic Analysis,” J. Ilmu Tek. Elektro Komput. Dan Inform., vol. 3, no. 1, pp. 11–18, 2017.
[6] Y. Yanti, N. Pramita, and Maulizar, “Analisa Pengukuran Interferensi Pada Acces Point (Ap) Untuk Mengetahui Kualitas Quality of Service (Qos),” J. Nas. Komputasi dan Teknol. Inf., vol. 1, no. 1, pp. 17–21, 2018.
[7] M. M, Z. Zulfan, S. Susmanto, and F. Furqan, “Analisis Quality Of Service (Qos) Layanan Video Streaming Youtube Pada Jaringan Wireless,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 1, pp. 67–74, 2020, doi: 10.32672/jnkti.v3i1.2013.
[8] S. Wijayanto, “Analisa perancangan model sistem monitoring, pencatatan dan pengiriman hasil produksi truk dengan Remote File Transfer System (RFTS) pada perusahaan XYZ menggunakan metode System Development Life Cycle,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 1, pp. 1–8, 2020, doi: 10.32672/jnkti.v3i1.1766.
[9] E. Al-Shaer, Automated firewall analytics: Design, configuration and optimization. In Automated Firewall Analytics: Design, Configuration and Optimization. 2014.
[10] S. Hidayatulloh, “Analisis Dan Optimalisasi Keamanan Jaringan Menggunakan Protokol Ipsec,” J. Inform., vol. 1, no. 2, pp. 93–104, 2014, [Online]. Available: https://doi.org/10.31311/ji.v1i2.47.
[11] F. Adhi Purwaningrum, A. Purwanto, E. Agus Darmadi, P. Tri Mitra Karya Mandiri Blok Semper Jomin Baru, and C. -Karawang, “Optimalisasi Jaringan Menggunakan Firewall,” vol. 2, no. 3, pp. 17–23, 2018.
[12] I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” J. Teknol. Inf. Indones., vol. 2, no. 2, pp. 18–24, 2019, doi: 10.30869/jtii.v2i2.312.
Copyright (c) 2023 Arie Gunawan, Rosyidah Rahmah, Agus Iskandar
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.